Cybersecurity NZ

Not if, but when. Ransomware on the rise.

chanel rawiri

Make your organisation cyber resilient.

The excerpt will automatically add to here. Do not edit this block.

Protecting your organisation starts with protecting your data.

Ransomware. It wasn’t that long ago that it was a thing that happened to other people, often the big corporates, the blue chips in America. But not us in little old New Zealand/Aotearoa. We would occasionally hear it mentioned on the news in passing, or on page 10 of the paper. Leap forward to 2021, the year of COVID-19, of lockdowns and the now ubiquitous phrase ‘you are on mute’. The number of attacks made public on local organisations has increased. The biggest single target being the Waikato DHB. They estimate it taking another 2 years before they are back to where they were. 

And at the start of July international software company Kaseya had their remote management tools hijacked to deliver ransomware to unsuspecting victims. This new development is concerning, because the end users did not do anything wrong, nor did the support organisations. 

So what can we learn from these high-profile attacks, and what steps can we take to reduce the risk you are next? The number one thing to do if you haven’t already is to turn on multi-factor authentication (MFA) for all system administrators at a minimum, and preferably all staff. If you have a software platform that doesn’t support MFA you need to be asking questions of the vendor. If you have the choice of methods, using an app on your phone is top of the list, followed by a third party rotating key token (banks often use these). The worst options are receiving an email or text message – neither of these two options are secure. 

Ensure you are backing up your data. This includes Office365 and Google Workplace content. Not all backups are created equal though. Your backups should be going to an offsite location, retained for at least 60 days, and tested. It is no good making a copy of everything to a local hard drive if there is a fire! And no good backing things up if you cannot restore it. In the ideal world backup systems would be air-gapped from the source, and write permissions only allowed to the backup solution. These backups should be monitored and any anomalies investigated. Its common for attackers to quietly infect a system, then wait a month or more for all backups to also be infected before attacking. Look for larger than usual backup sizes, and odd looking content. Artificial Intelligence (AI) bots exist that can do this for you. For those with on-premise servers, ensure your DNS and Active Directory are included in the backups, and ideally locked away separately in a vault (software or physical) so you can quickly recover your infrastructure. 

Review who has access to what. You shouldn’t have more than three super-admins/global admins in any system, and these should be protected with MFA. Also review who has remote access into your systems, either using a VPN or some other method. Separate out the different administrative roles so breaching one account will not open the floodgates. 

Microsoft have a global threat activity website that shows cyber-threat activity for the last 30 days. Disturbingly education makes up of 60% of all recent encounters. 

Cyberthreats, viruses, and malware – Microsoft Security Intelligence 

Subscribe to our newsletter

Subscribe to Cyclone news to keep up to date with new technology, current trends and future thinking.


Aaron Overington
written by our very own

Aaron Overington

Aaron is an IT management veteran with over 20 years experience under his belt, but his passion for technology started even further back in the early days of desktop computing with the ZX Spectrum, the Amiga and the BBC Micro.

Aaron is a key part of the Cyclone team and works as one of our Technical Account Managers, we simply know him as a trusted advisor and a safe pair of hands. Aaron takes the time to understand the demands and needs of NZ businesses and schools before developing tailored solutions.


connect with aaron on linkedin

It’s ugly out there, people. Good security starts with you.

chanel rawiri

Avoid the hook.

The excerpt will automatically add to here. Do not edit this block.

Staying secure in the modern world

Halfway through the 2021 academic year, and we are still hearing of phishing attacks on schools at all levels throughout Aotearoa. There was a time were only the big global companies were targeted by these attacks. The recent attack on the Waikato DHB should be, and has been, a wake-up call for all organisations. One thing that strikes me when visiting schools is the lack of awareness posters up on the walls. Nothing in the staff room, nothing in the hallways, nothing in the learning spaces. 

For me this is concerning. Most if not all schools have some form of a Digital Citizenship programme they run for students. Part of being a good digital citizen is knowing how to keep safe online. Being able to identify a phishing email, learning to not download an application from a random Internet site, or clicking on links in instant messages is central to this (ISTE standard 2B for students relates directly to this very point). 

The risks that these types of attacks can introduce can be broadly categorised into one of two buckets; ransomware , where all your files are encrypted and you cannot access them without paying the hijackers, and theft where either your data is stolen to be sold on the dark web, or you are tricked into paying phoney invoices.  

Ransomware attacks are growing. Imagine being at the end of a school year, your students have worked hard all year on assignments, and suddenly they are no longer available for final grading or revision for external exams.  

