SlideShare a Scribd company logo
Staff and Schools
                                                                               Protecting Students,




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
The Big Three in Education Web Security
 Acceptable Usage Policy (AUP)
 A clear communicable policy of ‘Who, Where, What and When’ is acceptable
 Dynamic Web Content Filtering
 A systems that delivers the AUP and provides control, monitoring and reporting
 Malware Protection




                                                                                    Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Constantly updated software that protects your users and your network at the web
 gateway (as opposed to individually at the PC) from malware threats
So what can possibly go wrong?
(In approximate order of likelihood);
 Malware Infection
 Student / Employee / Guest Misuse
 Data Loss / Damage




                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Data Protection Breach
 Operational Continuity Failures
 Criminal / Civil Law Infringement
Malware Infection
 Spamming, Denial of Service attacks, identity theft, email
  spoofing, storage of illegal data/images, damage/erasure/theft
  of data, ad serving, scareware (cryptovirology), SEO abuse, DNS
  poisoning, phishing, bypassing security and authentication,




                                                                    Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  software licence theft …
Via >>>
 Botnets (‘zombie computers’), rootkits, trojans, worms,
  backdoors, droppers, keystroke loggers, spyware, adware,
  dialers …
Student Misuse
 Accessing inappropriate content
 Inappropriate behaviour and bullying
 Social Media abuse/misuse
 Illegal file sharing / copyright theft (music, video and software)




                                                                       Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Identity theft
 Excessive bandwidth consumption (media)
Employee Misuse
 Time Wasting (Social Networking/Shopping/Surfing)
 Harassment / bullying / inappropriate social behaviour
 Accessing and distributing inappropriate content
 Illegal file sharing / copyright theft (music, video and software)




                                                                       Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Excessive bandwidth consumption (media)
 Data loss / theft
 Breaches of Data Protection Act
 Breaches of Confidentiality and Trust
Network ‘Guest’ Misuse
 Responsibility for guests on-line Health & Safety lies with the
  host
 Inappropriate guest activity on a school’s network could become
  the responsibility of the host




                                                                    Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Malware infection
 Excessive bandwidth consumption (media)
Data Loss
 Malware
  - Data Theft / Deletion
  - Cyptovirologic Extortion
     Data is encrypted by a virus then a payment is extorted for the decryption codes




                                                                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Identity Theft
 Breaches of Data Protection Act
 Data and Information Theft by Employees/Contractors
Operational Continuity Failures
 Loss of earnings through ‘downtime’
 Time, energy and money wasted in restoring status quo
 Network disinfection post malware attack
 Human and emotional costs




                                                            Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Restoration of damaged reputation
 Servers and computers seized in criminal investigations
 Potentially huge legal bills
Criminal / Civil Law Infringement
 Health and Safety – the behaviour of your employees and students can
    impact on their mental and physical health
   Vicarious Liability – you can be liable for things your employees and
    students do on-line even though you haven’t sanctioned them
   Negligence – if you fail to take reasonable and appropriate steps to protect




                                                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
    others you could be considered negligent
   Data Protection – you are required by law to conform to the DP Act
   Copyright Infringement – anybody sharing music/movies on your network?
   Paedophilic Material – it is a recognised fact that work place computers
    are used to store illegal material
What can you do about it?
 Remember that web security doesn’t only belong to the
    IT department
   Create a web security policy, implement it and constantly review it
   Have a robust, well communicated and effectively policed




                                                                          Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
    Acceptable Usage Policy
   Continuing education of all your users to the threats on the web
   Use effective control and reporting tools
Hot Topics




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
E-Safety Law in Independent Schools




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
E-Safety Law
 Usage of the web should risk assessed in the same way
  as any other school environment e.g. gym or science lab
 The law makes clear distinctions as to who is responsible for
  delivering e-safety at work (and in the school environment)




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  The Head Teacher and Board of Trustees/Governors cannot
  delegate it
 Using appropriate processes and technology can significantly
  reduce the threshold of legal liability and most importantly
  protect students and staff
Web Access Policies
                                                                           Building Flexible Filtering and




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Designing Flexible Policies
 For students:
   - age, year, subject and location specific
   - differentiate work time and personal time
 For staff:




                                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
   - work time, personal time and role specific
   - teacher control of web content in the classroom
 For guests:
   - what is acceptable under your ethos and culture?
Mobile Device Integration &
                                                                           Bring Your Own Device Schemes




