IT security

How would you cope if your IT system failed or was breached? We cover the main IT security issues and how to protect against them.

Article image
ARTICLE

IT security - overview

How would you cope if your IT system failed or was breached? We cover the main IT security issues and how to protect against them.

Article image
ARTICLE

Securing your IT system - overview

From customer details to financial records - your business will have lots of important data. We look at how you can protect it, wherever it is stored.

Article image
ARTICLE

Your security plan - overview

An IT security plan is key to protecting your IT system from security threats. This summary explains why and how to create a security plan.

Article image
ARTICLE

Internet security - overview

The internet can be the single largest security risk to your business. Our summary explains how to protect your business online threats.

Article image
ARTICLE

Business data protection - overview

Data protection helps secure your key business data and comply with the rules. Our overview looks at data protection rules and how to protect data.

News image
ARTICLE

Data protection: your obligations

The Data Protection Act lays down strict rules about the use of personal information. There are significant fines for failure to follow the rules.

News image
ARTICLE

Find the right backup methods

Data backups are essential to your business and an important part of disaster planning. But what methods should you use to back up your critical data?

News image
ARTICLE

Five key website security checks

You’ve spent months building your website. Have you checked for common security problems that could leave your website open to a preventable attack?

News image
ARTICLE

Keeping your data safe

Good data security means understanding what data you hold and how you store and use it, as well as having robust security procedures. Our guide.

News image
ARTICLE

Preventing business fraud - checklist

Small businesses may feel unable to justify investing in protection against fraud. These tips show you how to prevent fraud on a tight budget.

News image
ARTICLE

Preventing IT disasters - checklist

If the thought of a computer breakdown gives you cold sweats, you need to take steps to minimise the risks. These steps can help safeguard your IT.

News image
ARTICLE

Protecting your IT system

Protecting your IT system and the information it holds is essential to avoid a catastrophc systems failure or data loss. Business IT security basics.

News image
FAQS

Security and anti-virus software FAQs

IT security is a serious issue for any business holding sensitive personal information or data. We answer the most frequent IT security questions.

News image
ARTICLE

Do you need mobile security software?

You know it’s a good idea to have security and anti-virus software on your computers. But, do you need security software for your mobile devices too?

News image
ARTICLE

How to back up your remote workers

There has been a revolution in where, when and how employees work. Companies are now facing the challenge of keeping their data safe and backed up.

News image
ARTICLE

Stay secure on a budget

Regardless of whether you have a network of computers or just one PC, you need to protect your systems from a range of IT threats.

News image
ARTICLE

Keeping mobile devices secure

Mobile phones have more capabilities than ever and the risk of data loss from phones has dramatically increased. You need to protect that data.

News image
ARTICLE

Q&A: Cloud computing security

Cloud computing can be efficient and cost-effective way of running your IT. But how do you keep your data safe when it’s stored off your premises?

News image
ARTICLE

Where to start with mobile security

One of the biggest trends in business technology is the move towards greater mobility. Read about how to keep mobile devices secure in your company.

News image
TOOL

Cyber Essentials scheme

The Cyber Essentials scheme helps businesses understand how to implement a good level of cyber security so you are protected from common cyber threats