Results for keyword: SME

In the lead up to the introduction of GDPR – and in the weeks since – we’ve shared plenty of advice surrounding email marketing and how to ensure your mailshots are compliant with the new regulation. We’ve even put together a short animation covering the basics – perfect for anyone with a short attention span!

But one area that still seems to be baffling people is the process of opting in/out – and more specifically, how to ensure you’re making this procedure clear and simple for those you’re emailing.

Published in GDPR

We’ve said it before in this blog and we’ll no doubt say it again – employees who are not trained and briefed properly on how to safeguard systems and data are the weakest link when it comes to cyber-security.

You can install high-grade IT measures to ward off attacks and repel the most sophisticated of malware, but if your staff don’t know their responsibilities, you are very vulnerable to a data leak.

Published in Blog

A month on and the GDPR countdown seems like a distant memory. And although the world didn’t end as some feared it might, a lot has happened since the regulation was introduced.

Data security has been a mainstay in the headlines and some companies are in the firing line already for potential breaches of the new legislation.

Published in GDPR

So, your start-up has taken off. You’ve brought in new recruits, established a name for yourself and now you’re looking to scale-up. Great work!

But as with everything else in business, you’re more than aware that you can’t just jump in at the deep-end without weighing up the risks and opportunities around you. And one key thing you need to ask yourself before you take that plunge is whether your current IT infrastructure is up to it.

As your company evolves, your IT needs to as well. So, what should you be considering?

Published in Blog

Our MD Andrew recently shared some important guidance on SME data security with Lancashire Business View. Didn’t catch the article? Don’t worry – you can read it in full below…

Published in Blog

Have you heard of the 3-2-1 rule when it comes to safeguarding your business data? It’s a good, industry-standard principle that applies to most situations in the field of IT back-up – an area where typically, one size almost never fits all.

A 3-2-1 methodology ensures no single point of failure – there are three copies of the data, on two separate media types with one stored off-site.

Published in Blog

If you run a SME, you will no doubt store data in more than one place. (If you don’t then we advise you start right now – but that’s another conversation!)

People often talk about the secondary place for this data as a ‘back-up’ or ‘archive’ as if the two words are interchangeable, but they actually mean very different things. Yes, both support your primary storage, but they are there for different reasons.

Published in Blog

All businesses have policies on matters from maternity leave to grievance procedures, which are shown to new staff members on arrival. Once a recruit has been briefed on the really important things – such as where the teabags are kept and how it’s decided what station the office radio is tuned to – there will also be a bundle of paperwork to read and sign.

When it comes to IT, social media policies are probably the most prevalent – these advise employees on proper usage and whether or not it’s okay to post in working hours. But someone potentially being rude about you online, or scrolling through Twitter on your time, is only a small part of the risk when it comes to staff and tech.

Published in Blog

If you’re looking to enlist help with IT from external consultants for your SME, the chances are you will be familiar with the term ‘Service Level Agreement’ (SLA). These are commonly used to define how service providers respond to a client’s issues and requests.

In essence, SLAs form a promise to deal with problems and challenges in a given way, within a specific timescale.

Published in Blog

When it comes to protecting your SME against lurking cyber-security threats, there are a number of obvious steps you’ll have probably taken already – for instance, setting strong passwords, encrypting sensitive files, installing anti-virus software and warning employees not to click links in dodgy-looking emails.

But it’s also likely that there are some key vulnerabilities that you’ve overlooked in your preparations. However hard you try, the truth is that there’s always more that can be done to safeguard your company against a cyber-attack. So, whilst it might seem like you’re fighting a losing battle, don’t be disheartened! Getting the small things right does make a difference and helps to bolster your defences.

Published in Blog