Search results
Sample IT policies, disclaimers and notices
Free templates for IT policies and forms, including website disclaimers, copyright notices and privacy statements.
Staff monitoring: reasons and methods
What workplace monitoring is, why monitor staff, and the methods you can use for surveillance.
Staff monitoring: deciding if it is justified
Using an impact assessment to determine if staff monitoring is justified and ensuring that you meet legal requirements on privacy.
Staff security and monitoring employees
How to ensure the safety of your staff and the rules to follow when using surveillance in the workplace.
Set up staff monitoring policies
Writing staff monitoring policies, particularly on the use of computers phones, and business vehicles.
Monitor staff correctly and lawfully
How to monitor your staff in accordance with the law and best practices.
Penalties for improper staff monitoring
The right and wrong way to monitor workers, and the penalties for improper staff monitoring.
Different types of cyber crime
Understand the common ways cyber criminals may attack your business, how cyber attacks work and how they might affect you.
Cyber security for business
Introduction to small business cyber security, risks to your business, and tools and techniques to help you manage it.
Cyber security risk management
How to manage cyber security risks to your business, create security policies and practices, and use cyber insurance.
Reasons behind cyber attacks
Find out why cyber criminals target businesses and what assets (financial or otherwise) may be at risk from attacks.
Core skills all businesses require
Core skills your business needs to function successfully in areas including leadership, finance, and personnel.
Cyber security incident response plan
How to respond to a cyber attack and develop an effective cyber incident response plan for your business.
Cyber security breach detection
How to know if your business is under a cyber attack, and what to do to contain or control a cyber breach.
Skills required by growing businesses
How the complexity and variety of skills your business needs to access increase as your business grows.
Business data breach and theft
Understand the possible business implications of data breach and theft, and the steps you should take to prevent them.
Insider threats in cyber security
How to detect internal cyber security issues and risks, and develop processes to improve workplace cyber resilience.
Remote access security issues
Security implications of working remotely, common risks and concerns, and solutions to securing remote access.
Leadership skills for business owners and directors
Skills that directors and business owners need to develop to be effective leaders.
Strategy skills for business owners and directors
How strategy can help your business, and how to use SWOT and gap analyses to determine business strategy.