Archives: Business Articles

Tax Scams

Fraudulent phishing emails claiming to be issued by tax authorities or other government bodies have been in existence for some years. They are still as, if not more, popular with scammers.

Data Breaches / Security Incidents

Your organisation should have a process in place for managing and reporting events or chains of events that compromise the confidentiality, integrity or availability of its information.

Network & Computer Security

Before the advent of the internet, network and computer security was relatively simple as organisations needed to secure only the ‘perimeter’ to their systems. Computers were connected by networks and with the exception of wide area networks (WANs), did not communicate with the outside world. With the internet, the task is considerably more challenging.

Tele & Video Conferencing

Sometimes, there is no alternative to a face-to-face meeting, but conference calls and videoconferencing provide a highly convenient, non-disruptive, cost effective and environmentally friendly way to communicate without the time and expense of travel. One of the key requirements of business meetings is confidentiality, and the same is true of tele and video conferencing. 

Supply Chain

As your organisation grows and starts to work with more customers, suppliers and partners, you become a link in one or more complex supply chains. Being a desirable, trustworthy supplier or customer now extends far beyond delivering good products or services, providing great customer care and paying on time. Today’s way of conducting business means that […]

Cyber & Information Security Support

This website is designed to help you – as a small to medium sized organisation – to establish and maintain the appropriate levels of safety to safeguard your  IT systems, devices, business and employees against issues relating to online and information security. You may already employ the services of an IT support provider or depending […]

Protect Your Website

Whether your business operates an ecommerce or marketing website, it is essential to protect it against attacks from hackers as well as technical failure. The consequences of not doing so include loss of service, reduced revenue and damaged reputation.

e Procurement

eProcurement, or business-to-business electronic purchasing, is being adopted by many organisations as a way to reduce transaction costs and improve process efficiency. It requires considerable investment in systems, configuration, integration and change management, and expert views are divided on how long the return on this investment will take. In general, successful business relationships are built […]

Electronic & Card Payments

These days, virtually all payments made or received by a business are transacted electronically, with cheques having become a rarity and cash normally used only in over-the-counter retail situations. Because of the secure nature of banking systems, bank transfers are relatively safe, provided the same care is taken that should be exercised with all online transactions. […]

Mobile & Home Access

Mobile and home working – as in working on other sites remote from the main place of business – is a growing trend, enabling businesses to become more agile and provide more flexible working patterns. Because mobile and home working normally requires access to office systems and business processes from remote locations, it is necessary to […]