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Mobile Device Integration
 iOS (iPad) and Android devices present new challenges –
  especially multi-flavoured Android
 ‘Locked down’ browsers are currently the most effective method
  of ensuring content is controlled




                                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
BYOD Schemes
 The use of personal mobile tech in schools is inevitable
 Easy access to fast school filtered Wi-Fi will help reduce 3G
  network use
 Protecting from malware at the gateway is currently the most




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  effective strategy
 Continuous education to students, staff and parents about on-
  line threats is the best approach
Devolved Content Management




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Helping Teachers to Teach
 Each web page should be dynamically scanned for inappropriate
  content based on the policy set for the user or group
 Uncategorised web content can be unblocked by teachers in the
  classroom (not IT) without overriding ‘red-line’ policies




                                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
 Resources like YouTube and Google search can be safely used in
  the classroom
 Full visibility of on-line activity and accountability can be
  maintained without constant IT interaction
Managing Social Media & Content




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
YouTube.com/education
 A hugely valuable resource of ‘safe’ educational material
 Schools can add their own approved content to their ‘channel’
  and restrict access to the rest of YouTube




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Managing Social Media
 ‘Read Only’ Facebook – a policy driven ‘look but don’t touch’
  approach allows Facebook to be integrated positively into the
  school environment
 Instant Messaging Management and Censoring – enables useful




                                                                  Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  communication tools to be properly managed and users fully
  accountable
What’s Next?




Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Our Crystal Ball …
 Integration with social media and content platforms
 Mobile device filtering to include 3G
 Improved sharing of approved / whitelisted content
  between teachers and schools




                                                        Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Contacts
Carly Lynsdale – Independent Education Executive
carly.lynsdale@smoothwall.net
0113 3874178




                                                   Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Sean Lazenby – Education Sales Manager
sean.lazenby@smoothwall.net
0113 3874183
Smoothwall presentation feb open day

More Related Content

What's hot

Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
Kushmi Anuththara
 
Ethics in ict
Ethics in ictEthics in ict
Ethics in ict
Huda Mutalib
 
M Learning2009 Fsi
M Learning2009 FsiM Learning2009 Fsi
M Learning2009 Fsi
Scott Johnson
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
Sangeetha M Kannuchamy
 
Trinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 shortTrinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 shortCarmella Doty
 
Copyright and Distance Education
Copyright and Distance EducationCopyright and Distance Education
Copyright and Distance Education
HVCClibrary
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
Being Aabis
 
Elearning New Trends
Elearning New TrendsElearning New Trends
Elearning New TrendsHeba Farghaly
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
tuttitat
 
Online assignment pdf
Online assignment pdfOnline assignment pdf
Online assignment pdf
Afiya Nazeer
 
Edc3100 – ict and pedagogy
Edc3100 – ict and pedagogyEdc3100 – ict and pedagogy
Edc3100 – ict and pedagogykaity101
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
YOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETYOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETBoni
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
Christina Gagnier
 
Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)
David Lamas
 
Ict topic 1
Ict topic 1Ict topic 1
Ict topic 1
kwongliik
 
Copyright crash course revision 2
Copyright crash course revision 2Copyright crash course revision 2
Copyright crash course revision 2
smendiola77
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
 

What's hot (19)

Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
Ethics in ict
Ethics in ictEthics in ict
Ethics in ict
 
M Learning2009 Fsi
M Learning2009 FsiM Learning2009 Fsi
M Learning2009 Fsi
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
Trinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 shortTrinity feb. 25 web2.0 short
Trinity feb. 25 web2.0 short
 
Copyright and Distance Education
Copyright and Distance EducationCopyright and Distance Education
Copyright and Distance Education
 
Presentation of ict impacts
Presentation of ict impactsPresentation of ict impacts
Presentation of ict impacts
 
Elearning New Trends
Elearning New TrendsElearning New Trends
Elearning New Trends
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
Online assignment pdf
Online assignment pdfOnline assignment pdf
Online assignment pdf
 
Edc3100 – ict and pedagogy
Edc3100 – ict and pedagogyEdc3100 – ict and pedagogy
Edc3100 – ict and pedagogy
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
YOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETYOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNET
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
UPAEP V4CS[4]
UPAEP V4CS[4]UPAEP V4CS[4]
UPAEP V4CS[4]
 
Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)Accessibility, Usability and User Centred Design (Accessibility)
Accessibility, Usability and User Centred Design (Accessibility)
 
