Skip to content
Main Menu
  • Home
  • Managed IT
  • Cyber Security
  • Voice
  • M365
  • Business Automation
  • App Dev
  • Contact Us
    • Call Us: 01305310006
    • Email: HELLO@HGCIT.CO.UK
  • Blog
IT Services and Support

6 Disaster recovery plan examples You Should Know

  • Tim Garratt
  • September 15, 2025
  • 6:53 am

Request a Call Back

In the face of unexpected disruptions, from localised flooding in Manchester to a critical server failure in a Glasgow office, having a robust disaster recovery plan is non-negotiable. It’s the strategic document that ensures your business can resume operations swiftly, minimise data loss, and protect its reputation. Yet, moving from theory to a practical, actionable plan can be a significant hurdle for many small and medium-sized businesses across the UK.

This article cuts through the abstract concepts by providing tangible disaster recovery plan examples. We will deconstruct six distinct models, including hot and cold sites, cloud-based solutions, and virtualisation strategies. Rather than offering surface-level descriptions, we will analyse the strategic thinking behind each approach, highlighting the specific scenarios where they excel. You will gain actionable insights into their core components, potential costs, and the critical lessons learned from real-world applications.

The goal is to equip you with the knowledge to select and customise a strategy that fits your organisation’s unique operational needs and budget. Each example serves as a blueprint, offering replicable methods and clear takeaways you can implement immediately. To facilitate the initial setup, consider leveraging a structured disaster recovery planning template to guide your efforts. This resource helps organise your thoughts and ensures you cover all critical bases from the outset, transforming a daunting task into a manageable process. Let’s explore the plans that can safeguard your business's future.

1. Hot Site Disaster Recovery

A hot site is the pinnacle of disaster recovery preparedness. It is a fully operational, duplicate data centre or IT environment that runs in parallel with your primary production site. It contains all the necessary hardware, software, and real-time or near-real-time synchronised data, allowing for an almost instantaneous switch-over, often called a failover, in the event of a disaster.

This approach is designed for businesses where even a few minutes of downtime can result in catastrophic financial loss, reputational damage, or regulatory penalties. It stands as a premium example of a disaster recovery plan, prioritising business continuity above all else.

How a Hot Site Works

A hot site maintains a mirrored copy of your primary environment. Data is continuously replicated from the live system to the hot site, ensuring that the backup is always current. When a disaster strikes the primary site-be it a power outage, cyber-attack, or natural disaster-traffic is automatically or manually rerouted to the hot site. Because the site is always on and synchronised, the transition is seamless for end-users, who may not even realise a failover has occurred.

Key Metrics: RTO and RPO

The effectiveness of any disaster recovery solution is measured by two critical metrics: the Recovery Time Objective (RTO) and the Recovery Point Objective (RPO).

  • RTO: The maximum acceptable time your application can be offline.
  • RPO: The maximum acceptable amount of data loss, measured in time.

The following bar chart visualises the typical RTO and RPO targets for a well-implemented hot site strategy, demonstrating why it's the gold standard for business continuity.

Infographic showing key data about Hot Site Disaster Recovery

As the chart illustrates, hot sites are designed to minimise both downtime and data loss to mere minutes, making them ideal for mission-critical systems.

Strategic Breakdown and Actionable Takeaways

While traditionally the domain of large enterprises, cloud services have made hot sites more accessible for UK SMBs. Here’s how to approach it strategically.

  • Identify Mission-Critical Systems: Not every application needs a hot site. Analyse your business processes to identify systems (e.g., e-commerce platforms, customer databases, payment gateways) where downtime is intolerable. Focus your investment there.
  • Embrace Cloud-Based DRaaS: Cloud providers like AWS, Azure, and Google Cloud offer Disaster Recovery as a Service (DRaaS) solutions. These allow you to create a hot site environment without the massive capital expenditure of building and maintaining a physical secondary data centre.
  • Prioritise Automated Failover: Manual failover processes are prone to human error, especially during a high-stress disaster event. Implement automated monitoring and failover triggers to ensure a swift and reliable transition.
  • Test Relentlessly: A disaster recovery plan is only effective if it works. Conduct regular, scheduled failover tests to validate your procedures, train your staff, and identify any configuration drift between the primary and hot sites.

When to Use a Hot Site

A hot site is the right choice when your business operates in a sector with zero tolerance for service interruptions. This includes financial services handling real-time transactions, healthcare organisations managing patient records, and online retailers in Manchester or Bristol where every minute of downtime equals lost sales. If your operations are highly dependent on continuous data availability and system uptime, the investment in a hot site provides unparalleled protection and peace of mind.

