What is a Computer Virus?
A definition of a computer virus and how a virus works
Types of Malware
A list and description of different types of malware
Protect Systems and Data from Malware
How to protect your systems and data from malware
Latest Security Threats
A summary of the latest security threats
An attack on a website to covertly gather sensitive user details
A type of malware that encrypts systems and files and demands payment for decryption
Threats: Targeted Attacks
The growing trend of targeted cyber attacks
Is There a Safe Search Engine for Kids?
Is there such thing as a child safe search engine and if so, what should parents expect from it?
What is Online Safety?
It can be referred to as Online safety, eSafety or internet safety, but what does it mean?
Keeping Children Safe Online
Our kids will grow up only knowing life with the Internet, so how to keep them safe online?
Managing Online Risk
While education about online safety is essential, we also need to have adequate tools for reporting behaviours and content that breach safety standards
Why is Online Safety Important?
We have become significantly dependent on and accustomed to the digital services and devices we use for being online. Online safety plays a vital role in the proper use of these tools
Managing a Bring Your Own Device policy
Advice for managing a BYOD policy in schools
Email Phishing Explained
The ins and outs of phishing - answering who, what, why, how, where, and when
10 Internet Safety Tips - Staying Safe Online
Ten E Safety Tips for Staying Safe Online. For parents and families, and for children and young people, our ten top online safety tips
E Safety Facts - Staying Safe Online
How can parents keep children safe online? Start by understanding what e safety is about. Our ten top internet safety facts will help.
What is Anonymous Reporting?
In contrast to the promises of anonymity, a reporting process often equates to varying levels of transparency, accountability and communication
Video Conferencing for Kids: Safeguarding and Privacy Overview
Never have video conferencing services been as important as they are right now. No longer are they a novelty but vital for us all to stay connected, whether home, school or work.
Education Professionals - Remote Working
A resource guide for education professionals when working from home.
Different Types of Phishing
The different ways cyber-criminals attempt email fraud
Why Should You Use an Anonymous Reporting Tool?
How will an anonymous reporting tool increase awareness of issues and improve safeguarding
How to Spot Phishing Emails
Our guide to identifying phishing emails
How to Setup Whisper
A step-by-step guide to setting up Whisper, our anonymous reporting tool
Why does my school need online safety training?
Online safety just kind of happens... Right? Unfortunately not. Online safety training should be every school's priority, as it is a vital part of safeguarding and duty of care.
An Example of Phishing
A real-life example of phishing
How to Use Whisper
From submitting reports to responding and dealing with issues, this is the Whisper 101
What are Ofsted and DfE's expectations?
What standards do Ofsted and the DfE expect schools to meet when it comes to Online Safety?
Technical Phishing Prevention
Technological ways to prevent phishing
Whisper How To Video Guide Series
Follow our how to videos to know everything about Whisper
Human Phishing Prevention
Ways you can help your network users prevent phishing
Getting The Most Out Of Whisper
Here we give you some guidance on how to get the most from Whisper.
Work out whether the email you've received is genuine or phishing
Whisper Promotion Resources
Whisper is most effective when your community is engaged, we have developed a selection of resources to help you
Whisper Frequently Asked Questions
Have questions that need answers about Whisper? Read our up-to-date FAQs
Whisper Service Flowchart
A flowchart showing the Whisper Anonymous Reporting Tool workflow
Whisper Service Specification
A high level overview specifying how the Whisper Service functions, and how data is handled