Search results
Benefits of intranets and extranets
What are intranets and extranets, what benefits can they deliver to your business, and how best to implement them.
Types of business phone systems
Different types of business phone systems include key system units, private branch exchange and virtual (VoIP) systems.
Types of e-commerce business models
Basic e-commerce models are business to business (B2B) or business to consumer (B2C), although other models exist.
Promoting your business online
Low-cost ways to promote and market your business, products or services on the internet.
Email and internet acceptable use policy
An acceptable use policy can help limit risks and data breaches, ensure compliance and protect your business reputation.
Advantages and disadvantages of using email for business
Understand the key benefits and downsides of using email for business, and how to use email technology more effectively.
Using email for business communication and marketing
Different ways you can use email to enhance your business operations, including marketing and communications.
Internet and email security issues
Understand the threats to your business from the internet and email usage, and ways to safeguard your business.
Business phone systems
How to choose a new telephone system for your business, replace or expand an existing one, or switch to VoIP or virtual PBX.
Using personal data in your business or other organisation
Find out what action you may need to take regarding data protection and uninterrupted data flows with the EU/EEA.
Registering and renewing .eu domain names in the UK
Find out what you need to do if you hold a .eu domain or want to register one.
How to host your own business website
What hardware, software and other resources will you need to host your own business website.
Prepare your pitch to secure finance
What to include in your pitch to secure finance and how to structure your presentation
How to report a cyber crime
Find out where and how businesses can report online fraud, cyber security incidents and other types of cyber crime.
IT risk management process
How to identify risks and assets as part of the IT risk management process, and create risk management plans procedures.
IT risk assessment methodology
An effective IT risk assessment looks at risk based on the probability of it occurring and the cost of impact and recovery.
ISO 27001 IT security management standard
An overview of the ISO 27001 information security standard, and how it can help you improve security for your business.
Different types of IT risk
Your IT systems and data face many types of risks, including physical damage, malicious attacks, technical faults and human error.
What is IT risk?
Introduction to information technology (IT) risk and its potential to damage or devalue your business.
IT risk management
Introduction to IT risk management and processes you should follow to manage and mitigate IT risks in your business.