2. Cold Site Disaster Recovery

A cold site represents a more budget-conscious approach to disaster recovery. It is essentially a pre-arranged physical facility that provides the basic infrastructure-such as space, power, cooling, and network connectivity-but does not come equipped with any pre-installed computer hardware, software, or data. This makes it a foundational component of many disaster recovery plan examples, but one that requires significant effort to activate.

Cold Site Disaster Recovery

Unlike a hot site, which is ready for immediate failover, a cold site is a dormant shell. In the event of a disaster, the organisation is responsible for transporting, installing, and configuring all necessary IT equipment and restoring data from backups before operations can resume. This approach trades recovery speed for a substantial reduction in cost.

How a Cold Site Works

When a disaster renders the primary business location unusable, the disaster recovery team activates the cold site plan. This involves shipping pre-sourced or newly acquired servers, workstations, and networking gear to the facility. Concurrently, the most recent offsite backups (tapes, disks, or cloud-based snapshots) are retrieved and brought to the site. IT staff then work to build the entire operational environment from the ground up, a process that can take days or even weeks.

Key Metrics: RTO and RPO

The trade-off for the cost savings of a cold site is clearly reflected in its recovery metrics. The manual setup required significantly extends the time needed to get systems back online.

  • RTO: The maximum acceptable time your application can be offline.
  • RPO: The maximum acceptable amount of data loss, measured in time.

For a cold site, the RTO is measured in days or weeks, as it encompasses hardware procurement, installation, and data restoration. The RPO depends entirely on the organisation's backup schedule, often ranging from several hours to a full day, as data is restored from the last available backup. This makes cold sites unsuitable for mission-critical systems that require constant availability.

Strategic Breakdown and Actionable Takeaways

A cold site can be a viable and pragmatic strategy for UK SMBs, particularly for less critical business functions where extended downtime is tolerable. Success hinges on meticulous planning and preparation.

  • Maintain Detailed Inventories: Keep an exhaustive and up-to-date inventory of all hardware, software licences, and configuration details. This documentation is your blueprint for rebuilding the IT environment and is absolutely critical for a successful recovery.
  • Establish Vendor Agreements: Pre-negotiate contracts with hardware vendors to guarantee the rapid procurement and delivery of replacement equipment in an emergency. Waiting to find a supplier after a disaster has struck will cause severe delays.
  • Document Everything: Create a comprehensive, step-by-step recovery playbook. This document should detail every procedure, from racking servers to restoring data, and be stored in a secure, accessible offsite location.
  • Store Backups Offsite: Your data backups are the lifeblood of your recovery. Ensure they are stored securely at a separate location from your primary site and are tested regularly for integrity and restorability.

When to Use a Cold Site

A cold site is an appropriate choice when cost is a primary constraint and the business can withstand a significant period of downtime. It is well-suited for non-critical administrative systems, archival data storage, and development environments. For a manufacturing firm in Leeds or an educational institution in Glasgow, a cold site could be used to recover inventory management or student information systems where an RTO of several days is acceptable and does not halt core operations. It provides a foundational level of disaster protection without the high operational expense of a hot or warm site.

3. Warm Site Disaster Recovery

A warm site serves as a pragmatic middle-ground in disaster recovery planning, offering a balance between the instant readiness of a hot site and the bare-bones nature of a cold site. It is a secondary facility equipped with the necessary hardware, network connectivity, and foundational software, but it does not run in real-time sync with the primary production environment.

Warm Site Disaster Recovery

This approach is one of the most practical disaster recovery plan examples for businesses that can tolerate a few hours of downtime but need a more robust solution than a cold site. It is designed for organisations where business-critical functions must be restored relatively quickly, but instantaneous failover is not a strict requirement.

How a Warm Site Works

A warm site facility is pre-configured with servers, storage, and networking equipment that mirror the primary site's infrastructure. While the hardware is powered on and ready, the most recent data and applications are not loaded until a disaster is declared. In the event of an incident, the disaster recovery team must travel to the site (or access it remotely), restore the latest data from backups (e.g., tape or cloud storage), and bring the systems online. This process takes longer than a hot site failover but is significantly faster than building an environment from scratch.

Key Metrics: RTO and RPO

The value of a warm site lies in its balanced approach to the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). It offers a significant improvement over cold sites without the premium cost of a hot site.

  • RTO: The time taken to restore services, typically measured in hours to a day.
  • RPO: The amount of data loss, usually dependent on the last successful backup, which could be several hours or up to 24 hours.