Ict topic 1
Ict topic 1Ict topic 1
Ict topic 1
 
Copyright crash course revision 2
Copyright crash course revision 2Copyright crash course revision 2
Copyright crash course revision 2
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 

Viewers also liked

【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動park101
 
Going to 2º ESO
Going to 2º ESOGoing to 2º ESO
Going to 2º ESO
IES - Junta de Andalucia
 
Ch 15 1 Atmosphere Andie
Ch 15   1 Atmosphere AndieCh 15   1 Atmosphere Andie
Ch 15 1 Atmosphere Andiecharsh
 
Why Telehealth
Why TelehealthWhy Telehealth
Why Telehealth
weBranding
 
innoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmusinnoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmusJurjen Helmus
 
Deposition Andie
Deposition AndieDeposition Andie
Deposition Andiecharsh
 
1st Conditional
1st Conditional1st Conditional
1st Conditional
IES - Junta de Andalucia
 
4.2 voorlichting
4.2 voorlichting4.2 voorlichting
4.2 voorlichting
Jurjen Helmus
 
Havegot1 eso
Havegot1 esoHavegot1 eso
Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Cahyo Darujati
 
200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head Office200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head OfficeWout Visser
 
Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01onnel_91
 
Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)
Muhammad Jusuf
 
Chi Wai Lima – Brand Strategist
Chi Wai Lima – Brand StrategistChi Wai Lima – Brand Strategist
Chi Wai Lima – Brand Strategist
Chi Wai Lima
 
Eric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing ConsiderationsEric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing ConsiderationsAjax Experience 2009
 
張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院park101
 

Viewers also liked (20)

Artha Graha Peduli
Artha Graha PeduliArtha Graha Peduli
Artha Graha Peduli
 
Movenpick
MovenpickMovenpick
Movenpick
 
【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動【2010南科藝術季】1~4月月份活動
【2010南科藝術季】1~4月月份活動
 
Going to 2º ESO
Going to 2º ESOGoing to 2º ESO
Going to 2º ESO
 
Ch 15 1 Atmosphere Andie
Ch 15   1 Atmosphere AndieCh 15   1 Atmosphere Andie
Ch 15 1 Atmosphere Andie
 
Why Telehealth
Why TelehealthWhy Telehealth
Why Telehealth
 
innoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmusinnoveren_met_big_data_jr_helmus
innoveren_met_big_data_jr_helmus
 
Deposition Andie
Deposition AndieDeposition Andie
Deposition Andie
 
1st Conditional
1st Conditional1st Conditional
1st Conditional
 
4.2 voorlichting
4.2 voorlichting4.2 voorlichting
4.2 voorlichting
 
Havegot1 eso
Havegot1 esoHavegot1 eso
Havegot1 eso
 
Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05Kcd226 Sistem Operasi Lecture05
Kcd226 Sistem Operasi Lecture05
 
200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head Office200908.Ej Lc Wv.Presentation Briefing Head Office
200908.Ej Lc Wv.Presentation Briefing Head Office
 
Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01Teorikaunseling 090910112241-phpapp01
Teorikaunseling 090910112241-phpapp01
 
Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)Unfinished Journey (Episode 2)
Unfinished Journey (Episode 2)
 
Graduate Project Portfolio
Graduate Project PortfolioGraduate Project Portfolio
Graduate Project Portfolio
 
Chi Wai Lima – Brand Strategist
Chi Wai Lima – Brand StrategistChi Wai Lima – Brand Strategist
Chi Wai Lima – Brand Strategist
 
Eric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing ConsiderationsEric Beland Ajax Load Testing Considerations
Eric Beland Ajax Load Testing Considerations
 
張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院張苓苓美容美儀整體造型學院
張苓苓美容美儀整體造型學院
 
Love poem
Love poemLove poem
Love poem
 

Similar to Smoothwall presentation feb open day

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
CTIC Technology Centre
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
OracleIDM
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
David Rogers
 
Public Safety and the Internet of Everything
Public Safety and the Internet of EverythingPublic Safety and the Internet of Everything
Public Safety and the Internet of Everything
Connected Futures
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
Huntsman Security
 
Uit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revidrissss dddd
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
HanelynDZAmudio
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinalAmeya Parab
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
IBM Sverige
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
Authentic8
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
iansadler
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
Team Sistemi
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
Bjørn Sloth
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
IET India
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Future Education Magazine
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
OracleIDM
 

Similar to Smoothwall presentation feb open day (20)

