What is the difference from the Internet and an Intranet

Unlocking the Power of Intranets: Practical Applications for Small Businesses, Charities, and Local Authorities In the fast-paced digital landscape, understanding the distinction between an Intranet and the Internet is crucial for small businesses, charities, and local authorities looking to enhance … Read More

WhatsApp slapped for processing data without a lawful basis under EU’s GDPR

Meta has been fined for failing to comply with the EU General Data Protection Regulation (GDPR) — they have been fined €5.5 million (just under £5 million) by the Irish data protection regulator for failing to have a lawful basis … Read More

Security Changes TLS 1.0 / 1.1

There has been some changes in the security protocols that run a lot of our online and offline lives. Such services as online banking, secure connectivity, applications and emails will be affected. The changes relates to the Transport Layer Security … Read More

Windows 7, Windows 2008 Server and Office 2010 End of Support

If your business is still using Windows 7 and Windows Server 2008 (Inc. Small Business Server 2008), then now is the time to consider your options on upgrading. Microsoft is officially dropping extended support for all of these on January 14th … Read More

GDPR – One Year on

This time last year saw the introduction to the new Data Protection law in the UK titled the General Data Protection Regulations. The new regulations introduced severe penalties to companies who have broken the law, where they can be fined … Read More

Our GDPR Compliance Project

Protecting our customers’ data is a high priority for us here at RLS Computer Services. With the General Data Protection Regulation (GDPR) coming into effect in May 2018, we see this as an opportunity to strengthen our commitment in the … Read More

Data Retention Policies

What is a Backup Retention Policy? A Backup Retention Policy governs the time that you keep backed up data, with it you would also consider the archive rules, format, method of storage, access policy and encryption. All of which must … Read More