Close

0131 510 1234

Archive for category: Data security

10 things the Mobile Guardian MDM does for schools
by

10 things the Mobile Guardian MDM does for schools

A powerful, cloud-based MDM solution that’s engineered for schools.

Because of the exponential growth in the use of information technology, schools are incorporating mobile devices into their curriculums, to prepare students for their future employment. Worldwide, schools are implementing digital pedagogies with either shared mobile devices, dedicated 1:1 schemes or BYOD.

However, a mobile learning strategy presents numerous challenges. Schools need a means to manage, monitor and maintain a host of mobile devices, protect students from harmful online content, and ensure that their devices are secure.

Perhaps you are looking for a Mobile Device Manager (MDM) for the first time, or perhaps your current application is limiting your mobile learning strategy. Selecting the right MDM is critical to your school’s success in this field.

Mobile Guardian is a cloud-based MDM solution that offers unparalleled control and visibility. Designed to simplify MDM for schools, the feature-rich product makes managing an unlimited number of devices as easy as possible, regardless of operating system.

Here are ten ways the Mobile Guardian MDM can help your school.

1. Manage ALL your devices

We know it’s a pain to invest in and manage multiple solutions to monitor different devices. Wouldn’t it be great if you had a dashboard that let you manage everything? Our multi-OS MDM lets you manage Chromebooks, Android, iOS and macOS devices from a single dashboard. You’ll finally have a centralised view of all school devices.

2. A one-stop shop

Tired of paying for several MDM, web filtering and classroom management solutions? Mobile Guardian offers powerful MDM controls, robust web filtering and easy-to-use classroom controls, neatly rolled into one powerful solution.

3. Protect 1:1 devices, no matter where they are

Our robust off-campus filtering means that you can protect student devices whether they’re at school, at home, or even on a field trip. Rest assured, that wherever the device goes, Mobile Guardian’s state-of-the-art protection goes with it.

4. Fast enrolment

Remotely enrol thousands of devices with a few simple clicks. We’ve integrated with Apple School Manager, Active Directory and G Suite OU’s. You won’t have to waste time collecting devices and manually enrolling them. We also provide various enrolment options. Find one that suits your needs and start planning how you’ll spend all that extra time.

5. Easy-to-use tools for teachers and parents

We like to think of an educational ecosystem that exists between schools, teachers, parents and of course students. That’s why we’ve developed cloud-based, classroom management tools to empower teachers in the classroom. There’s also a parent dashboard with controls that help parents encourage healthy smartphone habits when their children are at home.

6. Control from the cloud

Enrol devices, install and manage apps, wipe devices and reset device passwords without ever having to leave your desk. You’ll be able to do it all, at the touch of a button and you’ll no longer have to walk from class to class to manually reset passwords.

7. Adopt the mobile strategy that you actually want

Don’t let your MDM pigeon-hole you into a mobile learning strategy that is no longer suitable or makes no financial sense. Perhaps it can only handle one type of device or prevents you from trialling new learning methods. With our flexibility you can invest in different device types and implement 1:1, BYOD, shared devices or even a combination of all three. Plus it’s easy to switch from a current MDM provider to Mobile Guardian.

8. Always honour your AUP

Once restrictions are set, wherever the device is and whether it’s using school WiFi, public internet or mobile data, the device will always comply with your AUP. The apps, websites and content you choose to restrict,  will stay off-limits, with no exceptions.

9. Curb device theft

Significantly reduce the numbers of devices that go walkabout. Track lost or stolen devices and set up alerts to lock, shut down or wipe a device when it comes online. Use our platform to help recover your devices and keep your fleet safe.

10. All the information you need, when you need it

We’re big into customisation. You can set up Mobile Guardian to deliver the exact information you need. Customise your dashboard and configure alerts and reports to keep you updated on your own terms.

Eliminate the insider threat.
by

Eliminate the insider threat.

In our rapidly evolving technology landscape, the insider threat is a growing problem. Collaboration tools, cloud and mobile computing have significantly increased the risks faced by organisations. A report by Cybersecurity Insiders and CA Technologies recently stated that ninety percent of organisations feel vulnerable to insider attacks.

Not all insider threats are malicious, though. Accidental data breaches caused by careless employees or negligence account for more than 50% of all data loss incidents from inside the network. Organisations storing or accessing confidential data must take action to reduce the risks of losing data from within the confines of company systems.

So, what can you as a business leader do to protect your most important information? The short answer is you need to take a holistic approach to information security. The soon-to-be-implemented GDPR will force organisations to get their data protection house in order, presenting opportunities to do better business.

