- Cloud Networking
How to Set Up VPN Tunnels with Cisco Meraki MX
11 Mar, 2026
Free checklists, guides, and templates to help you manage, plan, and optimise your business IT with confidence.
Essential checklists and templates for managing your IT support setup — audits, SLAs, asset tracking, and incident management.
Assess your current IT support setup with this comprehensive audit covering response times, coverage, escalation, and service quality.
View DetailsCustomisable service level agreement template for IT support contracts with response time tiers, escalation paths, and KPIs.
View DetailsTrack all hardware, software, and licences across your organisation with automated renewal alerts and lifecycle management.
View DetailsHow to evaluate and compare managed IT support providers — pricing models, service scope, and questions to ask before signing.
View DetailsStructured template for documenting, escalating, and resolving IT incidents with severity classification and post-mortem analysis.
View DetailsPlan and execute a seamless IT relocation — pre-move assessments, move-day procedures, and post-move verification guides.
Step-by-step IT checklist covering 12 weeks pre-move planning, move-day tasks, and post-move verification for a seamless relocation.
View DetailsPlanning and executing a server room move with zero data loss and minimal downtime — risk assessment, logistics, and rollback plans.
View DetailsDocument your current network setup before an office move to plan the new configuration — switches, cabling, WiFi, and ISP requirements.
View DetailsPre-written email and notice templates to keep staff informed throughout the IT transition — from announcement to go-live confirmation.
View DetailsSystematic verification of every system, connection, and device after your office relocation — 85 interactive checkboxes across 6 areas.
View DetailsTechnical resources for managing and securing your business network — audits, documentation, firewall policies, and VLAN planning.
Comprehensive audit of firewalls, access controls, encryption standards, and vulnerability management across your entire network.
View DetailsDocument your entire network topology, IP addressing schemes, VLANs, device configurations, and admin credentials securely.
View DetailsEssential firewall rules, port management, zone-based policies, and security configurations for business networks.
View DetailsSetting up and interpreting network monitoring tools — SNMP, NetFlow, alerting thresholds, and baseline performance metrics.
View DetailsPlan and document your VLAN architecture with subnet allocation, inter-VLAN routing, access control lists, and port assignments.
View DetailsStrategic IT planning resources — technology roadmaps, budget templates, risk assessments, and digital transformation frameworks.
Build a 3-year IT strategy aligned with your business goals — infrastructure, security, cloud adoption, and budget planning.
View DetailsVisual roadmap template for planning technology investments, upgrades, and milestones across quarterly and annual timescales.
View DetailsComprehensive IT budget planner covering hardware, software, licensing, managed services, and capital vs operational expenditure.
View DetailsEvaluate your organisation's readiness for digital transformation across people, processes, technology, and culture.
View DetailsIdentify, assess, and prioritise IT risks with impact scoring, mitigation strategies, and risk register documentation.
View DetailsMicrosoft 365 migration guides, email security resources, and licence comparison tools for cloud email management.
End-to-end migration checklist from legacy email to Microsoft 365 — pre-migration audit, data transfer, DNS changes, and user training.
View DetailsProtect your organisation from phishing, spoofing, and email-based threats — SPF, DKIM, DMARC, and user awareness training.
View DetailsSide-by-side comparison of Business Basic, Standard, and Premium licences — features, storage, security, and per-user pricing.
View DetailsEnsure your email retention and archiving meets UK GDPR and industry regulations — policies, legal holds, and audit trails.
View DetailsStep-by-step guide to configuring Microsoft 365 admin centre — security policies, conditional access, and user management.
View DetailsAzure migration planning resources — readiness assessments, cost comparisons, security hardening, and disaster recovery templates.
Assess your infrastructure readiness for Azure migration — workload compatibility, dependency mapping, and migration wave planning.
View DetailsCompare the true total cost of ownership between on-premise servers and Azure cloud over 1, 3, and 5 year horizons.
View DetailsStandardise your Azure resource naming for better organisation, governance, and cost tracking across subscriptions and resource groups.
View DetailsPlan your Azure-based disaster recovery strategy with RTO and RPO targets, failover procedures, and testing schedules.
View DetailsHarden your Azure environment with identity management, network security groups, data encryption, and monitoring controls.
