Archives: Business Articles
Business Security Planning
IT, as well as online security, is vital for organisations of any size. The alternatives include business interruption, poor legal compliance, impact on revenue, compromised reputation or, at worst, business failure. Therefore, you need to take a systematic approach to security and the first place to start is to compile and implement an effective business […]
Selling on eBay
eBay is one of the world’s most popular online marketplaces, for businesses as well as private sellers. With millions of unique customers every month, it provides retailers and other businesses disposing of assets with the largest potential audience. However, the fact that there are so many potential buyers can also expose you to high levels […]
Apple Mac Computers
Apple Macs are less vulnerable to attack by malware than Windows PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs increases for both business and personal use, so does the malicious activity directed against them as criminals will […]
Linux
This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations.
Windows Server 2003
Microsoft ceased support for its Windows Server 2003 and Small Business Server 2003 operating systems in 2015.
Windows XP
Microsoft has released a succession of newer versions of its Windows operating system over the years, yet some business (and home) PC users are still using Windows XP, which was replaced back in 2007. Microsoft ceased support for XP in 2014 – meaning that no updates, security patches, bug fixes or Microsoft Security Essentials are issued for the operating system version.
User Accounts
In any organisation where more than one person has access to a computer or network, it is necessary to set up user accounts in order to give individuals access to their own files, programs, email accounts, choice of internet browser (where personal choice is permitted) and history .. and restrict access to unauthorised persons.
Software Updates
This page refers to software on your computers that is not the operating system.
Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software is decommissioned or retired. This does not necessarily mean components bundled with operating systems, but old productivity, email, communications, financial and HR software, for example, together with programs specific to […]
Safe Use of Software
Almost without exception, every business relies on one or more computers – and therefore software – to operate. There are a number of important factors to be taken into consideration in choosing and using both operating systems and applications in order to remain efficient, safe and legal. It has become more important to exercise diligence […]