Arguably worse than a ransomware attack is the theft of data. Schools hold a large amount of personally identifiable information (PII) about staff and students, from home addresses to medical information.  All this information holds a value, whether for identity theft, online bully or worse. 

Being tricked into sending school funds to bad actors is still a very real risk, despite years of publicity around the tricks used. A request to purchase 100 iTunes cards for example, or a request from the ‘principal’ to urgently pay the attached invoice should set off alarm bells. The sad reality is it doesn’t always. 

We live in an always-on world, connected across multiple online platforms. The ease in which we share content and connect to friends and colleagues has exploded in the last 5 years. Unfortunately this connectedness allows the attackers to understand the hierarchy at a school, the movements of staff and tailor their messaging accordingly. And because so many transactions are now done online, seeing an email from your favourite online store offering a special deal is accepted with glee, not scepticism.  

Awareness of how to identify a phishing or bogus email can reduce the chances of a user falling for it and introducing an external threat. Better still, awareness and on-going training and assessment that is targeted to the whole school community. The cost to implement these steps starts at $0.  

Ask yourself, what is the financial and reputational cost to do nothing and be compromised?  

Aaron Overington
written by our very own

Aaron Overington

Aaron is an IT management veteran with over 20 years experience under his belt, but his passion for technology started even further back in the early days of desktop computing with the ZX Spectrum, the Amiga and the BBC Micro.

Aaron is a key part of the Cyclone team and works as one of our Technical Account Managers, we simply know him as a trusted advisor and a safe pair of hands. Aaron takes the time to understand the demands and needs of NZ businesses and schools before developing tailored solutions.


connect with aaron on linkedin

Our Top 6 Security Recommendations

chanel rawiri

Meet the security challenge with eyes wide open.

The excerpt will automatically add to here. Do not edit this block.

Staying secure in the modern world

The recent hack of the Reserve Bank of New Zealand – Te Pūtea Matau (RBNZ) highlights that even central governments struggle with cyber security. Cyber crime is on the rise, and COVID-19 has provided a rich array of new opportunities for the criminal world. There are a number of things that you can do to mitigate some of the risks, and become a harder target. 

Here are our top six security recommendations that every individual and organisation should be adopting. 

  1. Always keep the system software updated. This is the software on your laptop, tablet and phone as well as any network equipment such as routers and modems. The breach at the RBNZ was due to outdated software on a network appliance that they had not maintained and patched. The bad agents used a flaw in the software to gain access. Had they kept this updated they may not have been breached. 
  2. Use Anti-virus software. And keep it updated. There are almost daily updates to most AV products to keep you safe and secure. No operating system is immune to virus attacks, and contrary to popular belief there are now more viruses and malware for MacOS than Windows. 
  3. Use disk encryption. Encrypting your hard drives and USB drives will render them useless if they are lost or stolen. The contents are unreadable if someone trys to access without first decrypting. Both Windows 10 Pro and MacOS have built-in support for drive encryption and it is a very simple process to turn on. We hope that the devices stolen from Capitol Hill in January were encrypted!
  4. Use MFA. Using multifactor authentication provides an additional layer of protection to your accounts. Most applications now support the use of MFA (sometimes called 2FA) and a mobile app. It is a simple yet effective way to add extra security to your applications as without it attackers cannot access a system, even with your username and password. TIP: DO NOT use SMS/Text as a secondary authentication method. It is easy for someone to spoof your mobile number and intercept a message. 
  5. Run Phishing simulations and training. The easiest way for someone to get into your systems is if they know your username and password. It is very easy for someone to craft an email purporting to be from a trusted persons or company, and tricking you into handing over your credentials. There are a number of tools available to run these simulations and to block phishing emails. 
  6. Use Data loss prevention policies. Both Office365 and G Suite have policies available with all subscriptions. The key is to really know your data; where it is, who should have access, and how sensitive it is. Then you can easily develop policies to prevent your data from leaving your environment without your knowledge. 

Talk to us today about how we can support you to secure your environment using these and other tools. 

Aaron Overington
written by our very own

Aaron Overington

Aaron is an IT management veteran with over 20 years experience under his belt, but his passion for technology started even further back in the early days of desktop computing with the ZX Spectrum, the Amiga and the BBC Micro.

Aaron is a key part of the Cyclone team and works as one of our Technical Account Managers, we simply know him as a trusted advisor and a safe pair of hands. Aaron takes the time to understand the demands and needs of NZ businesses and schools before developing tailored solutions.


connect with aaron on linkedin

Protecting your data

Protecting Your Organisations Data

chanel rawiri

How much is your data worth and can you protect it?

