Please Help Our Friend Caroline Coster

 Many of you will have met Caroline at one of our events. She provided many fantastic conference workshops over the years, helped launch Risks and Rewards and is a keen supporter of the use of technology in the classroom.


Caroline is also a tireless helper of others. For many years she has recycled jeans into fantastic handbags, phone and glasses cases, purses and soft toys. She has sold them at fetes, craft fairs and E2BN conferences to raise money for charities in Kenya. Over the years many people, both at home and abroad, have benefitted from Caroline's energy, enthusiasm and incredible generousity. 

Sadly, Caroline contracted CoViD19 in March and suffered complications that resulted in the amputation of her hands and feet. 

Caroline is supported by a loving family but in order to live safely at home her house needs to be adapted and she will need hand prosthetics in order to achieve some degree of independence. 

So I am appealing to the 'E2BN Family' to help Caroline by making a donation via her justgiving page where you can read the full story of her illness and recovery so far.

Please give as generously as you are able.

Many thanks

Kathy Olsson (on behalf of the E2BN Board and Team)

   caroline bags2


Top tips for supporting Child Mental Health

The Milton Keynes SEND team have produced a short guide to supporting child and adult wellbeing during the Corvid 19 pandemic. It includes top tips and links to organisations that provide support and guidance. Download the .pdf 

DfE Funding for schools set up G Suite for Education

Schools can now apply for Department for Education-funded support to get set up on G Suite for Education

From April 24th, schools and responsible bodies can apply for Department for Education-funded support to get set up on one of two free-to-use digital education platforms: G Suite for Education and Office 365 Education.  As an accredited Google for Education partner and provider of this support, we’re here to help. 


Why G Suite for Education?

G Suite for Education contains a free set of productivity tools for classroom collaboration. Accessible from any device, it is used by over 120m+ users worldwide and enables teachers and students to continue teaching and learning remotely. Google Classroom helps teachers to organise learning activity, hand out & mark assessments and provide structure for students learning at home. Teach From Home provides teachers with easy-to-use resources to get started with G Suite and how the tools can be used during this time. 


To find out more about whether G Suite for Education is right for your school, sign up to join our virtual office hours. 

Is your school eligible for funding?

Schools that do not currently have a digital education platform are eligible for funding. Schools that already have G Suite, but are not yet set up to assign work and communicate with pupils, are also eligible. 

What is included?

The funding will cover the cost of service to carry out:

  • End-to-end set up of G Suite for Education

  • Integration with your Management Information Systems to provision Google Classroom

  • Core security settings to support remote education

  • Creation of a central “remote learning hub” site for your school

  • Handover training for your school’s staff Apply for funding


We can help to carry out a safe, secure and professional set up of your platform, including sharing best practices on domain settings and feature enablement. 


If you would like to apply for funding you will need to visit the digital education platform hub to get the ball rolling. We would encoursgae you to select our partner, Levett Consultancy, as your preferred supplier on the Deployment Support Request Form.

Develop students cyber skills

The National Crime Agency (NCA) has partnered with Cyber Security Challenge UK (CSC UK) to give students free access to ‘CyberLand’ from 1st May 2020.
CyberLand is a virtual city which provides gamified modules teaching the fundamentals of cyber security such as firewall configuration and digital forensics. There are 16 interactive exercises which are suitable for 12-18 year-olds.

The resources are designed around the concept of protecting ‘CyberLand’ from a cyber-attack and can be accessed here:

A key aim of this initiative is to provide a safe environment for young people to develop their cyber skills whilst mitigating the risk of them inadvertently committing cyber crime offences.

These exercises will be free to access over the coming months to those who wish to develop cyber skills.

The CyberLand Product also contains a module on the Computer Misuse Act 1990, which aims to educate the target audience on the laws governing the cyber landscape. It also signposts them to more positive pathways such as opportunities linked to their digital skills.

These resources should not be regarded as appropriate only to students who are interested in computer science, IT or related subjects. The level of access to ‘CyberLand’ is set to ensure broad appeal and engagement.

It would be appreciated if you could circulate this to schools and if appropriate, directly to students.

Zoom- Important Safeguarding Update

Janet CSIRT would like to bring to your attention some recent reports in relation to Online Video Conferencing Platforms we have seen.  Due to the restrictions related to Covid-19, the use of online video conferencing has seen a significant increase and understandably, organisations are trying to facilitate as many of their previous services and interactions in an online format.  However, as with many good intentioned endeavors to include as wide an audience as possible, the opportunity for exploitation exponentially increases with it.  We are aware of "Zoom" meetings being specifically targeted by malicious ‘raiding’ groups and so this information should be considered when using such software.

Many conferencing platforms offer the opportunity to host meetings without the need for any other verification other than the link or meeting ID number. In efforts to appeal and incorporate as many individuals as possible, such Meeting ID and Links are publicly shared.

We have received reports over the last few days alerting us to Video Conferences which have been joined by individuals whose sole intent is to cause disruption and distress and upon joining a video conference have then proceeded to display indecent, potentially illegal imagery to the other participants which could constitute an offence under Section 1(1)(b)of the Protection of Children Act 1978.

Therefore we would suggest that you consider cascading the following points and sources of advice to any organisation individuals that may be responsible for hosting/arranging online conferencing in order that requisite safety precautions can be implemented to minimise the risk of such occurrences becoming more widespread.

* Ensure that Meeting Passwords are required to join and that they are not published in an uncontrolled manner.

* Don’t use social media to share conference links as malicious groups can search social media for these meeting ID/links.

* Use the “Waiting “Room” feature to have participants wait until the host arrives and vet participants prior to entering the meeting.

* Limit screen-sharing ability to the host. Using the host controls at the bottom.

* Turn off file transfer: In-meeting file transfer allows people to share files through the in-meeting chat. Toggle this off to keep the chat from getting bombarded with unsolicited pics, GIFs, memes and other content.

* Disable private chat: Zoom has in-meeting chat for everyone or participants can message each other privately. Restrict participants’ ability to chat amongst one another.  This is really to prevent anyone from getting unwanted messages during the meeting

*Allow only signed-in/Registered users to join: If someone tries to join your meeting and isn’t logged into a Zoom account, they will receive the message ‘This meeting is for authorised attendees only’.

*Zoom meeting host logging does have IP logging that can record attendees and that IP data can be used to report abuse.

Below are some further sources which detail some of the points listed above:-

If anyone has any further information or would like some additional advice then please contact Jisc at  This email address is being protected from spambots. You need JavaScript enabled to view it. or us at This email address is being protected from spambots. You need JavaScript enabled to view it.


Latest from the Blog