Testing and Reviewing Your Business Continuity Plan

Now we know what a business continuity plan is and how we write one we need to take on the real challenge of finding out if it is any good - the last thing you want to do is to wait for a disaster to strike before realising it isn’t capable. Everything needs testing to prove its worth, and rigorous testing is the foundation of good practice.

Business Continuity Plans – An Invaluable Tool for every Business

The online presence in the world continues to grow, and with it so do the opportunities for cyber criminals to infiltrate and cause carnage on our systems. We all think we have some level of technical prowess, but the majority of us behave in a way that is unsatisfactory to guarantee a secure and productive working online environment.

The Importance of Cyber Security to SMBs

In today’s world cyber security should take top spot in your list of business concerns - if it doesn’t then you need to start prioritising it immediately. The modern day abilities of tech – the unlimited internet connectivity in this case – have made it essential that you and your team have at minimum a beginner’s level of prowess with tech – or at least a limited understanding of the potential risks to your system and the various actions you can take to limit those risks.

What Does a Good It Provider Look Like?

In the previous article, we explored the problems posed by traditional IT support, we concluded that in the modern world it isn’t enough, and it needs to be improved.

As we said in the previous article, traditional IT support is predominantly conducted by tech savvy but poor communicators that react to your problems rather than looking at your IT productively.

What Does a Poor IT Provider Look Like?

The world of technology is forever changing, and the last two decades in particular have seen huge changes, with new innovative tools being released that have the ability to revolutionise your workplace and, in turn, the way your team work. Due to the power that tech now has in our workplaces, business owners are making it a priority to be sure their tech is working for them in the best possible way, and most have tried to warp it in such a way as to make it catered for their own organisations.

The Five Controls of Cyber Essentials – Malware Protection

It is important that you do everything you can to prevent Malware from penetrating your systems. The consequences of not doing so could be dire and will see you fall short of the standards required to achieve Cyber Essentials Accreditation . For those that don’t know what Malware is, Malware is software that was constructed with the sole intention of causing damage to computer systems, servers, or an entire network.

The Five Controls of Cyber Essentials – Access Controls

Having Access Controls will ensure that user accounts can only access the networks, computers, and applications that that user needs to perform their role to the best of their ability. ‘Need’ is an important word here – the Cyber Essentials Accreditation requires that user accounts are only assigned to authorised individuals and not just anybody.