Whether they’re finding images of bats for an information report, gathering statistics for an upcoming speech, or reading about the recurring motifs in ‘The Great Gatsby’, the internet is an incredible resource for ākonga of all ages. Of course, it also has downsides...
Blog & News Media & Press
How DNS Threat Protection helps make the internet safer and more secure
When you go away on holiday, you don’t just shut the front door and leave – you secure all doors and windows, turn on any alarms or cameras, lock your gate and even ask a neighbour to keep an eye on the house while you’re away. Setting up a safer, more secure network...
Help your ākonga search safely
Nervous about what your ākonga might stumble across in their online research? SafeSearch can help you screen out inappropriate content before it pops up in search results. Most schools and kura want their ākonga to use search engines to find information or help with...
Minimise disruption with DDoS protection
In the online world there are numerous types of cybercrime, some types of cybercrime are more subtle than others. One example is DDoS attacks. Unlike malware or ransomware attacks, which use malicious software to cause harm, DDoS attacks use high volumes of seemingly...
Mt Roskill Intermediate: smarter security
Learn how Mt Roskill Intermediate created a more secure learning environment with N4L’s Secure Access – and how your school could do the same. Everyday Mt Roskill Intermediate’s 600 ākonga use technology to enrich their learning – something that’s long been a focus...
How to stay safer when using the Internet of Things at your school
Before the internet, the idea that objects like lightbulbs, heaters, and locks could be controlled from a phone or computer seemed like something from the pages of a science fiction novel. However, our daily lives are now full of things that connect to the internet,...
Ramping up cybersecurity for New Zealand schools
A peek into our new threat protection platform Schools and kura are caretakers of sensitive and valuable data, with wide networks, hundreds of devices, and users with varying tech proficiency and confidence. Protecting your networks and your users requires powerful...