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Young People and Internet Literacy and Safety
Young People and Internet Literacy and SafetyYoung People and Internet Literacy and Safety
Young People and Internet Literacy and Safety
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDark Clouds and Rainy Days, the Bad Side of Cloud Computing
Dark Clouds and Rainy Days, the Bad Side of Cloud Computing
 
Public Safety and the Internet of Everything
Public Safety and the Internet of EverythingPublic Safety and the Internet of Everything
Public Safety and the Internet of Everything
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Uit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_rev
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 

More from Victoria College

Network First Open Day presentation
Network First Open Day presentationNetwork First Open Day presentation
Network First Open Day presentation
Victoria College
 
Saving money with MFDs
Saving money with MFDsSaving money with MFDs
Saving money with MFDs
Victoria College
 
eLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technologyeLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technology
Victoria College
 
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
Victoria College
 
Heads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving SeatHeads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving Seat
Victoria College
 
Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011 Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011
Victoria College
 
The learning platform: digital literacy
The learning platform: digital literacyThe learning platform: digital literacy
The learning platform: digital literacy
Victoria College
 

More from Victoria College (7)

Network First Open Day presentation
Network First Open Day presentationNetwork First Open Day presentation
Network First Open Day presentation
 
Saving money with MFDs
Saving money with MFDsSaving money with MFDs
Saving money with MFDs
 
eLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technologyeLearning - how to persuade staff to use technology
eLearning - how to persuade staff to use technology
 
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)
 
Heads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving SeatHeads in the Cloud, Students in the Driving Seat
Heads in the Cloud, Students in the Driving Seat
 
Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011 Haileybury Group Directors of Studies Presentation June 2011
Haileybury Group Directors of Studies Presentation June 2011
 
The learning platform: digital literacy
The learning platform: digital literacyThe learning platform: digital literacy
The learning platform: digital literacy
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Smoothwall presentation feb open day

