Search results
Clothing expenses
What clothing items are classed as allowable business expenses that you can claim as expenses for your business.
Different types of cyber crime
Understand the common ways cyber criminals may attack your business, how cyber attacks work and how they might affect you.
Cyber security for business
Introduction to small business cyber security, risks to your business, and tools and techniques to help you manage it.
Cyber security risk management
How to manage cyber security risks to your business, create security policies and practices, and use cyber insurance.
Reasons behind cyber attacks
Find out why cyber criminals target businesses and what assets (financial or otherwise) may be at risk from attacks.
Cyber security incident response plan
How to respond to a cyber attack and develop an effective cyber incident response plan for your business.
Cyber security breach detection
How to know if your business is under a cyber attack, and what to do to contain or control a cyber breach.
Business data breach and theft
Understand the possible business implications of data breach and theft, and the steps you should take to prevent them.
Insider threats in cyber security
How to detect internal cyber security issues and risks, and develop processes to improve workplace cyber resilience.
Remote access security issues
Security implications of working remotely, common risks and concerns, and solutions to securing remote access.
IT risk management checklist
Use our practical IT risk management checklist to help you understand, manage and reduce IT risks to your business.
IT incident response and recovery
What is an IT incident response plan, how to respond to an IT security incident and recover your business operations.
IT risk management policy
How you can use staff, IT and data security policies and procedures to improve security in your business.
IT risk and business continuity
How to create, test and carry out contingency plans for your business in case of IT systems failure.
Data protection impact assessments
What is a data protection impact assessment, and how to carry out a DPIA to comply with the requirements of the UK GDPR.
Security principle under the UK GDPR
Measures you should put in place to satisfy data integrity, confidentiality and availability requirements under the UK GDPR.
Protect your business against phishing
Find out about phishing and spear phishing - how these attacks work and how to protect your business against them.
Detect spam, malware and virus attacks
How to detect virus, malware or spam attack, and what to do if your business has been affected.
Server security
How to use firewalls, data encryption and server hardening to secure your business servers and network from cyber attacks.
Common cyber security measures
Different cyber security measures you can use to help prevent, detect or disrupt a cyber attack on your business.