Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Education

Campus Network Segmentation and Safeguarding Controls

Educational institutions manage open campus networks alongside sensitive research data, student safeguarding records, and financial systems. The culture of openness that enables learning also creates significant cybersecurity challenges.

Back to Control
Control

Education

When a student's personal device and the school's safeguarding database share the same network, every compromised student laptop is a potential path to the most sensitive data an institution holds.

100%

Safeguarding data isolation from campus networks

Zero

Direct paths between research and admin systems

4

Campus zones with independent governance

Full

DfE and Ofsted safeguarding evidence

The Challenge

Educational networks balance openness with protection.

Safeguarding Data Risks

Student safeguarding records, SEN data, and child protection information must be rigorously protected while remaining accessible to authorised pastoral staff.

Open Campus Networks

Universities and schools operate open networks for learning that also connect to sensitive administrative, financial, and research systems.

Research Data Theft

University research data, particularly in defence, pharmaceutical, and technology sectors, is targeted by nation-state actors for intellectual property theft.

The Scenario

Scenario: University Ransomware and Research Data Theft

Ransomware enters through a compromised student laptop on the campus Wi-Fi network. It propagates across the flat campus network, reaching administrative systems, research servers, and the student records database. The university loses access to exam results during clearing week, research data for three funded projects is encrypted, and safeguarding records for vulnerable students are exposed. With Firevault Control, the campus network is physically separated into student, research, administrative, and safeguarding zones. The ransomware cannot propagate beyond the student zone because the network paths to other zones do not exist.

"The ransomware came in through a first-year student's laptop. Twelve hours later, it had encrypted our research servers, our student records, and our finance system. We lost three years of PhD research data because the backups were on the same network."

Solution Blueprint

Physical governance for campus networks.

Educational institutions gain physical separation between open student networks and sensitive institutional systems. Safeguarding data is physically isolated with governed access. Research data is protected from network-based theft. Recovery from ransomware attacks is guaranteed through air-gapped archives.

  • Physical isolation of safeguarding data from campus networks
  • Governed access to sensitive student and research data
  • Multi-party authorisation for safeguarding record access
  • Independent management communications for incident response
  • DfE, Ofsted, and GDPR compliance evidence
  • Air-gapped recovery for research and institutional data
Fracture

Fracture — Emergency Campus Isolation

Module 1 of 4

Physically disconnects compromised campus zones to contain ransomware and prevent propagation into research, administrative, or safeguarding systems.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Data Sovereignty

All safeguarding and student data remains within the agreed jurisdiction in secured Firevault Bunkers, meeting DfE data handling requirements.

Safeguarding Access Controls

Access to safeguarding records requires authorisation from designated safeguarding leads with full audit logging.

DfE and Ofsted Evidence

Automated compliance logging supports DfE cyber security standards, Ofsted safeguarding requirements, and GDPR obligations.

Campus Cellular Management

Out-of-band management via cellular connectivity ensures governance capability independent of the campus network.

Safeguarding Audit Trail

Every access to safeguarding data is recorded in tamper-proof logs for regulatory inspection and child protection reviews.

Research Data Recovery

Air-gapped copies of research data ensure recovery of funded project work regardless of campus network compromise.

Demo to Live

Adoption Guide

Step 1

Campus Network Assessment

Map all network paths between student access, research systems, administrative infrastructure, and safeguarding data to identify segmentation gaps.

Step 2

Campus Zone Design

Design physically separated zones for student access, research, administration, and safeguarding with Control modules at each boundary.

Step 3

Department Pilot

Deploy in a representative faculty or department with full zone separation, safeguarding data governance, and compliance logging.

Step 4

Institution-Wide Deployment

Full deployment across the campus with air-gapped recovery, continuous compliance evidence, and cellular management capability.

Step 1

Campus Network Assessment

Map all network paths between student access, research systems, administrative infrastructure, and safeguarding data to identify segmentation gaps.

Step 2

Campus Zone Design

Design physically separated zones for student access, research, administration, and safeguarding with Control modules at each boundary.

Step 3

Department Pilot

Deploy in a representative faculty or department with full zone separation, safeguarding data governance, and compliance logging.

Step 4

Institution-Wide Deployment

Full deployment across the campus with air-gapped recovery, continuous compliance evidence, and cellular management capability.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy