web site analytic
Browse by Tags - Microsoft UK Further Education Blog - Site Home - MSDN Blogs

Browse by Tags

  • Blog Post: How Microsoft uses the Windows Server 2008 R2 features to enhance our own security

    The Microsoft IT team publish case studies of how we've used our own products within our own infrastructure - sharing their real-life experiences. This month there's a case study about the way that we've implemented the security features in Windows Server 2008 R2, along with Windows 7 on the desktop...
  • Blog Post: Want to hear us talking about security and our roadmap?

    Every year, we get lots of feedback from our customers, through a variety of different routes: we conduct an annual customer satisfaction survey, which gives an overall picture we deal with individual customers through our support, customer care and partner management teams we see literally millions...
  • Blog Post: Understanding how Windows 7 improves secure remote access for staff

    With all of the changes in the way that ICT is being used in learning, there’s an increasing demand for staff to have remote access to college systems, from home or other times when they are away from your campus. Sometimes it can be enough to provide access to your MLE, but it is becoming increasingly...
  • Blog Post: Free anti-virus protection for home computers – good news for staff and students

    I was suprised to discover I hadn’t blogged this before. So if you’ve renewed an anti-virus subscription for your home computer since last October, when this was launched, then I’m sorry! We have launched a free anti-virus programme, Microsoft Security Essentials , which is for Windows XP, Windows Vista...
  • Blog Post: Using Windows 7 DirectAccess to connect staff to your college network securely

    Ever since Windows 7 was launched, I’ve had a steady stream of people asking me if I know of educational establishments who have implemented DirectAccess . DirectAccess allows you to setup your staff laptops so that they can always have secure access to your college network wherever they are, but without...
  • Blog Post: A question of security

    I was at a conference yesterday (sadly covered by Chatham House Rule so no juicy snippets) which looked at security of public sector ICT systems, and there was a session which was about malware. Although it was delivered in a matter-of-fact deadpan way, it left me feeling just a little bit nervous (and...
  • Blog Post: The Fat Lady sings

    “Ed the Fed” has written to me again. For those who are new to the blog, Ed’s a legend around here as the Microsoft UK Chief Cyber-Security Advisor. We call him “Ed the Fed”, because of his career history at the FBI and other places – which obviously makes him an ideal person to ask about Information...
  • Blog Post: Internet Explorer patch – time to roll it out

    I’m sure you’ve already got this covered, but just in case you have missed it, we released the update for Internet Explorer overnight to resolve the security glitch that the BBC et al have been getting all frothed up about. If you’ve got automatic updates set up on your own computer, or your network...
  • Blog Post: BitLocker’d up

    To the famous Diana Ross tune I’m Coming Out * I’m BitLocker’d up, I want the world to know, Got to let it show, I’m BitLocker’d up, I want the world to know, Got to let it show… I don’t know why it took me so long to get started. My new laptop has a TPM chip in it, and even though it doesn’t contain...
  • Blog Post: What do you do when students arrive with their laptops?

    Here are two problem statements I heard from a college recently: Our staff and students expectations are rising – they expect us to provide them all with a laptop and we simply can’t afford it. We have a problem that students (and staff) arrive on campus with their own laptops, and are expecting...
  • Blog Post: Ed The Fed says "Stay safe out there"

    I have a colleague, Ed, who’s a legend around here. He’s the Microsoft UK Chief Security Advisor. Obviously that’s a bit of a mouthful, which is why we call him “Ed the Fed”, because of his career history – which obviously makes him an ideal person to ask about Information Security. ( I was going to...
  • Blog Post: Microsoft’s Information Security Symposium Event

    The steam roller of Information Security continues to run down the hill towards education. Becta’s in the driving seat, and they haven’t really started the engine. By the time the new term begins, there will be new guidance on what you should be doing ( read my previous posts on the Schools Blog ). So...
  • Blog Post: Is your data at risk?

    2008 hasn't really started any better than 2007 finished - a laptop is stolen from the boot of a car, containing 600,000 personal data records - heaping data disaster upon data disaster . Reality says that laptops will be stolen, even when we think they are secure. I've had a laptop stolen from a hotel...
  • Blog Post: IT Forum: Neil Williams, University of Derby

    (Although this article is university focused, and therefore would normally only be on our Higher Education blog , I thought it was worth sharing on the FE blog too, as it has relevance to colleges who are facing some of the same issues Neil & I discussed below) At IT Forum last week, I ran into an...
  • Blog Post: IT Forum: Windows Vista and Security

    In a recent survey, 70% of (male) drivers said that their driving skills were "above average". Which tells you that most people think that they are better drivers than the others on the road. Well, PC security is probably like this - most users think that they know more about making the right decisions...
  • Blog Post: IT Forum: Threat Research and Response

    Vinny Guloto, General Manager for the Malware Protection Centre, presented today on the work that the centre is putting into the world of threat research, and both reactive and proactive response. One of the interesting slides that Vinny used was about the history of development of industry standards...
  • Blog Post: Get Safe Online week

    Get Safe Online week (12 th – 16 th November) is upon us again. And in the last 12 months, the subject of getting safe, and staying safe, online has become even more personal to me. More personal like having to spend a whole day restoring a relative's PC, when it was subject to a self-inflicted trojan...
  • Blog Post: 7 tips for working securely from wireless hotspots

    Like last week's posting, on 10 ways to work more securely , was a handy way of reminding your staff about common sense steps that they can take to keep their own personal PCs secure, as well as contributing to the organisation security you're managing. Well, here's another list in a similar vein, that...
  • Blog Post: 10 Ways to Work More Securely

    What's the biggest risk to your IT system security? Probably your users! For all of the efforts that you make, it only takes one user to do something really dumb inappropriate, and suddenly you're back to firefighting. And how many times have you had to remind your users about some of the things in this...
  • Blog Post: 150 applications and 2,000 workstations. And only 24 hours in a day.

    Around 80 IT Managers of colleges and universities attended last year's IT Forum - a conference dedicated to looking at how Microsoft technologies can be implemented to support business critical IT services. One of the technologies that most grabbed people's attention was the SoftGrid applications, which...
  • Blog Post: Data security - safeguarding individual's data

    Listening to the news this morning, my attention was grabbed by the Information Commissioner, on the subject of data security, as he said " Data is being stolen too easily. Laptops, containing personal information and databases, being stolen when they are taken outside of the workplace without proper...
Page 1 of 1 (21 items)