We are gearing up to attend Scotland’s largest Cyber Security event, ScotSecure at Edinburgh’s Dynamic Earth next week. Two of Scotland’s security software powerhouses, Zonefox and My1Login will be joining us as we aim to help business leaders protect their networks from the inside and the outside.

About Zonefox and My1Login
In case you have been out of the country with no access to the Internet for the past few years, Zonefox and My1login are two of Scotland’s leading lights in the cybersecurity software space.

Protect your network with Zonefox

Zonefox has developed award-winning insider threat protection software that provides a 360-degree view of your network by monitoring every endpoint and every user 24/7. So, whether your employees are working remotely or third parties are accessing and sharing information they shouldn’t be, you will know about it.

Zonefox’s Augmented Intelligence automatically detects when a users’ behaviour changes and it can quickly spot when compromised user accounts are being used to harvest valuable IP and confidential data.

With Zonefox, network administrators have access to detailed forensics, enabling them to answer critical questions about an incident: Where did the incident take place? Who was the perpetrator? What did they take? Where did the data go?

Having answers to these questions not only helps find a quick resolution to data loss incidents, but it also helps organisations comply with data breach notifications – a significant element of GDPR obligations.

Protect your applications with My1Login

Glasgow-based My1Login is a European leader in Identity and Access Management (IAM) and Single Sign-On (SSO) solutions.

The security software provider has won multiple awards, including Identity and Access Management Solution of the Year at the recent Computing Security Awards. They are also an approved UK Government Supplier through G-Cloud 9.

My1Login is the UK’s most secure and most widely-compatible IAM solution that enables organisations to mitigate password-related cyber-security risks, strengthen identity assurance and meet critical compliance obligations such as GDPR. Its Single Sign-On solution integrates with all app types – web apps, mobile apps, flash apps, virtualised apps, and even legacy, thick-client apps and mainframes. Passwords can be updated automatically without revealing credentials, and the IT department can provision new users and manage My1Login via Active Directory (AD), simplifying user management at a stroke.

My1Login SSO also integrates with multi-factor authentication services, further securing employees’ access to corporate applications.

Heading to Scot-secure 2018?

If you are planning to visit Scot-secure 2018 next week, come over and chat with us about a comprehensive approach to network protection. The lovely folks from Zonefox and My1Login will happily take you through a demo of their innovative products.

Top ten remote working security tips
by

Top ten remote working security tips

Severe snow and icy wind have hit the UK  with devastating effect this week. The adverse weather has made conditions treacherous, forcing schools to close as well as having a negative impact on transport infrastructure. A result of the extreme weather is an increase in people taking advantage of remote working.

Fortunately, at Network ROI, we spend a lot of time and effort planning for precisely this type of event. Acting as the IT department for growing businesses in Scotland, England and Wales, it’s important we are able to provide support in all conditions.

We host our critical services and applications in the cloud which provides our team with remote access 24/7. We have equipped our engineers with encrypted laptops for when they need to work remotely, and we use Gamma Horizon, a cloud-hosted telephony system, giving every member of our team the same direct dial number and extension – wherever we are working. Our team use Microsoft Office365, delivering further cloud-based collaboration and communication capabilities.

When working remotely, it is essential to remain secure, especially when dealing with private company information. Follow the tips below to stay secure when working remotely.

If it can be moved, encrypt it!

Before working remotely, ensure your devices and any external hard drives or USB sticks are encrypted. USB sticks, mobile phones, tablets and laptops are easy targets for criminals and are also easy to lose. Losing unencrypted data increases the risk of personal information falling into the wrong hands.  Encrypt all your mobile devices and hardware.

Enable remote wipe

Protecting mobile devices within your business doesn’t need to be taxing. Investing in a mobile device management solution such as Microsoft Intune allows users to wipe devices remotely should the device be lost or stolen, checks devices are encrypted, enforces PIN protection and can allow you to locate lost or stolen devices quickly protecting your company and personal data.

Use a VPN

A Virtual Private Network (VPN) creates an additional layer of security when using private or public networks. It does so by creating an encrypted tunnel between the location you are working from and your company network.  This ensures your data remains private as well as giving you access to your company applications and servers.  VPN technology is no longer the chore it used to be, and seamless VPN technologies make this technology transparent to your users.

Limit the use of public Wi-Fi

Public Wi-Fi is fraught with danger.  You may recall the vulnerability affecting the WPA2 security protocol known as Krack in late 2017. Be wary of connecting to public hotspots, especially those in coffee shops, train stations and airports and use only as a last resort – use your mobile data hotspot on your phone or use a VPN (as above) if using public Wi-Fi as this keeps your data safe.

