Categories
Cloud advice

Road to Cyber Essentials: Winget/New Store Apps

Welcome to the 6th in the Road to CE series, this time we’re going to talk about Winget and the new application deployment methods in Intune.  Winget and the new Store deployment method are a key pillar in CE, ensuring apps are up to date.  This post was partially written with Bing Chat Compose. What […]

Categories
News

Assessment of coastline change over the last 38 years using satellite EO along Great Britain coast

This post is primarily for: IT managers and Researchers The British Geological Survey (BGS) Coasts and Estuaries team use innovative 4D simulation models and cost-effective monitoring approaches to quantitatively assess the effects of different adaptation options against coastal flooding and coastal erosion with an emphasis in the transition from traditional grey engineering to more green […]

Categories
News

Scalability made easy – exploring the regenerative power of animal cells thanks to OCRE’s cloud vouchers

This post is primarily for: IT managers and Researchers A research team at Department of Biological and Medical Sciences, Oxford Brookes University, conducts research on how animals can regenerate parts of their bodies after injury. The project focuses on the regenerative power of the cells of different species of worms, using single-cell sequencing techniques. The […]

Categories
Cloud advice

Road to Cyber Essentials: The Device Reports

This is the 5th part of my blog series on the Road to CE series.  We’ll be starting to look at using Excel to generate the report you need for Cyber Essentials.  Please note I’ll be specifically talking about AAD and Intune. In sections of your Cyber Essentials you need include a list of Devices, […]

Categories
Cloud advice

Road to Cyber Essentials: The Intune BYOD Controls

This is the 4th part of my blog series on the Road to CE series.  We’ll be starting to look at the technical controls inside of AAD and Intune to assist with Cyber Essentials.  Please note I’ll be specifically talking about AAD and Intune. As previous stated under Cyber Essentials you need to know the […]

Categories
Cloud advice

Road to Cyber Essentials: The Policies

This is the third in the Road to CE series, we’ll be talking about the written policies need to support Cyber Essentials, most of these will just be updates to existing policies. TLDR: Review and update your policies to enshrine the technical controls and accommodate for technical control feature lackings. If you don’t have an […]

Categories
Cloud advice

Road to Cyber Essentials: The Pilot

This is the second in the Road to CE series of blog posts following Jisc’s full Cyber Essentials journey. In this part of our journey, we had a meeting with senior stakeholders as well as our IT Security teams, explored the requirements for Cyber Essentials and how best to achieve those for Jisc and scoping […]

Categories
Cloud advice

Road to Cyber Essentials: The Start

Jisc are Cyber Essentials compliant, this will be a series of blog posts on how we achieved this. To start off you need to evaluate your digital estate, start small and expand from there.  Your IdP will be your biggest asset in assisting with CE, make sure your systems use your IdP for login, try […]

Categories
News

OCRE’s experience through researchers’ eyes

The OCRE Cloud Framework was created by the Open Clouds for Research Environments (OCRE) project consortium, which is led by GÉANT and forms part of the wider OCRE project. It is an OJEU-compliant procurement framework, enabling our members and customers to buy public cloud more easily and cost-effectively. Available under the framework are a wide […]

Categories
Cloud advice

Monitoring, backup and restore Microsoft 365 Tenant Configuration with Microsoft365DSC

Microsoft365DSC is an Open-Source initiative lead by Microsoft engineers and maintained by the community. It allows tenant admins to write a definition for how your Microsoft 365 tenant should be configured, automate the deployment of that configuration and ensures the monitoring of the defined configuration, notifying and acting on detected configuration drifts. It also allows […]