Recovery, Renewal, Resilience

Lessons for Resilience

Consider the digital literacy of teachers, and their capacity to teach children effectively in an increasingly digitized world
Topic:
Infrastructure
Keywords:
Telecommunications and digital
Content:

Computers and other digital devices are increasingly being used to teach children, and as part of children's education into today's digital economy. However, research shows that technology's impact on student learning has remained limited, partly because the rapid adoption of technology has not been accompanied by appropriate training of teachers. COVID-19 has demonstrated the importance of digital technologies. It is important that teachers have the capacity and capabilities to use emerging and new technologies, and to impart these skills onto students as they will be required to navigate and work in a digital world. Consider:

  • How to develop partnerships between schools and the technology industry to help teachers develop the skills they need to educate children effectively
  • How to offer and encourage teachers to undertake additional qualifications to support the curriculum e.g. Fujitsu's Certificate of Digital Excellence (CoDE) which is a free, online learning experience for teachers, which helps educate them on topics such as Artificial Intelligence, cyber Virtual Reality, Big Data and Programming and Robotics. Each of these has been recognised as a technology or skill needed by the next generation to help with their future careers
Source link(s):

Consider advising organisations how to enhance their cybersecurity
Topic:
Infrastructure
Keywords:
Telecommunications and digital
Content:

COVID-19 has meant organisations have had to rapidly innovate online. This has required them to embrace some unfamiliar digital tools. Those with a relative lack of skill or confidence in this unplanned digital transformation, are at heightened risk from cybercrime. Consider actions:

  • That determine an organisations’ confidence:
    • Gather information on the digital skills and confidence in businesses, and what they need to improve these
    • Raise awareness of the risks of cybercrime
    • Provide appropriate support to businesses as they innovate online
  • That organisations should implement now:
    • Secure remote access/ collaboration services
    • Increase anti-phishing measures
    • Address business continuity
    • Establish a culture of cyber hygiene by resourcing and managing/monitoring assets
  • That organisations should implement soon:
    • Understand your security and the effectiveness of controls
    • Put security actions into all decision making
    • Secure users’ confidence, and data, protect your brand
    • Prioritise security in budget allocations
  • That organisations should implement in the future (12 months):
    • Think longer term about security of processes and architectures
    • Prioritise, adopt and accelerate the execution of strict access control and security through virtual network functions
    • Automate to improve security of users, devices and data
Source link(s):

Consider disseminating good practice guidelines to safeguard against cyber-attacks
Topic:
Infrastructure
Keywords:
Telecommunications and digital
Content:

These should be disseminated to workers and to the public to protect people as many services go online. Consider:

  1. Using an updated firewall to provide barriers between data and cyberattacks; this should be done at organisational and personal levels
  2. Documenting and sharing cybersecurity policies including training, checklists and organisation-specific information
  3. Planning security for mobile devices include wearable technology which can include personal information. Ensure security updates and password policies are in place to any mobile device accessing the network.
  4. Providing training and education for all employees on risks and how to identify malicious activity i.e. phishing emails
  5. Regularly updating employees on protocols and security policy
  6. Encouraging changing of passwords every 60-90 days, and the use of complex passwords with combinations of uppercase letters, numbers and symbols
  7. Regularly backing up all data and checking the function
  8. Installing anti-malware software to mitigate phishing emails
  9. Using multifactor identification and virtual private networks (VPNs) to provide an extra layer of protection
Source link(s):

Consider training all staff about the risks of each technology application they use
Topic:
Infrastructure
Keywords:
Telecommunications and digital
Content:

Software and cyber experts can only do so much. Informed workers remain the best line of defence, and can ensure the resilience and safety of technical systems for recovery.

Source link(s):