BETA

You're viewing an updated version of this site - your feedback will help us to improve it.

Video resources

Bring your own device

Many employees’ working life is no longer confined to the office, advancement in technology mean employees can now work from their own devices.

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 1:34

Intellectual property theft

Intellectual property (IP) crime involves counterfeiting and piracy. It can cause considerable financial harm to a business in loss of revenue..

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 1:40

Malware & Ransomware

Malware infiltrates and damages computers. It’s used in malicious attacks like identity theft, phishing and social engineering – and is often designed to steal money.

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 1:45

Phishing & Pharming

Phishing uses fake emails to trick you into giving information. They often exploit legitimate brands, making them hard to spot. So how can phishing emails be identified?

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 1:50

Denial of Service Attack

A denial of service attack is designed to bring a companies network or website down by flooding it with useless traffic. These types of attacks are typically aimed at large businesses

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 1:30

Business Best Practice - Cloud computing

Cloud computing, as a concept, isn’t new. Email services like Google Mail and Hotmail operate using a cloud service. But cloud computing is now being used for new means

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 1:19

Top Tips for Avoiding Business Fraud & Scams

‘Fraud’ and ‘scamming’ mean using trickery in order to take advantage of you, or your business. There are many ways criminals will try and scam you. Here are a few of the more common..

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 3:40

Spotting the weakest links in your business

Cyber criminals are constantly thinking of new ways to get ahead of the game and working out new ways to break through a company’s security measures through their ‘weakest links’.

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 3:04

Business Best Practice - WebMail

The power, flexibility and affordability of remote distributed computing or Cloud Computing now allows existing and new software developers to provide consumer and business email solutions

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 2:46

Business Best Practice - Security Settings

Setting up your computer or mobile device to use online services is getting faster, easier and, if these new services aren’t free, they’re certainly getting less expensive.

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 2:36

Business Best Practice - Passwords

As we increasingly reply on technology and the Internet in both our personal and professional lives, the devices we use and online services we access require security to prevent our personal..

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 2:39

Business Best Practice - Social Media

Many people now use social media throughout the day to communicate with family, friends, work colleagues and brands, however the immediacy and informal style of social media platforms..

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 3:16

Business Best Practice - Mobile Devices

It’s no surprise that the ongoing technology advancements and features offered by mobile and portable tablet computers have seen massive sales and customer adoption.

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 3:24

Business Best Practice - Web Browsers

Browsing and searching the web for information, products and a multitude of other things is made easier by the web browser we choose for our computers, mobile and connected devices

Third-party cookies must be allowed for this video to play here.

Watch this video on YouTube
Video length: 2:55

Business Wales Helpline

03000 6 03000

Lines are open 10am to 4pm Monday to Friday.

Rydym yn croesawu galwadau’n Gymraeg.
We welcome calls in Welsh.