Archives: Business Articles

Operating System Updates

When new versions of operating systems are launched, such as Microsoft Windows, Apple OS / iOS or Android, they are generally accompanied by improved usability, additional features and an enhanced user experience. However, cybercriminals quickly find vulnerable areas in the new operating system and continue to do so for the lifetime of the version. To […]

Web Browsers

There are a number of web browsers you can choose to run in your business. Which one depends on your specific needs and, to a degree, personal choice of features, interface and other considerations. Whichever browser you choose, it is important to keep it up to date – partly to take advantage of new functionality, faster […]

Unnecessary Services

Your organisation may sometimes retain or have responsibility for old computing services that have become redundant. These could include:

Staff Training

Educating your workforce is the main line of defence against online threats and breaches in information security. The best internet security software is of little use if employees do not know how to spot a phishing email, and the most robust firewall ineffective without proper password control.

Staff Behaviour

Online and information security and safety can be likened to any other kind of security and safety in the workplace. 

What is your internet policy for staff?

Virtually every organisation enables staff to access the internet in order to carry out their day-to-day work. As with going online at home, the convenience and efficiency is balanced by a degree of risk, which must be minimised. The same goes for accessing the organisation’s information systems.

Legal Compliance

Maintaining robust cyber and information security and safety in your organisation – whatever its size or nature of its business – is vital for many reasons. Remaining legally compliant is a very important one. Apart from safeguarding against the many issues mentioned on this website, it can be easy to forget that breaches in security or […]

Information Risk Assessments

In any aspect of business, it is impossible to safeguard against risks if you do not know what they are. Therefore, prerequisite to an information security strategy, is the preparation of an information risk assessment so that your organisation is aware of the risks it faces. This enables you to manage them in the most logical, […]

Employee Qualifications

The qualifications necessary for you, your employees and your security support organisations will vary according to the size, structure, management and IT provisioning of your organisation.

Wi-Fi

Wireless networks have revolutionised the way we work, both in the office, offsite or at home, and when out and about. This page deals with office and home Wi-Fi networks rather than public Wi-Fi / hotspots, which are covered elsewhere on this website. Wireless networks generally make it easier than with wired connections, to use the […]