The excerpt will automatically add to here. Do not edit this block.

Protecting your valuable data

Data is a valuable currency and the ultimate goal for cybercriminals. If you own an organisation’s data and intellectual property, you can bring the business to its knees. By breaching the company’s defences and locking up its data, cybercriminals can exploit businesses for a hefty ransom to retrieve their data and avoid the financial and reputational damage that goes along with being breached.

It’s not only businesses that are at risk of financial exploitation. An individual employee’s identity alone is valued at around US$1,200[1]. However, that’s just the tip of the iceberg considering that a successful cyberattack could result in:

  • Appropriation of resources: cybercriminals often use vulnerabilities in the network to infiltrate systems and use information that can be repurposed to create things of value, such as scams. By co-opting organisational data, such as internal email signatures, cyberattackers can create phishing emails to exploit other victims using your organisation as a proxy.
  • Clients and suppliers transferring funds to bogus accounts: phishing and spear phishing attacks can exploit your email information to expose your customers to vulnerabilities. This can lead to customers sharing details and finances with cybercriminals using fake accounts and posing as employees of your company.
  • Impact to financial credentials: cybercriminals can access company credit cards and bank accounts, which can cause financial losses and damage.
  • Theft of intellectual property: cyberattackers that infiltrate your system or deploy ransomware can access sensitive data and information from within your organisation. This can be used to blackmail your organisation, or be sold through the black market, for monetary gain.
  • Ransom demands: armed with sensitive company and customer information, cybercriminals can further exploit organisations by requesting payment for the return of locked up data.
  • Company information used for unlawful purposes: in addition to financial exploitation, criminals can also exploit confidential information for other means, such as corporate espionage. This can involve company secrets or intellectual property being sold to other competing organisations or used for other illegal activities such as fraud.

It’s essential that organisations invest wisely in tools and technologies to keep their valuable information safe from cybercriminals. To protect company information, organisations must integrate processes like advanced email threat protection, multifactor authentication and employee cybersecurity training into their operations. They should also invest in network security tools, such as perimeter security, to provide the best defence possible for the network. However, there is a fine balance between investing in the right level of protection for your organisation, and over-investing in solutions that may not deliver the best security advantage for your business.

Cyclone has identified four key capabilities your cybersecurity solution must deliver to best protect your organisation and its valuable information in our latest checklist. For more information, download your copy today or contact the Cyclone expert team for a personalised consultation on how best to protect your organisation

[1] https://www.top10vpn.com/research/investigations/dark-web-market-price-index-2019-us-edition/


Top three cyberthreats

Top Three Cyberthreats For NZ Organisations

chanel rawiri

What are the top three cyberthreats and how can you prevent them?

The excerpt will automatically add to here. Do not edit this block.

Preventing Cyberthreats

There has been a significant increase in targeted cyberattacks on organisations since COVID-19, and these attacks are unlikely to subside any time soon. In fact, the rapid growth of smart devices used to access organisational tools and information, and the prevalence of employees working remotely, will only broaden the attack surface for cybercriminals in future.

Today, there are thousands of cyberthreats that pose a risk to businesses.  With a cyberattack occurring every 39 seconds on average it’s a matter of when, not if, your organisation will be targeted by cybercriminals. [1]  There are three key threats that pose the greatest risk to organisations today:

Top Three CyberThreats

  1. Email based threats and exploitation

Cybercriminals have been using email to exploit victims for a long time. However, gone are the days when you could easily identify a financial scam after receiving an email from a ‘prince’ in a foreign country. Cybercriminals have become more sophisticated as our technologies advance, and the ways in which they exploit victims has changed. Some of the most common attacks include:

  • Phishing: phishing is possibly the most common form of cyberattack. Phishing emails appear to come from a reputable source, and typically include requests to click a link or open an attachment.
  • Spear phishing: a more sophisticated form of phishing, spear phishing is more targeted and may appear to come from someone within the target’s own network, making it more likely that the recipient will fall for the scam.
  • Ransomware: a form of malware that encrypts files, ransomware is commonly sent via phishing emails and downloads to the victim’s device once opened.

As these attacks are common, there are reasonably simple ways you can defend your organisation. First, it’s important to install tools that protect the organisation and prevent data loss, such as advanced email threat protection software. It’s also essential to invest in education for your employees to ensure they understand cyber risks and how to identify scams and threats. Consider conducting regular training sessions with all employees and sending regular mock phishing emails to workers to keep them vigilant against threats.

