Contact us

If you’ve got a story or event for the GPSJ website, e-mail Stuart Littleford at

May 2022
« Apr    


LGfL to bolster public sector online defences in response to National Cyber Security Centre alert to act now following Russia’s attack on Ukraine

“LGfL-The National Grid for Learning is set to bolster public sector online defences in response to the National Cyber Security Centre’s alert to act now following Russia’s attack on the Ukraine,” says John Jackson, CEO, whose organisation has stepped up its cybersecurity resilience package to include monitoring, identification, sandboxing1 and the eradication of ever-evolving threats from phishing attempts, malware, hacks, viruses and ransomware. LGfL has provided services to the public sector over many years and is approved by the governing bodies for the Public Service Network (PSN) and Health and Social Care Network (HSCN) to provide secure access to systems across the public sector, including central government systems.

Newly appointed as the only UK Platinum Partner for Malwarebytes, LGfL is using its significant group buying power to supply public sector bodies cybersecurity solutions at significantly discounted prices.

LGfL is also able to offer:

• Endpoint Protection (threat prevention)
• Endpoint Detection and Response (threat prevention, monitoring, sandboxing1, isolation, and rollback2)
• Endpoint Protection for Servers (threat prevention for servers)
• Endpoint Detection and Response for Servers (threat prevention, monitoring, sandboxing, isolation, and rollback for servers).

Using its Malwarebytes OneView console, LGfL will also be able to give third party support organisations (PSOs) greater visibility and control over what is happening across multiple sites. It will also be able to provide full information on licences issued/used through its OneView Portal.

For further information on LGfL’s cybersecurity resilience packages please contact Gareth Jelley at LGfL’s Cybersecurity Centre of excellence via

1. Sandboxing works by keeping potentially malicious programs or unsafe code isolated from the rest of the organization’s environment. This way, it can be analysed safely, without compromising the operating system or host devices. If a threat is detected, it can be removed proactively.

2. Rollback – rolling back changes to restore a computer to its previous state.

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>




This site uses Akismet to reduce spam. Learn how your comment data is processed.