Server security
How to use firewalls, data encryption and server hardening to secure your business servers and network from cyber attacks.
1 - 25 of 294
How to use firewalls, data encryption and server hardening to secure your business servers and network from cyber attacks.
Essential cyber security measures for small businesses to prevent, detect and respond to cyber attacks.
How to protect your business online from hacking, phishing, fraud, data breaches and other types of cyber crime.
Understand what ransomware is, how it works, how it can affect your business and how to prevent attacks.
A summary of changes to the UK's data protection and privacy legislation in the Data (Use and Access) Act.
What are short-range wireless networks, also known as personal area networks or PANs, and how do they benefit businesses.
What are cellular networks, and how to use cellular networks for data and voice communications in your business.
Measures you should put in place to satisfy data integrity, confidentiality and availability requirements under the UK GDPR.
What to do if your business receives a request for information under the Freedom of Information Act.
How to protect your business' confidential information if you share it with public bodies subject to an FOI request.
How to protect your trade secrets and commercial interest from FOI requests if you share information with public bodies.
Find out how the Freedom of Information Act may affect your business if you provide goods and services to public bodies.
How to choose the right type of domain name for your business, and how and where to register it.
Find out if UK businesses and individuals can register or renew .eu domain names, check eligibility rules and plan alternatives if needed.
How to evaluate the security of your cloud services, and mitigate cloud security risks to your business.
Pros and cons of BYOD practice in business, key security considerations, and the importance of having a BYOD policy.
Find out how to carry out a training and learning needs analysis to work out what IT skills your business needs.
An effective IT risk assessment looks at risk based on the probability of it occurring and the cost of impact and recovery.
How to respond to a cyber attack and develop an effective cyber incident response plan for your business.
Introduction to Cyber Essentials, a UK certification scheme that helps businesses protect themselves against cyber threats.
What is an intranet, and what type of company information and resources should be available on the intranet.
Best practice on company extranets - what are they, why should you have an extranet in your business and how to make it a success.
Advantages and disadvantages of hosting your intranet internally or externally.
How to plan and set up your intranet, taking into account functionality, technical considerations, hosting and costs.
How to create an extranet site for your business, taking into account functionality, technical considerations, hosting and costs.