  1. Hacking

Hackers will typically access your organisation’s network via ransomware or exploiting security vulnerabilities in your system. This opens your organisation to great financial and reputational risk, as well as potentially exposing your customers and partners to risks as well. Having multiple layers of defence is the most effective way to strengthen your organisation’s security posture and reduce the risk of failure in network security. Multiple layers of protection mean that, if one layer fails, another can sure up the organisation’s security. This involves investing in technologies like firewall and network protection to provide a privacy and security environment that both your employees and customers can trust.

  1. Data leakage

The rise of remote-working practices in 2020 has greatly increased the risk that employees pose to organisational security. The prolific use of external smart devices that need encryption to connect to organisational networks have increased the attack surface that can be exploited by cybercriminals, as well as the number of potential points of entry that can be breached. To defend against data leakage through risky access points, it’s essential to invest in multifactor authentication to protect devices and applications. The IT team also needs a comprehensive, up-to-date list of all devices connected to the organisation’s network.

Identifying the right tools and technologies to protect your organisation from a breach and defend it against cyberattack can be complicated. There are four key capabilities to look for in a cybersecurity solution. For more information, download Cyclone’s free checklist today, or contact the Cyclone expert team to discuss the safest and most cost-effective cybersecurity approach for your organisation.

[1] https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds


A-Z of Classroom Technology for 2020

chanel rawiri

IT can spark greater interest in subject content

The excerpt will automatically add to here. Do not edit this block.

Leveraging the capability of technology in the classroom can transform learning experiences and student engagement. From lesson planning to collaboration, IT can spark greater interest in subject content.

HP devices with Intel® can help students access online learning resources and encourage active participation, with 73% of teachers reporting that technology enables them to respond to a variety of learning styles in the classroom1.

At Cyclone, we’ve compiled an A-Z list of classroom technology for 2020, so you can get a better understanding of the disruptive IT that’s changing the way students learn.

A – Augmented Reality (AR)
Digital elements like images and videos integrated into real-world environments, promoting creativity and engagement.

B – Blogging
Encouraging blogging in the classroom can help build writing and communication skills.

C – Connectivity
Fast and robust connectivitywithin schools enables collaboration between both students and teachers.

D – Devices
Laptops, computers, tablets and mobile provide students the tools they need toseamlessly work and meet learning objectives at both home and school.

E – E Learning
Creating a digital learning environment that embraces thinking and sharing beyond paper and talk.

F – File Sharing
Students can easily share files and content through online platforms like email, digital portfolios, Teams and G Suite.

G – Google Classroom
A network-based school classroom management system to boost collaboration and foster better communication between teachers and their students.

H – Hardware
Deploying robust hardware can support learning and teaching outcomes for your school.

I – Interactive Platforms
Using collaborative platforms that provide for the student voice in their interactions with applications and other users.

J – Joy
Foster JOY in the classroom – students often learn and interact differently from their teachers – don’t overlook the joy that comes learning in ways that address their needs too. .

K – Knowledge
Support knowledge and learning growth usingdigital tools to access live current and live information.

L – LCD Projectors
Connecting digital devices to external wall displays enabling clear, high-resolution videos, images and textso all students can simultaneously view subject content.

M – Multimedia
Using more than one medium of communication i.e. video, sound, animations, AR to create an engaging learning experience.

N – Network
Never underestimate the power of your network! Ensuring your school’s wireless network is secure and can perform seamlessly is crucial to supporting the learning environment.

O – Online Class Calendar
Leveraging online calendar applications can help teachers manage busy class schedules, coordinate lesson plans and share activities with parents.

P – Podcasts
A great example of audio media that can educate students on a range of topics, content and stories. Consider students creating and sharing their own learning outcomes.

Q – Query
Student queries can be answered faster with collaborative devices and online messaging platforms.

R – Recording
Students and teachers can use video equipment to record, createand editpresentations to share with others.

S – SAMR
A significant pedagogy underlying the digital technology adoption and illustrating the progressive adoption and use by students and teachers alike (Substitution, Augmentation, Modification, Redefinition)

T – Tablets
Tablets can enrich classroom learning with their portability and easy-to-use nature. Their ability to accept a digital pen/ pencil as an input enhances the way users interact with their device.

U – USBs
Are no longer needed! Leverage the capabilities of the CLOUD!

V – Virtual Reality
VR can elevate student engagement and immerse them in new experiences. With the ability to explore 3D of objects, it brings a whole new level of learning to the classroom.

