top of page

The risks of poor IT policies on your business
IT policies are crucial in ensuring your company's IT systems are used appropriately and securely. They guide employees on using...
Sara Millis
May 7, 20243 min read
20 views

Information Security Policy: What to include to keep your business safe
Every business handles sensitive information, whether that's customer details, personnel files or something else. How you keep that data...
Sara Millis
Apr 30, 20242 min read
13 views

Business Disaster Recovery Policy: What is it, and do you really need it?
It is becoming common for businesses to experience operational outages due to hacking, data loss, or rogue employees. In this blog post,...
Sara Millis
Apr 23, 20243 min read
6 views

Business Continuity Policy: What is it, and when do you need it?
Whether you are new to business or bringing your business online, you need to plan for what you'll do when disaster strikes. A business...
Sara Millis
Apr 16, 20243 min read
24 views

How to use ChatGPT safely in your small business
Everything you need to know about ChatGPT, including how it works and how to train your staff to interact safely without compromising data.
Sara Millis
Jan 16, 20245 min read
17 views

How to create your Acceptable Use Policy (AUP) - A guide for SMEs
In our IT Soho guide, we'll show you how to create your Acceptable Usage Policy to keep employees on-side and your data safe.
Sara Millis
Jan 3, 20244 min read
15 views

How to effectively draft your backup and recovery policy - an SME guide
In this week's IT Soho guide, we'll be taking you through what you need to consider in your backup and recovery policy and best practices.
Sara Millis
Dec 13, 20233 min read
6 views

How to set up your BYOD policy and implement it with ease
Your team approached you about using their personal mobiles to answer customer queries on the go. Here’s how to set up your BYOD policy.
Sara Millis
Dec 6, 20234 min read
10 views

Mobile device management policy guide: Simple steps for your small business security
Let’s look at your Mobile Device Management policy, ensuring you have everything you need to be compliant and secure as a small business.
Sara Millis
Nov 28, 20235 min read
25 views

Critical considerations for a more effective network access policy
You know you need a network access policy; you may even have one hidden away in a file - but are you sure it covers your business?
Sara Millis
Nov 21, 20235 min read
8 views

How to create your incident response plan as a small business
Explore the crucial aspects of creating and implementing an effective incident response plan tailored to your small business.
Sara Millis
Nov 14, 20235 min read
39 views

Crafting your Cloud Security Policy: A step-by-step guide
Need help to write your Cloud Security Policy? No problem; our handy IT Soho CSP guide will have you up and running quickly.
Sara Millis
Oct 17, 20236 min read
21 views

How to set up Multi-Factor Authentication (MFA) safely across your business
Rolled out Multi-Factor Authentication across your business? No? Let us show you why you need to adopt an MFA protocol and how to implement
Sara Millis
Jul 4, 20234 min read
19 views

Cybersecurity training: How often do you actually need to train employees?
We will explore how often you need to train employees and the appropriate frequency for your cybersecurity training.
Sara Millis
Jun 7, 20234 min read
35 views

How to make sure you digitally offboard an employee successfully (a checklist)
Learn how to digitally offboard an employee successfully with our guide. We've prepared our guide as a handy checklist!
Sara Millis
May 24, 20234 min read
11 views

How to run an effective cybersecurity audit for your business
In this blog post, we will take you through what a cybersecurity audit looks like, how to plan one and give you our top tips for success!
Sara Millis
Apr 26, 20233 min read
19 views

Important Microsoft cybersecurity and data privacy updates you need to know about
Here are some essential changes that Microsoft has made to its security offering to help us in 2023
Sara Millis
Mar 29, 20232 min read
21 views

Worried about harmful phishing scams? Why you need Microsoft 365 Defender!
In this article, we will cover how much of a problem phishing scams are and how 365 Defender’s features are built to help.
Sara Millis
Jan 5, 20234 min read
22 views

23 Common business cyber attack types and how to prevent them!
As well as the types of cyberattacks explained you’ll also get our quick guide to what you can do to protect your business.
Sara Millis
Nov 18, 202210 min read
32 views


Insider Threat: What is it, how bad is it and how do you prevent it?
Here’s our guide on how to prevent and mitigate damage from potential data breaches from internal threat actors.
Sara Millis
Nov 18, 20225 min read
20 views
bottom of page