IT security - overview
How would you cope if your IT system failed or was breached? We cover the main IT security issues and how to protect against them.
START-UP AND SME RESOURCES
How would you cope if your IT system failed or was breached? We cover the main IT security issues and how to protect against them.
How would you cope if your IT system failed or was breached? We cover the main IT security issues and how to protect against them.
From customer details to financial records - your business will have lots of important data. We look at how you can protect it, wherever it is stored.
Security and anti-virus software plays an essential role in protecting your company’s servers and computers. Our overview looks at the main options.
An IT security plan is key to protecting your IT system from security threats. This summary explains why and how to create a security plan.
The internet can be the single largest security risk to your business. Our summary explains how to protect your business online threats.
If your IT system failed, could you carry on working? Our introduction to continuity planning and backups can help you cope in the event of a problem.
Data protection helps secure your key business data and comply with the rules. Our overview looks at data protection rules and how to protect data.
Data backups are essential to your business and an important part of disaster planning. But what methods should you use to back up your critical data?
You’ve spent months building your website. Have you checked for common security problems that could leave your website open to a preventable attack?
Security and anti-virus software is a key component of your company’s IT security strategy. It protects your computers, servers, software and data.
Good data security means understanding what data you hold and how you store and use it, as well as having robust security procedures. Our guide.
Small businesses can no longer justify ignoring the online risks of fraud. These tips show you how to prevent fraud on a tight budget.
Protecting your IT system and the information it holds is essential to avoid a catastrophc systems failure or data loss. Business IT security basics.
IT security is a serious issue for any business holding sensitive personal information or data. We answer the most frequent IT security questions.
The content your business creates can be of significant value. So, how can you check whether it is being plagiarised and what can you do to stop it?
You know it’s a good idea to have security and anti-virus software on your computers. But, do you need security software for your mobile devices too?
The survival of your business may one day depend on the data backups you took to guard against IT equipment failure, data loss or malicious hacking.
There has been a revolution in where, when and how employees work. Companies are now facing the challenge of keeping their data safe and backed up.
Your IT system is made up of connected parts. Failure of any of these parts could make it difficult – or, in some cases, impossible – to operate.
Performing an IT security risk assessment helps you understand and quantify the risks to IT in your business – and the possible consequences.
Regardless of whether you have a network of computers or just one PC, you need to protect your systems from a range of IT threats.
As more businesses issue laptop computers and remote working becoming increasingly popular, what happens if the files and data get stolen or lost?
A business continuity plan helps your company keep working if things go wrong with your IT. And it can take you as little as 20 minutes to write.
Mobile phones have more capabilities than ever and the risk of data loss from phones has dramatically increased. You need to protect that data.
Allowing employees to use their own devices for work can put sensitive work data at risk. How to create and enforce a BYOD policy.
Cloud computing can be efficient and cost-effective way of running your IT. But how do you keep your data safe when it’s stored off your premises?
Where should you start when it comes to using security software? We explain what to look for and why having software is only one part of staying safe.
A disaster recovery plan is a key part of your company’s IT security precautions. This article explains how to write your disaster recovery plan.
Your company’s security precautions should stop any unauthorised use of your IT, protect valuable data and keep your computers virus-free.
Online criminals are more organised than ever. Often, passwords provide ineffective protection. So can two-factor authentication help?
One of the biggest trends in business technology is the move towards greater mobility. Read about how to keep mobile devices secure in your company.
The Cyber Essentials scheme helps businesses understand how to implement a good level of cyber security so you are protected from common cyber threats
Any security breach is stressful, even if it only does minor damage. In this case study, one company tells us how they coped when they were hacked.
While you can never be totally safe, most online threats can be prevented. This guide will provide you with a good foundation in cyber security.
Any security breach is stressful, even if it only does minor damage. In this case study, one company tells us how they coped when they were hacked.