View DetailsA clear comparison of Microsoft Copilot Free and Microsoft 365 Copilot for Business — features, UK pricing, security, and app integration.
View DetailsCisco Meraki deployment guides, WiFi planning tools, and SD-WAN readiness resources for cloud-managed networking.
Step-by-step deployment guide for Cisco Meraki access points, switches, and security appliances — from unboxing to dashboard configuration.
View DetailsHow to plan and conduct a wireless site survey for optimal coverage — tools, methodology, heat mapping, and access point placement.
View DetailsCalculate bandwidth requirements based on user count, device types, application demands, and growth projections.
View DetailsConnecting and managing networks across multiple office locations with cloud-managed SD-WAN, VPN tunnels, and centralised policies.
View DetailsEvaluate whether your business is ready to transition from traditional WAN to SD-WAN — current infrastructure, ISP diversity, and application needs.
View DetailsBackup strategy guides, disaster recovery testing checklists, and business continuity planning templates for data protection.
Design a 3-2-1 backup strategy covering on-site, off-site, and cloud backup — frequency, retention, encryption, and recovery testing.
View DetailsTest your disaster recovery plan with tabletop exercises, partial failovers, and full simulation drills — scheduling and documentation.
View DetailsClassify your business data by sensitivity and criticality to prioritise backup frequency, security controls, and retention periods.
View DetailsCreate a business continuity plan covering IT systems, communication chains, recovery procedures, and staff responsibilities.
View DetailsDefine how long to keep backups based on legal requirements, industry regulations, and business operational needs.
View DetailsWebsite planning templates, performance audit checklists, and CMS selection guides for your web development projects.
Capture your website's functional and non-functional requirements before development — user stories, features, integrations, and constraints.
View DetailsDefine scope, objectives, target audience, brand guidelines, and success metrics for your web development project.
View DetailsAudit page speed, Core Web Vitals, image optimisation, caching, CDN configuration, and render-blocking resources.
View DetailsVerify WCAG 2.1 AA compliance across navigation, content, forms, colour contrast, media, and assistive technology support.
View DetailsCompare WordPress, Shopify, custom builds, and headless CMS options — features, costs, scalability, and best-fit scenarios.
View DetailsCybersecurity checklists, GDPR compliance guides, phishing awareness materials, and incident response planning templates.
Evaluate your organisation's security posture across networks, endpoints, identity management, data protection, and staff awareness.
View DetailsEnsure your data handling meets UK GDPR requirements — lawful basis, consent, data subject rights, breach notification, and record keeping.
View DetailsTrain your team to identify and report phishing attempts — real-world examples, red flags, simulation exercises, and reporting procedures.
View DetailsImplement a robust password policy covering complexity requirements, rotation schedules, MFA enforcement, and privileged account management.
View DetailsStructured incident response plan covering detection, containment, eradication, recovery, and post-incident review with role assignments.
View DetailsSearch engine optimisation resources covering technical audits, keyword research, on-page optimisation, link building, and performance reporting.
Comprehensive checklist covering technical SEO, on-page optimisation, off-page factors, local SEO, and analytics setup with scoring and priority actions.
View DetailsStep-by-step guide to finding, evaluating, and prioritising target keywords including search intent analysis, competitor research, and local keyword strategy.
View DetailsPage-by-page template for optimising title tags, meta descriptions, headers, content, images, and technical elements with a batch tracking spreadsheet.
View DetailsEthical link building tactics for UK businesses covering guest posting, digital PR, local links, outreach templates, and a prospecting tracking system.
View DetailsMonthly SEO performance report template covering organic traffic, keyword rankings, technical health, content performance, and link building with action planning.
View DetailsGoogle Ads resources covering account audits, campaign setup, budget planning, performance reporting, and conversion rate optimisation.
Comprehensive checklist covering account structure, keyword strategy, ad copy, bidding, conversion tracking, landing pages, and Quality Score with scoring and priority actions.
View DetailsStep-by-step guide to setting up Google Ads campaigns from scratch, covering account structure, keyword research, ad copy, conversion tracking, and first 30-day optimisation.
View DetailsStructured template for planning, allocating, and tracking your Google Ads budget across campaigns and seasons with variance analysis and reallocation frameworks.
View DetailsMonthly Google Ads performance report template covering executive summary, keyword analysis, device breakdown, and actionable recommendations with stakeholder-ready formatting.
