Call us
Menu
0345 225 0414
Customer Support
Login
Features
Holiday Planner
Absence Management
Performance Management
Staff Management
Document Management
Training Management
Pay and Benefits
Reporting
Health and Safety Management
Task Management
Security Centre
Self Service
Mobile
Pricing
Become a Partner
Resources
Blog
News
Webinars
COVID-19
About
What is HR Software?
About myhrtoolkit
Contact
Support
FAQs
Case Studies
Careers
Free Trial
Data security
What are the different types of phishing?
Data security
How to set achievable compliance goals for employees | HR
Employees
·
Data security
Does your small business need a compliance officer? | HR
Data security
·
SME
3 security benefits of cloud storage for small businesses
Data security
Cyber security - is HR a target? | HR blog
HR
·
Data security
Is your security awareness training effective? | HR blog
Data security
What to do if your small business experiences a cyber attack
Data security
·
SME
How does multi factor authentication benefit SMEs?
Data security
·
SME
Hybrid working: the security implications? | HR blog
Policy
·
Data security
How to protect your business against phishing scams
Staff management
·
Data security
Password security: policy and best practices | myhrtoolkit
Policy
·
Data security
Why your business needs an Access Control Policy
Staff management
·
Data security
How and how often should your business back up its data?
GDPR
·
Data security
TLS 1.0 deprecation: do you need to update your browser?
HR systems
·
Data security
Business crisis management: how to be a good employer
Staff management
·
Workplace
·
Data security
Social media screening: the pros and cons for employers?
Employment law
·
Social media
·
Data security
How to avoid a GDPR breach: a guide for SMEs | myhrtoolkit
GDPR
·
Data security
·
SME
How SMEs can deal with a GDPR data breach | myhrtoolkit
GDPR
·
Data security
·
SME
Data Privacy Day: 3 tips for keeping business data private
Data security
How to create a security-conscious business culture
Workplace
·
Data security
Subject Access Requests (SAR): How HR software helps
Employees
·
Data security
Social engineering scams – who is the weak link?
Employee engagement
·
Employees
·
Data security
ShellShock vulnerability: how to stay safe | myhrtoolkit
Data security
Heartbleed vulnerability: how to stay safe | myhrtoolkit
Data security