W – WiFi
Having a solid WiFi solution helps with real-time collaboration and accelerates the sharing of information.

X – XaaS
Schools canutilise an as-a-Service model, like DaaS (Device as a service), for tailored end-user experiences, hardware management and security solutions.

Y – YouTube
An online platform teachers and students can use to watch and publish their videos about different subjects, topics and stories – a way to globally share their learning outcomes.

Z – ZZZ
Don’t sleep on how much technology can transform the learning experience for teachers and students.

At Cyclone, we believe technology can empower all levels of a school’s learning system that’s why we offer comprehensive IT managed services across the education sector.

If you want to know more about classroom technology, don’t hesitate to contact a friendly Cyclone representative today.


3 Ways to Ensure Data Security in Schools

chanel rawiri

Keep your staff and student data protected

The excerpt will automatically add to here. Do not edit this block.

While technology enhances learning experiences for both teachers and students, keeping it secure can be challenging. As cyber threats become more sophisticated, schools must be looking at methods to keep their IT and their staff and student data protected.

With 81% of students using desktops, laptops or tablets at least once per week in school 1, schools need robust infrastructure supported by comprehensive security strategies.

From educating students and staff on how to identify a cyber threat to implementing effective DR policies, there are several ways that you can ensure the security of your school’s data.

Endpoint Security

Protecting endpoints like computers, tablets and smartphones are critical to combating threats. Teaching students about security awareness and how to spot ransomware when accessing websites is a way that you can stay ahead. Implementing endpoint management services with remote monitoring and preventative maintenance can also ensure that your school is protected from every angle.

DR 3-2-1 Backup

Data is one of your school’s biggest assets that’s why having an efficient backup and recovery strategy is essential. A 3-2-1 backup rule is recommended by backing up 3 copies of data, 2 types of media and at 1 different location. Following this process using a combination of backup storage solutions can effectively secure your school’s data and provide peace of mind across your IT environment.

Network Security

Your school’s network is the backbone of the learning experience, it always needs to be accessible for students and staff. Looking at your networking holistically allows your school to identify gaps and implement a strategic plan. Configuring your network to ensure that you have visibility across device usage can help keep your data safe. Monitoring outgoing traffic and setting up security alerts can also help combat a potential attack before it occurs.

At Cyclone, we can help schools integrate comprehensive security strategies across their IT environment with HP devices and Intel®. With over 60 specialist staff, our managed services team can provide solutions that facilitate learning outcomes and goals. If you’re interested in learning more about data security, don’t hesitate to get in contact with a friendly Cyclone representative today.

 


1 Why schools need to ramp up their cybersecurity measures, Jon McGettigan, Future Five New Zealand 2017.

Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.


7 Ways Teachers Can Leverage VR in the Classroom

chanel rawiri

Leverage VR in your classroom

The excerpt will automatically add to here. Do not edit this block.

65% of students in today’s classrooms will work in jobs that don’t exist yet. With that in mind, forward-thinking educators are recognising the value in using emerging technology like virtual reality to provide an immersive learning experience and prepare students for the future.

When used in a classroom setting as an instructional tool supplementary to conventional education, VR supports more holistic learning and enables children to immerse themselves in the learning process.

Although it has yet to reach its full potential, there are already a number of real-world use cases for virtual reality – and education is one of the most promising. Here are some of the way’s VR is being used in the classroom to improve the learning experience and learning outcomes.

1. To learn about science and the world

When it comes to learning about the universe, the body and scientific phenomena, virtual reality can offer students the chance to explore new and often complicated concepts in an immersive setting.

2. To go on a virtual excursion

Simulations, interactive games and visual representations of data are great tools to help students understand everything from the fundamentals of science to the building blocks of the body and the structure of the solar system.

Whether it’s to explore lost civilisations, other cultures or famous geographical landmarks, virtual reality allows students to “travel” to places from past and present. In the same vein, VR can be used to take “tours” of museums all over the globe. The possibilities for VR school excursions are virtually endless and, when supplemented with educational resources, offer an excellent learning opportunity while keeping students engaged.

3. To learn about history

Imagine stepping onto the moon with Neil Armstrong or watching as the Berlin Wall crumbles before your eyes. Virtual reality is an ideal medium for giving students a taste of history in a way that’s infinitely more memorable than reading about it on paper.

4. To experience different careers

For older students, virtual reality can be used to spend a day in the life of a surgeon, engineer, firefighter, musician or any other professional field to get a first-hand insight into what a career in that industry would look like.