A warm site strategy accepts a slightly longer recovery window and a larger potential for data loss in exchange for lower operational costs, making it a viable option for many UK businesses.

Strategic Breakdown and Actionable Takeaways

Implementing a warm site requires careful planning to bridge the gap between backup and full recovery. Here’s a strategic approach for businesses in cities like Birmingham or Leeds.

  • Establish Robust Backup Protocols: Your warm site's effectiveness depends entirely on your last backup. Implement a regular, automated backup schedule (e.g., every 4-6 hours for critical data) and ensure copies are stored off-site and are easily accessible for restoration.
  • Maintain Configuration Parity: Regularly update the hardware and core software at the warm site to match the primary site. Configuration drift is a common point of failure, so synchronising system patches and infrastructure settings is crucial for a smooth recovery. Explore how a robust managed IT infrastructure can help maintain this consistency.
  • Document Everything: Create and maintain detailed documentation for all custom configurations, application dependencies, and restoration procedures. During a crisis, this documentation will be an invaluable guide for your technical team.
  • Conduct Quarterly Activations: Don't wait for a disaster to discover a flaw in your plan. Conduct quarterly tests where you fully activate the warm site. This validates your procedures, familiarises your team with the process, and helps identify any issues before a real emergency occurs.

When to Use a Warm Site

A warm site is the ideal solution when your business needs to restore operations within a business day, but immediate, minute-by-minute continuity is not essential. It's a popular choice for organisations like regional banks for their customer service applications, insurance firms for claims processing systems, and retail chains for inventory management. If your operations can withstand a few hours of downtime without causing severe financial or reputational harm, a warm site provides a cost-effective and highly reliable recovery strategy.

4. Cloud-Based Disaster Recovery as a Service (DRaaS)

Disaster Recovery as a Service (DRaaS) has democratised business continuity, leveraging the power and scalability of the cloud to offer robust protection that was once exclusive to large corporations. DRaaS involves replicating your entire IT infrastructure, including servers, data, and applications, to a third-party cloud provider's environment. This model eliminates the need for a secondary physical site, making enterprise-grade recovery accessible and affordable.

This approach represents a significant shift from traditional disaster recovery methods. Instead of investing heavily in duplicate hardware and a dedicated recovery location, UK businesses can pay a subscription fee to a provider like AWS, Azure, or a specialised service. This makes it a prime example of a modern, flexible disaster recovery plan.

How DRaaS Works

In a DRaaS model, your systems are continuously or periodically replicated to a virtual environment hosted in the cloud. The provider manages the recovery infrastructure, ensuring it is always ready. When a disaster hits your primary site, you can initiate a failover to the cloud-hosted environment, allowing you to resume operations quickly from a remote location. Once your primary site is restored, you can failback your systems from the cloud.

Key Metrics: RTO and RPO

DRaaS solutions offer significant flexibility, allowing businesses to tailor their recovery objectives to their budget and specific needs. The RTO and RPO can be nearly as impressive as a hot site, depending on the service level agreement (SLA) chosen.

  • RTO: Can range from minutes to a few hours, depending on the level of automation and the complexity of the environment being recovered.
  • RPO: Often near-zero, with continuous data replication ensuring minimal data is lost between the last backup and the disaster event.

DRaaS strikes an effective balance between cost and performance, providing rapid recovery capabilities without the substantial upfront capital investment of a dedicated hot site.

Strategic Breakdown and Actionable Takeaways

Adopting DRaaS requires a clear strategy to maximise its benefits and avoid common pitfalls. This approach is highly relevant for SMBs across the UK, from tech startups in Bristol to manufacturing firms in Manchester.

  • Choose the Right Provider and Model: Not all DRaaS solutions are the same. Evaluate providers based on their recovery performance SLAs, security certifications, and support. Decide between self-service, assisted, or fully managed DRaaS based on your in-house IT expertise.
  • Understand Egress Costs: While replicating data to the cloud is often inexpensive, retrieving it during a recovery (data egress) can incur significant costs. Model these potential expenses as part of your disaster recovery budget to avoid any surprises.
  • Prioritise Security and Compliance: Your data will be stored with a third party, so robust encryption-both in transit and at rest-is non-negotiable. Ensure the provider meets any UK-specific regulatory requirements for your industry, such as GDPR. For a comprehensive overview of secure IT solutions, you can explore more about business IT solutions on hgcit.co.uk.
  • Test Failover and Failback Processes: Regular testing is critical. A successful failover is only half the battle; you must also have a well-documented and tested plan to failback to your primary systems once they are operational. Conduct at least biannual tests to ensure the entire process works smoothly.