Limit the use of public computers

In cases where you have no access to a company device or are fresh out of battery, you may need to resort to using a public computer. Although we strongly recommend not using public computers, here are some useful tips:

  • limit the information you send on public computers;
  • never send business-critical information, and;
  • never store passwords in browsers.

If you log into web apps such as Outlook, make sure you log out once finished. Finally, clear browser history and cache before closing down the machine.

Keep passwords strong

We can’t emphasise the importance of strong passwords enough. Cracking a weak password is perhaps the easiest and most common method used by criminals to enter company networks illegally. If you need further assistance to create strong, memorable passwords, see below to download our free password guide.

DOWNLOAD YOUR FREE PASSWORD GUIDE!

Make weak passwords a thing of the past

Have a clear remote working policy

The current weather crisis should act as a catalyst to implement a remote working policy if you don’t already have one in place. When considering a remote working policy, base it on the needs of the business and identify what resources and processes you will need to implement to enable a secure remote working policy.  Plan, document and most importantly, communicate the policy clearly to all members of staff.

Secure your network

Remote working provides criminals with further opportunities to enter the company network. A dispersed workforce accessing the company network from multiple locations can be a headache to manage and secure. Use only secure remote access methods with 2-factor authentications and consider insider threat detection software such as Zonefox to let you see who is on your system, where they are based and what information they are accessing or downloading. The software also sends alerts whenever unusual behaviour is detected.

Keep passwords and PINs secret

Never email or send password across insecure systems. If you do need to send a password, ideally use an encrypted messaging service such as WhatsApp or a text message.   Make sure never to send username and password using the same service. If you are in a public place such as a busy coffee shop – or even your office – we suggest you don’t divulge personal information such as name, address, date of birth or password information over the phone – always do this privately.

Educate your team

Our tenth and final tip is to make sure your team are well versed in remote working and include training as part of your overall information security strategy. As we have said in previous posts, your people are your main strength, but they can also be a significant weakness if they don’t know how to work remotely in a secure manner.

Need help with business continuity planning?

Business continuity planning takes a lot of hard work, but as we can testify, it is entirely worth it. Our service delivery team hasn’t missed a beat throughout the so-called Beast from the East, and we are proud of our team for delivering superb service in challenging circumstances.

When designing a business continuity strategy, consider core products and services you deliver and think about the infrastructure and training your team will need to perform their duties if and when catastrophic situations arise.

Get in touch with us if you need help planning for business uncertainties.

GDPR – Four small letters. One massive impact.
by

GDPR – Four small letters. One massive impact.

What is the GDPR?

The EU General Data Protection Regulation (GDPR) will replace the Data Protection Act 1998 (the 1998 Act) when it comes into effect on May 25th this year.  The GDPR has been designed to harmonise data privacy laws across Europe, to protect and empower all EU citizens’ data privacy and to reshape the way organisations across the region approach data privacy.

Consideration has been given to new technologies, business processes and data usage that have become part of the digital economy in recent years.

Principles of the GPDR

Under the GDPR, the data protection principles set out the primary responsibilities for organisations. Personal data must be:

“processed lawfully, fairly and in a transparent manner in relation to individuals.”

“collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes.”

“adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed.”

“accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay.”

“kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed.”

“processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures.”

LEARN MORE ABOUT GDPR

Download your free copy of our GDPR e-book

Lawful basis for processing under the GDPR

Although not new, the lawful basis for processing under the GDPR places more emphasis on accountability and transparency relating to how your organisation processes data.

The six lawful bases are similar to the old conditions for processing, although there are some differences – the ICO website contains more information on lawful processing.

Individual rights

The GDPR provides the following rights for individuals:

  1. The right to be informed
  2. The right of access
  3. The right of rectification
  4. The right to erasure
  5. The right to restrict processing
  6. The right to data portability
  7. The right to object
  8. Rights related to automated decision making and profiling

You can read more about individuals rights on the ICO website.

Time to report a data breach

Under the 1998 Act, organisations have one month to report a data breach but once GDPR is enforceable, this period will reduce dramatically. Once a data breach has been detected, organisations will have 72 hours to investigate the violation, let the regulator know what’s happened, figure out if personally identifiable information (pii) has been compromised and have a plan to manage the threat.

Unless there are technical controls and a robust information security policy in place to mitigate the threat of a data breach, many organisations will struggle to meet these demands.