View DetailsPractical guide to improving Google Ads landing page conversion rates through A/B testing, CTA optimisation, form design, page speed improvements, and data-driven measurement.
View DetailsCyber Essentials Plus certification resources covering preparation guides, requirements checklists, policy templates, certification comparisons, and vulnerability assessments.
Comprehensive guide covering all five Cyber Essentials technical controls, step-by-step preparation checklists, common pitfalls, an 8–12 week preparation timeline, and what to expect on examination day.
View DetailsComplete checkbox checklist of all Cyber Essentials Plus requirements organised by the five control areas, with evidence needed and pass/fail criteria for each item.
View DetailsSix ready-to-use policy templates aligned with Cyber Essentials Plus requirements: Acceptable Use, Password, Patch Management, Access Control, BYOD, and Incident Response.
View DetailsDetailed comparison of the UK’s two most important security certifications covering scope, cost, timeline, complexity, industry requirements, and a decision framework.
View DetailsPractical guide to understanding vulnerability scanning, interpreting CVSS scores, prioritising remediation, and meeting Cyber Essentials Plus scanning requirements.
View DetailsPlanning resources for business internet — connectivity audits, ISP comparisons, leased line decisions, failover planning, and speed optimisation.
Audit your current internet setup across all sites — connection types, speeds, SLAs, failover, and contract terms with a structured scoring system.
View DetailsA structured guide for comparing business ISPs — evaluation criteria, contract negotiation tips, and a weighted scoring framework for shortlisting providers.
View DetailsA decision-making template comparing leased lines against business broadband — costs, performance, SLAs, and use-case suitability analysis.
View DetailsPlan your internet resilience strategy — failover configurations, redundancy options, automatic switchover testing, and business continuity for connectivity.
View DetailsUnderstand and optimise your business internet performance — speed testing methodology, bandwidth management, QoS configuration, and troubleshooting.
View DetailsPlanning resources for business VoIP — system readiness audits, migration guides, vendor comparisons, call quality troubleshooting, and phone security.
Assess whether your network and infrastructure are ready for VoIP — bandwidth, QoS, switching, PoE, and security with a structured scoring system.
View DetailsA step-by-step guide for migrating from traditional phones to VoIP — project planning, number porting, user training, and cutover procedures.
View DetailsCompare VoIP providers side by side — features, pricing, call quality, support, integrations, and contract terms in a structured evaluation framework.
View DetailsDiagnose and fix VoIP call quality issues — jitter, latency, packet loss, echo, and one-way audio with systematic troubleshooting procedures.
View DetailsSecure your VoIP phone system against toll fraud, eavesdropping, and SIP attacks — configuration hardening, encryption, and monitoring best practices.
View DetailsAI readiness assessments, implementation guides, data quality audits, vendor selection templates, and ethics governance resources for UK businesses adopting artificial intelligence.
Assess your organisation's readiness for AI adoption across data infrastructure, technical skills, governance, security, and change management.
View DetailsStep-by-step guide to planning and executing an AI implementation project from strategy definition through to production deployment.
View DetailsAudit your data quality across completeness, accuracy, freshness, governance, integration, and bias to ensure your data is AI-ready.
View DetailsStructured template for evaluating and comparing AI vendors and platforms with requirements definition, scoring criteria, and decision framework.
View DetailsPractical guide to AI ethics and governance for UK businesses covering regulation, transparency, data privacy, and accountability frameworks.
View DetailsDatabase performance audits, migration planning guides, backup and recovery templates, security assessments, and scaling optimisation resources for UK businesses.
Audit your database performance across query optimisation, indexing, storage I/O, connection pooling, caching, and monitoring.
View DetailsStep-by-step guide to planning and executing a database migration from assessment and strategy through to post-migration optimisation.
View DetailsStructured template for documenting your backup strategy, recovery procedures, disaster recovery planning, and compliance testing.
View DetailsAssess your database security across access control, encryption, audit logging, network isolation, vulnerability management, and UK GDPR compliance.
View DetailsPractical guide to scaling your database infrastructure covering capacity planning, vertical scaling, horizontal scaling, read replicas, and cost optimisation.
View DetailsPut these resources to use — or get in touch with our team for an obligation-free chat about your business IT.