エピソード

  • A cyber security framework for schools
    2023/04/19

    Our final episode for the season see us working through a framework for cyber security presenting a number of pragmatic tips for schools as to the basics which should be in place. Throughout we focus on the free or easy to implement solutions which schools or colleges can afford and put in place before we consider any of the more costly solutions.

    It has been a fun experience recording these podcasts, and hopefully listeners have found it interesting and useful, but with this episode marks the end of season 1.

    続きを読む 一部表示
    1 時間 1 分
  • Some tips and advice for users on staying safe and secure online
    2023/04/12

    Our penultimate episode for this series of episodes is aimed at providing some tips and content which can be used in developing user awareness. We will consider why we might be attacked along with what preventative measures we should all be using, whether we are IT staff, general support staff, teaching staff or part of the wider school community. This includes the use of strong passwords, Multifactor authentication, minimisation of online data and a number of other considerations.

    続きを読む 一部表示
    49 分
  • Developing our best defence: Our users
    2023/04/05

    This weeks episode focusses on user awareness development acknowledging the fact that users are part of the vast majority of cyber incident and therefore the need to continually develop awareness of the risks and how to remain safe and secure. So what are we hoping to achieve through awareness training and how might we measure that such training is working as it should, and how and when do we need to adjust our training approach or content?


    続きを読む 一部表示
    48 分
  • Schools, cyber incident response and incident management
    2023/03/29

    Episode 7 continues on from last week looking at response and in particular at incident and recovery planning. How can we make sure we are as prepared as possible ahead of a cyber incident occurring? How can we create an appropriate incident response plan. We also discuss the broader issue of incident management and how those beyond the IT staff, especially at a senior level, are involved during the course of incident in managing the situation.

    続きを読む 一部表示
    50 分
  • How do we detect a cyber incident, and then what?
    2023/03/22

    This episode examines detection and response in relation to cyber incidents. How do we know we have suffered from a cyber incident? Our discussion starts with a pragmatic look in relation to how a cyber incident will often start out looking like a "normal" IT issue before we finally realise it is something more, that it is a cyber incident. We will then examine how we might respond once a cyber incident has been identified.

    続きを読む 一部表示
    41 分
  • Knowing what we are seeking to protect: Data Governance
    2023/03/15

    This weeks episode looks at data governance.   Data is one of the key items which cyber criminals will want to access or destroy and through it gain a monetary gain, so it is important that we know what data we store, where it is stored as well as who has access and how it is used.   Data governance is about understanding what we are seeking to protect.   We also explore how the value of differing types of data varies and therefore how the measures we may put in place to protect may also differ.

    続きを読む 一部表示
    46 分
  • So how do cyber criminals actually get in?
    2023/03/01

    In this weeks episode of In Our Humble Opinion we will start to look at the approaches cyber criminals might take in attacking schools and colleges.   We will consider some of the ways which they will actually get into a schools systems where they can then cause the damage to the organisation, its users, systems and data.   Social Engineering is therefore a significant part of the discussions.

    続きを読む 一部表示
    43 分
  • Beyond recon and the start of the active phase of attacks
    2023/02/23

    This week the discussion moves from the passive recon towards the more active attacks where the organisation may be able to detect the attack, assuming they have the relevant resources looking at the logs and other data.   Having at least a basic understanding of what a active attack might look like will help in both defending and responding.

    続きを読む 一部表示
    39 分