Archives: Business Articles

The Cloud

Most, if not all organisations now have some reliance on cloud based services, whether for storage, hosted software or delivery of services to customers.

Business Security Planning

IT, as well as online security, is vital for organisations of any size. The alternatives include business interruption, poor legal compliance, impact on revenue, compromised reputation or, at worst, business failure. Therefore, you need to take a systematic approach to security and the first place to start is to compile and implement an effective business […]

Selling on eBay

eBay is one of the world’s most popular online marketplaces, for businesses as well as private sellers. With millions of unique customers every month, it provides retailers and other businesses disposing of assets with the largest potential audience. However, the fact that there are so many potential buyers can also expose you to high levels […]

Apple Mac Computers

Apple Macs are less vulnerable to attack by malware than Windows PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs increases for both business and personal use, so does the malicious activity directed against them as criminals will […]

Linux

This page provides advice on some of the most important activities that are particularly relevant for protecting Linux workstations.

Windows Server 2003

Microsoft ceased support for its Windows Server 2003 and Small Business Server 2003 operating systems in 2015.

Windows XP

Microsoft has released a succession of newer versions of its Windows operating system over the years, yet some business (and home) PC users are still using Windows XP, which was replaced back in 2007. Microsoft ceased support for XP in 2014 – meaning that no updates, security patches, bug fixes or Microsoft Security Essentials are issued for the operating system version. 

User Accounts

In any organisation where more than one person has access to a computer or network, it is necessary to set up user accounts in order to give individuals access to their own files, programs, email accounts, choice of internet browser (where personal choice is permitted) and history .. and restrict access to unauthorised persons.

Software Updates

This page refers to software on your computers that is not the operating system.

Software Decommissioning

It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software is decommissioned or retired. This does not necessarily mean components bundled with operating systems, but old productivity, email, communications, financial and HR software, for example, together with programs specific to […]