iTaukei

Archives: Business Articles

Software Decommissioning

It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software is decommissioned or retired. This does not necessarily mean components bundled with operating systems, but old productivity, email, communications, financial and HR software, for example, together with programs specific to […]

Safe Use of Software

Almost without exception, every business relies on one or more computers – and therefore software – to operate. There are a number of important factors to be taken into consideration in choosing and using both operating systems and applications in order to remain efficient, safe and legal. It has become more important to exercise diligence […]

Operating System Updates

When new versions of operating systems are launched, such as Microsoft Windows, Apple OS X / iOS or Android, they are generally accompanied by improved usability, additional features and an enhanced user experience. However, cybercriminals quickly find vulnerable areas in the new operating system and continue to do so for the lifetime of the version. To counter […]

Web Browsers

There are a number of web browsers you can choose to run in your business. Which one depends on your specific needs and, to a degree, personal choice of features, interface and other considerations. Whichever browser you choose, it is important to keep it up to date – partly to take advantage of new functionality, faster […]

Unnecessary Services

Your organisation may sometimes retain or have responsibility for old computing services that have become redundant. These could include:

Staff Training

Educating your workforce is the main line of defence against online threats and breaches in information security. The best internet security software is of little use if employees do not know how to spot a phishing email, and the most robust firewall ineffective without proper password control.

Staff Behaviour

Online and information security and safety can be likened to any other kind of security and safety in the workplace. 

What is your internet policy for staff?

Virtually every organisation enables staff to access the internet in order to carry out their day-to-day work. As with going online at home, the convenience and efficiency is balanced by a degree of risk, which must be minimised. The same goes for accessing the organisation’s information systems.

Legal Compliance

Maintaining robust cyber and information security and safety in your organisation – whatever its size or nature of its business – is vital for many reasons. Remaining legally compliant is a very important one. Apart from safeguarding against the many issues mentioned on this website, it can be easy to forget that breaches in security or […]

Information Risk Assessments

In any aspect of business, it is impossible to safeguard against risks if you do not know what they are. Therefore, prerequisite to an information security strategy, is the preparation of an information risk assessment so that your organisation is aware of the risks it faces. This enables you to manage them in the most logical, […]