top of page

Sara Millis
May 7, 20243 min read
The risks of poor IT policies on your business
IT policies are crucial in ensuring your company's IT systems are used appropriately and securely. They guide employees on using...
18 views

Sara Millis
Apr 30, 20242 min read
Information Security Policy: What to include to keep your business safe
Every business handles sensitive information, whether that's customer details, personnel files or something else. How you keep that data...
11 views

Sara Millis
Apr 23, 20243 min read
Business Disaster Recovery Policy: What is it, and do you really need it?
It is becoming common for businesses to experience operational outages due to hacking, data loss, or rogue employees. In this blog post,...
6 views

Sara Millis
Apr 16, 20243 min read
Business Continuity Policy: What is it, and when do you need it?
Whether you are new to business or bringing your business online, you need to plan for what you'll do when disaster strikes. A business...
17 views

Sara Millis
Jan 16, 20245 min read
How to use ChatGPT safely in your small business
Everything you need to know about ChatGPT, including how it works and how to train your staff to interact safely without compromising data.
17 views

Sara Millis
Jan 3, 20244 min read
How to create your Acceptable Use Policy (AUP) - A guide for SMEs
In our IT Soho guide, we'll show you how to create your Acceptable Usage Policy to keep employees on-side and your data safe.
15 views

Sara Millis
Dec 13, 20233 min read
How to effectively draft your backup and recovery policy - an SME guide
In this week's IT Soho guide, we'll be taking you through what you need to consider in your backup and recovery policy and best practices.
6 views

Sara Millis
Dec 6, 20234 min read
How to set up your BYOD policy and implement it with ease
Your team approached you about using their personal mobiles to answer customer queries on the go. Here’s how to set up your BYOD policy.
9 views

Sara Millis
Nov 28, 20235 min read
Mobile device management policy guide: Simple steps for your small business security
Let’s look at your Mobile Device Management policy, ensuring you have everything you need to be compliant and secure as a small business.
25 views

Sara Millis
Nov 21, 20235 min read
Critical considerations for a more effective network access policy
You know you need a network access policy; you may even have one hidden away in a file - but are you sure it covers your business?
8 views

Sara Millis
Nov 14, 20235 min read
How to create your incident response plan as a small business
Explore the crucial aspects of creating and implementing an effective incident response plan tailored to your small business.
37 views

Sara Millis
Oct 17, 20236 min read
Crafting your Cloud Security Policy: A step-by-step guide
Need help to write your Cloud Security Policy? No problem; our handy IT Soho CSP guide will have you up and running quickly.
21 views

Sara Millis
Jul 4, 20234 min read
How to set up Multi-Factor Authentication (MFA) safely across your business
Rolled out Multi-Factor Authentication across your business? No? Let us show you why you need to adopt an MFA protocol and how to implement
19 views

Sara Millis
Jun 7, 20234 min read
Cybersecurity training: How often do you actually need to train employees?
We will explore how often you need to train employees and the appropriate frequency for your cybersecurity training.
33 views

Sara Millis
May 24, 20234 min read
How to make sure you digitally offboard an employee successfully (a checklist)
Learn how to digitally offboard an employee successfully with our guide. We've prepared our guide as a handy checklist!
11 views

Sara Millis
Apr 26, 20233 min read
How to run an effective cybersecurity audit for your business
In this blog post, we will take you through what a cybersecurity audit looks like, how to plan one and give you our top tips for success!
19 views

Sara Millis
Mar 29, 20232 min read
Important Microsoft cybersecurity and data privacy updates you need to know about
Here are some essential changes that Microsoft has made to its security offering to help us in 2023
21 views

Sara Millis
Jan 5, 20234 min read
Worried about harmful phishing scams? Why you need Microsoft 365 Defender!
In this article, we will cover how much of a problem phishing scams are and how 365 Defender’s features are built to help.
22 views

Sara Millis
Nov 18, 202210 min read
23 Common business cyber attack types and how to prevent them!
As well as the types of cyberattacks explained you’ll also get our quick guide to what you can do to protect your business.
32 views


Sara Millis
Nov 18, 20225 min read
Insider Threat: What is it, how bad is it and how do you prevent it?
Here’s our guide on how to prevent and mitigate damage from potential data breaches from internal threat actors.
20 views
bottom of page