Cloud Backup
 

We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Teachers on the receiving end of cyberbullying

Teachers on the receiving end of cyberbullying

posted in Cyber-Security ● 25 Jun 2015

A recent study by the University of Plymouth has shown that teachers too are the victims of online bullying from pupils and parents. In a survey of 400 primary and secondary school teachers nationwide, 35% of those teachers revealed that either they, or one of their colleagues, had been subjected to one form of cyberbullying by both pupils and parents.Professor Andy Phippen said, “From the research it appears that kids can be perpetrators as well as victims – the most shocking aspect is the level of parental abuse”. He continued, “It can affect teachers anywhere – from a small rural primary to a large urban secondary. Some parents view teachers as ‘fair game’ for abuse and use online technologies to hide behind while posting lies and abuse about their chosen victim.”Redstor E-Safety is an effective tool which silently sits in the background of a school’s network and monitors all content being posted, viewed and accessed. Using a pre-defined set of keywords controlled by the school to flag up as inappropriate, the e-safety service would record instances of a prolonged technology based bullying campaign as well as identifying those responsible. It’s not just the pupils who could be protected by our e-safety service.If you’d like to hear more about protecting the pupils and teachers of your school, please e-mail Redstor.

How third-party backup for OneNote and Class Notebooks avoids falling into non-compliance trap

If you use OneNote and Class Notebooks regularly, the prospect of waking up one day and finding that your notes have gone, is the stuff of nightmares.

Continue reading

5 ways to add real value to customers’ digital transformation initiatives by providing Kubernetes backup

Here we outline the five key elements CSPs and Azure consultancies need from a Kubernetes backup solution to add real value to customers’ digital transformation initiatives.

Continue reading

Microsoft 365 Security – An overview of best practices

The rise in home working, increase in laptops and wide-scale adoption of OneDrive, SharePoint , and OneNote has only served to intensify issues around data security and access.

Continue reading