GN Guidelines
Technology
View Types
Technology
28. DATA SECURITY – WHAT NEEDS TO BE DONE?
28. DATA SECURITY – WHAT NEEDS TO BE DONE?
57. TECHNOLOGY – MOVING WITH THE TIMES
57. TECHNOLOGY – MOVING WITH THE TIMES
63. I.T. NEEDS YOUR SUPPORT
63. I.T. NEEDS YOUR SUPPORT
66. AUTOMATED MACHINERY DATA BACKUPS
66. AUTOMATED MACHINERY DATA BACKUPS
72. BUILDING A LOCAL AREA NETWORK
72. BUILDING A LOCAL AREA NETWORK
77. REMOTE CONTROL
77. REMOTE CONTROL
88. CHOOSING A SERVER
88. CHOOSING A SERVER
96. VISIONARY, PRAGMATIST OR LAGGARD?
96. VISIONARY, PRAGMATIST OR LAGGARD?
107. IT DISASTER RECOVERY
107. IT DISASTER RECOVERY
113. SECURE YOUR NETWORK – PART 1
113. SECURE YOUR NETWORK – PART 1
119. SECURE YOUR NETWORK – PART 2
119. SECURE YOUR NETWORK – PART 2
139. WHOLEHOUSE SOFTWARE – FACT OR FICTION
139. WHOLEHOUSE SOFTWARE – FACT OR FICTION
152. PROTECTING YOUR ASSETS
152. PROTECTING YOUR ASSETS
158. REGULAR UPDATES PROTECT
158. REGULAR UPDATES PROTECT
228. RANSOMWARE PART 1: WHAT IS IT?
228. RANSOMWARE PART 1: WHAT IS IT?
229. RANSOMWARE PART 2: CONSEQUENCES
229. RANSOMWARE PART 2: CONSEQUENCES
235. GET OFF MY CLOUD
235. GET OFF MY CLOUD
236. IS WORKFLOW MANAGEMENT THE NEXT STEP
236. IS WORKFLOW MANAGEMENT THE NEXT STEP
240. WINDOWS – THE SOUL OF YOUR MACHINE PC
240. WINDOWS – THE SOUL OF YOUR MACHINE PC
243. IS YOUR SOFTWARE LEGITIMATE
243. IS YOUR SOFTWARE LEGITIMATE
247. PHISHING, SPEAR PHISHING & WHALING
247. PHISHING, SPEAR PHISHING & WHALING
253. THANKS TO EARLY ADOPTERS
253. THANKS TO EARLY ADOPTERS
Resources and downloads
GN Guidelines Download