Search results
IT risk management checklist
Use our practical IT risk management checklist to help you understand, manage and reduce IT risks to your business.
IT incident response and recovery
What is an IT incident response plan, how to respond to an IT security incident and recover your business operations.
IT risk management policy
How you can use staff, IT and data security policies and procedures to improve security in your business.
IT risk and business continuity
How to create, test and carry out contingency plans for your business in case of IT systems failure.
Meetings with potential buyers for your business
How to prepare for and conduct negotiations with prospective purchasers of your business.
Assess offers to buy your business
How to assess offers for your business and understand the implications of the deal structure.
Your responsibilities and liabilities when selling your business
The warranties and indemnities you may have to provide to buyers; protecting your employees.
Data protection impact assessments
What is a data protection impact assessment, and how to carry out a DPIA to comply with the requirements of the UK GDPR.
Security principle under the UK GDPR
Measures you should put in place to satisfy data integrity, confidentiality and availability requirements under the UK GDPR.
Selling or closing a limited company
What you need to do when selling or closing a limited company.
Informing Companies House when selling or closing a business
Informing Companies House when selling a company or LLP with changes to the secretary, directors or members.
Employers' responsibilities when closing down a business
Who to inform, which final payments to calculate and how to support employees when you close a business.
Preparing a plan to close down your business
What you should put in your written plan to help you close your business properly.
Protect your business against phishing
Find out about phishing and spear phishing - how these attacks work and how to protect your business against them.
Detect spam, malware and virus attacks
How to detect virus, malware or spam attack, and what to do if your business has been affected.
Server security
How to use firewalls, data encryption and server hardening to secure your business servers and network from cyber attacks.
Common cyber security measures
Different cyber security measures you can use to help prevent, detect or disrupt a cyber attack on your business.
Point-of-sale terminal security
Best practice for point-of-sale environments and the different ways to protect your POS terminal security.
Protect your business online
How to protect your business online from hacking, phishing, fraud, data breaches and numerous other types of cyber crime.
Legal and financial checks when buying a business
Learn about the financial and legal checks you should make when considering buying a business.