  • 1. Staff and Schools Protecting Students, Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 2. The Big Three in Education Web Security  Acceptable Usage Policy (AUP) A clear communicable policy of ‘Who, Where, What and When’ is acceptable  Dynamic Web Content Filtering A systems that delivers the AUP and provides control, monitoring and reporting  Malware Protection Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. Constantly updated software that protects your users and your network at the web gateway (as opposed to individually at the PC) from malware threats
  • 3. So what can possibly go wrong? (In approximate order of likelihood);  Malware Infection  Student / Employee / Guest Misuse  Data Loss / Damage Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Data Protection Breach  Operational Continuity Failures  Criminal / Civil Law Infringement
  • 4. Malware Infection  Spamming, Denial of Service attacks, identity theft, email spoofing, storage of illegal data/images, damage/erasure/theft of data, ad serving, scareware (cryptovirology), SEO abuse, DNS poisoning, phishing, bypassing security and authentication, Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. software licence theft … Via >>>  Botnets (‘zombie computers’), rootkits, trojans, worms, backdoors, droppers, keystroke loggers, spyware, adware, dialers …
  • 5. Student Misuse  Accessing inappropriate content  Inappropriate behaviour and bullying  Social Media abuse/misuse  Illegal file sharing / copyright theft (music, video and software) Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Identity theft  Excessive bandwidth consumption (media)
  • 6. Employee Misuse  Time Wasting (Social Networking/Shopping/Surfing)  Harassment / bullying / inappropriate social behaviour  Accessing and distributing inappropriate content  Illegal file sharing / copyright theft (music, video and software) Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Excessive bandwidth consumption (media)  Data loss / theft  Breaches of Data Protection Act  Breaches of Confidentiality and Trust
  • 7. Network ‘Guest’ Misuse  Responsibility for guests on-line Health & Safety lies with the host  Inappropriate guest activity on a school’s network could become the responsibility of the host Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Malware infection  Excessive bandwidth consumption (media)
  • 8. Data Loss  Malware - Data Theft / Deletion - Cyptovirologic Extortion Data is encrypted by a virus then a payment is extorted for the decryption codes Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Identity Theft  Breaches of Data Protection Act  Data and Information Theft by Employees/Contractors
  • 9. Operational Continuity Failures  Loss of earnings through ‘downtime’  Time, energy and money wasted in restoring status quo  Network disinfection post malware attack  Human and emotional costs Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Restoration of damaged reputation  Servers and computers seized in criminal investigations  Potentially huge legal bills
  • 10. Criminal / Civil Law Infringement  Health and Safety – the behaviour of your employees and students can impact on their mental and physical health  Vicarious Liability – you can be liable for things your employees and students do on-line even though you haven’t sanctioned them  Negligence – if you fail to take reasonable and appropriate steps to protect Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. others you could be considered negligent  Data Protection – you are required by law to conform to the DP Act  Copyright Infringement – anybody sharing music/movies on your network?  Paedophilic Material – it is a recognised fact that work place computers are used to store illegal material
  • 11. What can you do about it?  Remember that web security doesn’t only belong to the IT department  Create a web security policy, implement it and constantly review it  Have a robust, well communicated and effectively policed Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. Acceptable Usage Policy  Continuing education of all your users to the threats on the web  Use effective control and reporting tools
  • 12. Hot Topics Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 13. E-Safety Law in Independent Schools Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 14. E-Safety Law  Usage of the web should risk assessed in the same way as any other school environment e.g. gym or science lab  The law makes clear distinctions as to who is responsible for delivering e-safety at work (and in the school environment) Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. The Head Teacher and Board of Trustees/Governors cannot delegate it  Using appropriate processes and technology can significantly reduce the threshold of legal liability and most importantly protect students and staff
  • 15. Web Access Policies Building Flexible Filtering and Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 16. Designing Flexible Policies  For students: - age, year, subject and location specific - differentiate work time and personal time  For staff: Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. - work time, personal time and role specific - teacher control of web content in the classroom  For guests: - what is acceptable under your ethos and culture?
  • 17. Mobile Device Integration & Bring Your Own Device Schemes Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 18. Mobile Device Integration  iOS (iPad) and Android devices present new challenges – especially multi-flavoured Android  ‘Locked down’ browsers are currently the most effective method of ensuring content is controlled Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 19. BYOD Schemes  The use of personal mobile tech in schools is inevitable  Easy access to fast school filtered Wi-Fi will help reduce 3G network use  Protecting from malware at the gateway is currently the most Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. effective strategy  Continuous education to students, staff and parents about on- line threats is the best approach
  • 20. Devolved Content Management Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 21. Helping Teachers to Teach  Each web page should be dynamically scanned for inappropriate content based on the policy set for the user or group  Uncategorised web content can be unblocked by teachers in the classroom (not IT) without overriding ‘red-line’ policies Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.  Resources like YouTube and Google search can be safely used in the classroom  Full visibility of on-line activity and accountability can be maintained without constant IT interaction
  • 22. Managing Social Media & Content Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 23. YouTube.com/education  A hugely valuable resource of ‘safe’ educational material  Schools can add their own approved content to their ‘channel’ and restrict access to the rest of YouTube Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 24. Managing Social Media  ‘Read Only’ Facebook – a policy driven ‘look but don’t touch’ approach allows Facebook to be integrated positively into the school environment  Instant Messaging Management and Censoring – enables useful Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. communication tools to be properly managed and users fully accountable
  • 25. What’s Next? Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 26. Our Crystal Ball …  Integration with social media and content platforms  Mobile device filtering to include 3G  Improved sharing of approved / whitelisted content between teachers and schools Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
  • 27. Contacts Carly Lynsdale – Independent Education Executive carly.lynsdale@smoothwall.net 0113 3874178 Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved. Sean Lazenby – Education Sales Manager sean.lazenby@smoothwall.net 0113 3874183

Editor's Notes

  1.  "Mariposa" botnet, which infected more than 12.7 million computers, including half of the companies in the Fortune 1,000 list.'Coreflood Botnet': 'Zombie' Army May Have Infected 2 Million Computers, Stolen Hundreds of Millions of Dollarshttp://abcnews.go.com/Technology/feds-crush-coreflood-botnet-infected-million-computers-stole/story?id=13369529&page=2Serious crime unit flags Virgin botnet infectionshttp://www.pcpro.co.uk/news/security/368125/serious-crime-unit-flags-virgin-botnet-infectionsMicrosoft’s Rustock botnet takedown has reduced infections by over 50%The Rustock botnet was the largest source of spam in the world, consisting of around 150,000 machines sending around 30 billion spam messages a day. http://www.winrumors.com/microsofts-rustock-botnet-takedown-has-reduced-infections-by-over-50/
  2. Responsibility for guests on-line Health & Safety lies with the hostLaw relating to Occupiers’ Liability – network providers have a duty to protect their usersInappropriate guest activity on a school’s network could become the responsibility of the hostIP trackingAccess to inappropriate content and services
  3.