Data Protection Officer

In some circumstances, organisations must appoint a Data Protection Office (DPO). You must appoint a DPO if you:

  • are a public authority (except courts acting in a judicial capacity)
  • carry out large-scale systematic monitoring of individuals (e.g. behaviour tracking)
  • carry our large-scale processing of special categories of data or data relating to criminal convictions or offences – at this time, there is no numerical definition of “large-scale processing.”

You may appoint a data protection officer to act for a group of companies or a group of public authorities – depending upon size and data processing requirements.

Any organisation can appoint a DPO. Our Technical Director, Neil Douglas is a qualified GDPR Data Protection Officer and is always free to chat regarding your DPO or GDPR requirements.

Penalties

The maximum penalty for suffering a severe data breach under the Data Protection Act 1988 is £500,000. Mobile telecoms company, Talk Talk received a £400,000 fine for failing to prevent a serious data breach back in 2015. –

Penalties under the GDPR are far more severe. A maximum fine of €20 million or 4% of global annual turnover for the most severe data breaches is on the cards. However, we don’t expect the Information Commissioners Office (ICO), the UK’s governing body to impose the maximum fine as it hasn’t done so under the existing regulations – that’s not to say they won’t impose sizeable penalties.

Subscribe to the Network ROI blog

  • We'd love to keep in touch with you by email with offers, news and new product information. We treat all personal data with respect, and we promise NEVER to sell your details to third parties for marketing purposes.
Meltdown & Spectre – Everything you need to know
by

Meltdown & Spectre – Everything you need to know

Meltdown and Spectre are the names given to vulnerabilities recently discovered to exist in almost every central processing unit (CPU) manufactured in the last 20 years. These vulnerabilities could compromise sensitive data on nearly every server, PC, laptop, tablet and smartphone – including Apple devices – worldwide.

Researchers have known about Meltdown and Spectre for some months, and the risk is considered to be relatively small as no known exploit exists, so we urge you not to panic.

We are monitoring the situation closely and will update all clients and take appropriate action when necessary. But first, let’s take a more in-depth look at exactly what a vulnerability is and what you should do if you are concerned in the future.

What is a vulnerability?

A vulnerability can be defined as a security weakness resulting from a defect that the product developer or manufacturer did not intend to introduce. The flaws, in this case, were built into the chips to help them run faster.

We can split vulnerabilities into four main categories: low, medium, high and critical. Currently, Meltdown and Spectre are classed as Medium Level vulnerabilities.

For a hacker to capitalise on a vulnerability – an exploit must exist. An exploit is a piece of software code that takes advantage of the security weakness for the benefit of the attacker.

How to protect against vulnerabilities

Protecting your business, information and people against these vulnerabilities takes three forms:

  1. A hardware firmware upgrade must be applied which usually takes the form of a computer BIOS update.
  2. The Operating System (Windows, IOS, Android etc.) must be updated – typically known as a software update.
  3. The Antivirus product must be compatible with the Operating System Update.

Hardware and software updates only go so far. You also need to make your employees aware of potential threats. We highly recommend cyber awareness training for all staff. Network ROI will be happy to discuss your cyber training requirements.

LOOKING FOR CYBER SECURITY TRAINING?

The security team at Network ROI are ready to help achieve your cyber security objectives.

Patches and updates

As it currently stands, every hardware manufacturer is working on updates to their systems – big players such as Microsoft and Apple have already released updates. Software and hardware manufacturers worked tirelessly to release updates – known as emergency patches.  As a result, many patches weren’t tested fully with several causing serious operational issues.

Given the “medium” categorisation of the Meltdown and Spectre vulnerabilities, the fact that no known exploit exists, the issues the emergency patches are causing AND the fact that to exploit these vulnerabilities is a highly technical job, Network ROI have carried out the following actions:

  • Antivirus products have been updated to be compatible with the operating system update.
  • Our security team is monitoring the situation closely for developments
  • We are delaying the release of January’s Microsoft patches until they have been properly tested and we are satisfied they stable

In order to protect your data and company in the meantime, we highly recommend that basic cybersecurity hygiene is observed – this includes educating users not to click on suspicious links or opening email attachments from unknown sources.

The security team at Network ROI recommend you consider following the Cyber Essentials or IASME Governance scheme as a minimum standard of cyber and information security.

Sign up to the Network ROI blog

  • We'd love to keep in touch with you by email with offers, news and new product information. We treat all personal data with respect, and we promise NEVER to sell your details to third parties for marketing purposes.
VISIT THE NETWORK ROI BLOG
EMAIL SERVICEDESK HOW TO GET SUPPORT YOUR PORTAL QUICK SUPPORT CHAT SUPPORT