5. To explore literature

VR technology gives teachers new ways to teach students about important works of literature in a way that’s compelling and easy to digest. For example, virtual environments can be crafted to recreate key scenes from a famous novel, and entire works of fiction can be recreated as an interactive gaming experience using technologies like the HP Mixed Reality Headset.

6. To enhance distance learning

VR has huge potential for remote students by enabling real-time collaboration and feedback between student and teachers. Conferencing applications can be used to deliver lectures, while students can interact and share ideas in a virtual environment.

7. To assist students with special needs

Virtual reality can be utilised as an assistive technology for students with learning disabilities by providing a virtual environment in which students can safely practise real-world skills. For example, students can do activities and take trips to places that they may not ordinarily be able to take part in due to accessibility concerns or other issues.

Interested to learn more about the potential for virtual reality in the classroom with HP devices and Intel®? Get in touch with a Cyclone expert.


Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.


Mobile Device Managers

chanel rawiri

Q&A with mobile device managers

The excerpt will automatically add to here. Do not edit this block.

Mobile devices are great tools for the classroom, providing students with new ways to learn. Although effective in many aspects, making sure they are used productively can be a challenge, with students being able to access websites unrelated to what’s being taught.

Deploying a Mobile Device Management (MDM) solution is one way your school can ensure devices are being used efficiently and safely.

At Cyclone, we’ve put together a Q&A so you can get a better understanding of MDM and the benefits it can provide to your school.

What is MDM?

Mobile Device Management (MDM) is deployable software that allows IT administrators to monitor, control and enforce policies across devices such as smartphones, tablets and other devices. As a core component of mobility management, it provides security assurance, flexibility and lower equipment costs for schools.

Is it just for school owned devices or also for BYOD devices?

MDM can be deployed across both school-owned and BYOD devices. Depending on a school’s needs/device fleet, an MDM solution can be customised to meet specific educational outcomes. Simplicity is key when approaching MDM platforms which is why it’s important to align your selection to your school’s overall IT strategy.

Why do schools want it?

There are many reasons a school may want to leverage MDM. From the capability to manage devices remotely to delivering the right applications/digital content to the student’s device. With ‘bring your own device’ (BYOD) an emerging trend, MDM also provides greater security and protection of data and IT infrastructure.

Why should schools deploy it?

While mobile devices allow schools to expand the classroom/ learning context, they also give students more opportunities to access inappropriate online content and expand the number of potential network vulnerabilities 1. Deploying MDM gives security assurance across a school’s device fleet while supporting mobility in student learning. Alongside this, IT leaders and teachers get autonomy over what kinds of applications get used within classrooms.

What are the potential advantages of MDM?

  • Greater autonomy with a full suite of management tools and applications
  • The ability for a school to “push out” content and applications to student devices
  • Significantly reduced device deployment and updates time for school administrators
  • Ability to focus student attention to single application
  • Ability to lock the device in a classroom environment
  • Ability to share work between groups of student screens
  • Monitoring and reporting functions across a device fleet
  • Remote management capabilities with power to disable or remove unauthorised applications and users.

Can teachers leverage MDM tools or is it solely an IT admin function?

MDM systems can be tailored for teachers to use as a tool in the classroom. Educators can utilise MDM attributes to limit access to specific applications, secure testing environments and smoothly transition from one activity to another.

Navigating what device management solution is right for you can be challenging. At Cyclone, we’re proud to partner with HP Intel® to deliver comprehensive IT managed services and solutions. If you’re interested in MDM and want to learn more, don’t hesitate to contact one of our friendly staff today.


1 K–12 Schools Need Strong Mobile Device Management Services, 2019, Eli Zimmerman, EdTech, https://edtechmagazine.com/k12/article/2019/10/k-12-schools-need-strong-mobile-device-management-services-perfcon

Talk to us today to help with the solutions that are right for your business.

Our office hours are 8.30am to 5pm Monday to Friday. Give us a call on 0800 686 686 or email us with the form below.


Microsoft Power Apps

chanel rawiri

Build your own App!

The excerpt will automatically add to here. Do not edit this block.

What you can learn:

  • Learn and develop your Power Apps and Power Automate skills
  • Explore and create in a full-featured environment for development
  • Build apps on a single, extensible view of your data with the Common Data Service

Find out more

Talk to us today to help with the solutions that are right for your business.

Our office hours are 8.30am to 5pm Monday to Friday. Give us a call on 0800 686 686 or email us with the form below.