Categories
Cloud advice

Road to Cyber Essentials: Android

This is the 8th part of my Road to CE series, in this post we’ll look at Android and fully managing Android. Microsoft + Android MDM is a lot easier than Apple, that’ll be coming up in the next post. Initial Setup First follow the instructions on Connect your Intune account to your Managed Google […]

Categories
Cloud advice

Road to Cyber Essentials: iOS

This is the 9th part of my Road to CE series, in this post we’ll look at iOS and fully managing iOS (iPhone/iPads), we’ll cover MacOS briefly as well for the initial setup, but MacOS will be a future post. Sadly Apple MDM in Intune isn’t as fluid as Android, but we’ll go through it. […]

Categories
Service announcements

New Jisc cloud professional services pilots

I’m excited to introduce two new services that Jisc cloud is seeking institutions to pilot with us: Microsoft Intune deployment accelerator pilot A project to demonstrate how to use Microsoft Intune so that you can confidently set the configuration and policies that will enable endpoint management. This will include mobile devices as well as laptop/desktop […]

Categories
News

OCRE Cloud Framework – projected UK savings pass £10 million

Framework performance The four-year pan-European Open Clouds for Research Environments Cloud Framework (OCRE) launched in January 2021, with the aim of accelerating the adoption of public cloud in the Research and Education community. Over 185 contracts have now been signed by UK institutions across a range of platforms, with projected savings to the sector in […]

Categories
Cloud advice

Road to Cyber Essentials: Defender for Identity/Azure Identity Protection

This is the  7th part of my blog series on the Road to CE series.  In today’s post we’ll look at Defender for Identity and Azure Identity Protection to assist with Cyber Essentials. One big area in Cyber Essentials is monitoring and removing access when a compromise occurs, Microsoft has tools built into Azure AD […]

Categories
Cloud advice

Road to Cyber Essentials: Winget/New Store Apps

Welcome to the 6th in the Road to CE series, this time we’re going to talk about Winget and the new application deployment methods in Intune.  Winget and the new Store deployment method are a key pillar in CE, ensuring apps are up to date.  This post was partially written with Bing Chat Compose. What […]

Categories
News

Assessment of coastline change over the last 38 years using satellite EO along Great Britain coast

This post is primarily for: IT managers and Researchers The British Geological Survey (BGS) Coasts and Estuaries team use innovative 4D simulation models and cost-effective monitoring approaches to quantitatively assess the effects of different adaptation options against coastal flooding and coastal erosion with an emphasis in the transition from traditional grey engineering to more green […]

Categories
News

Scalability made easy – exploring the regenerative power of animal cells thanks to OCRE’s cloud vouchers

This post is primarily for: IT managers and Researchers A research team at Department of Biological and Medical Sciences, Oxford Brookes University, conducts research on how animals can regenerate parts of their bodies after injury. The project focuses on the regenerative power of the cells of different species of worms, using single-cell sequencing techniques. The […]

Categories
Cloud advice

Road to Cyber Essentials: The Device Reports

This is the 5th part of my blog series on the Road to CE series.  We’ll be starting to look at using Excel to generate the report you need for Cyber Essentials.  Please note I’ll be specifically talking about AAD and Intune. In sections of your Cyber Essentials you need include a list of Devices, […]

Categories
Cloud advice

Road to Cyber Essentials: The Intune BYOD Controls

This is the 4th part of my blog series on the Road to CE series.  We’ll be starting to look at the technical controls inside of AAD and Intune to assist with Cyber Essentials.  Please note I’ll be specifically talking about AAD and Intune. As previous stated under Cyber Essentials you need to know the […]