Search results
Checklist for planning and integrating IT systems
Things to consider when assessing your IT system needs, planning and executing a systems integration project.
Understanding your business IT needs (video)
This short video tutorial explains some key considerations when assessing the IT needs of your business.
Align IT with your business strategy
Find out why aligning your IT with your business priorities maximises the return on your IT investment.
Carry out a technology needs assessment
How to carry out a technology needs assessment and make IT purchases and decisions that support your business objectives.
How to host your own business website
What hardware, software and other resources will you need to host your own business website.
Benefits of a workplace policy on domestic and sexual abuse
How developing a workplace policy on domestic and sexual abuse can help you meet legal requirements and offer business benefits.
Manage health and safety when running an event
How to plan, manage and organise a safe event including risk assessment, training, monitoring and review
Event site and venue safety
Health and safety considerations for the site and venue of events, including design, risks, facilities, crowd management and transport.
Event safety: top tips
Top tips for running events safely include carrying out a risk assessment, planning for emergencies, managing the flow of traffic and crowds, and working with local organisations.
Practical steps to support employees affected by domestic and sexual abuse
A list of practical measure your business can use to support employees affected by abuse, such as diverting phone calls and allowing flexible working.
Identifying signs of domestic and sexual abuse
Spot the signs of domestic and sexual abuse in your employees, such as absenteeism, anxiety, injuries and problems concentrating.
Why domestic and sexual abuse is a workplace issue
The definitions of domestic and sexual abuse, and how this affects victims in their place of work.
Wi-Fi protected access (WPA)
An overview of the WPA, WPA2 and WPA3 - the key wireless security protocols commonly used in modern wireless network products.
Sample website disclaimer
Find out how to write a disclaimer for a website or use our free website disclaimer sample to address different liability limitations.
Counselling and support for domestic and sexual abuse
The range of local information and support services for domestic and sexual abuse in Northern Ireland.
Sample acceptable email use policy
Use our email policy template to set out your employees' responsibilities when using email in your business.
Sample website copyright statement
Use our digital copyright statement and disclaimer template to state the copyright position of your website content.
Sample business email disclaimer
Use our free email disclaimer template to include your business’ legal information, confidentiality or warnings in your emails.
ISO 27001 IT security management standard
An overview of the ISO 27001 information security standard, and how it can help you improve security for your business.
IT risk and business continuity
How to create, test and carry out contingency plans for your business in case of IT systems failure.