When to Use DRaaS

DRaaS is the ideal solution for small to medium-sized businesses that require low RTOs and RPOs but lack the capital or resources to build and maintain a secondary physical disaster recovery site. It is perfectly suited for organisations with a growing or fluctuating IT environment, as the cloud offers unmatched scalability. If your business needs a cost-effective, reliable, and powerful disaster recovery plan example that minimises management overhead, DRaaS is the leading modern choice.

5. Backup and Restore Disaster Recovery

The backup and restore method is the foundational and most widely adopted disaster recovery strategy. It involves regularly creating copies (backups) of data and systems, which are then stored securely. In the event of a disaster, these backups are used to restore operations on new or existing hardware.

This approach is one of the most fundamental examples of a disaster recovery plan, offering a cost-effective solution for data protection. It's particularly well-suited for businesses that can tolerate a longer recovery period, as it is less complex and expensive to implement compared to more advanced options like hot sites.

How Backup and Restore Works

The process is straightforward: at scheduled intervals (daily, weekly, or hourly), data from your production environment is copied to a separate storage medium. This could be anything from external hard drives and tapes to cloud-based storage services. When a disaster renders the primary systems unusable, the IT team initiates the recovery process by acquiring new hardware, installing the necessary operating systems and software, and then restoring the data from the most recent valid backup.

Key Metrics: RTO and RPO

The effectiveness of a backup and restore plan hinges on how it aligns with your business's tolerance for downtime and data loss.

  • RTO: The maximum acceptable time your application can be offline.
  • RPO: The maximum acceptable amount of data loss, measured in time.

For backup and restore, the RTO is typically measured in hours or even days, as it includes the time needed to procure hardware, reinstall software, and transfer data. The RPO is determined by the frequency of your backups; a daily backup schedule means a potential RPO of up to 24 hours. This makes it a trade-off between cost and recovery speed.

Strategic Breakdown and Actionable Takeaways

While simple in concept, an effective backup and restore strategy requires meticulous planning and execution. It's a vital component for UK SMBs looking for a pragmatic approach to data protection.

  • Follow the 3-2-1 Backup Rule: This industry-standard practice is non-negotiable. Maintain at least three copies of your data, on two different types of media, with at least one copy stored off-site (e.g., in the cloud or a secure physical location).
  • Test Your Restores, Not Just Your Backups: A backup is useless if it can't be restored. Regularly schedule and perform full restore tests to a non-production environment. This validates the integrity of your data and familiarises your team with the recovery procedure.
  • Automate and Monitor: Implement automated backup schedules to ensure consistency. Use monitoring and alerting systems to notify you immediately of any backup failures, so you can address them before they become a critical issue.
  • Document Everything: Create a detailed, step-by-step recovery document. This guide should be clear enough for another IT professional to follow in a high-stress situation. Store a copy of this plan off-site and in the cloud.
  • Encrypt Sensitive Data: To protect against data breaches, especially if backups are stored off-site or in the cloud, ensure all backup data is encrypted both in transit and at rest.

When to Use Backup and Restore

A backup and restore plan is the ideal choice for businesses where immediate recovery is not a critical operational requirement. This includes many small businesses, professional services firms in cities like Leeds or Edinburgh, and organisations with less time-sensitive data. If your business can withstand several hours or even a day of downtime without catastrophic financial or reputational harm, this method provides a reliable and budget-friendly layer of protection against data loss.

6. Virtualization-Based Disaster Recovery

Virtualization-based disaster recovery uses virtual machine (VM) technology to abstract your servers and applications from physical hardware. By encapsulating entire operating systems, applications, and data into portable VM files, this approach offers incredible flexibility and speed, making it a cornerstone of modern business continuity strategies.

This method is particularly powerful because it decouples your IT environment from specific hardware dependencies. A server running on a particular brand of hardware in your Glasgow office can be restored onto completely different hardware in a recovery site, or even in the cloud, with minimal reconfiguration. This hardware independence dramatically simplifies and accelerates the recovery process.

How Virtualization-Based Recovery Works

At its core, this strategy involves creating and maintaining replicas or backups of your live virtual machines at a secondary location. Tools like VMware's Site Recovery Manager or Microsoft's Hyper-V Replica continuously copy changes from the primary VMs to the recovery site. In the event of a disaster, these dormant VMs can be powered on, taking over the workload from the failed primary systems.

The process is far more efficient than traditional physical server recovery, which would require sourcing identical hardware. With virtualization, the recovery is a software-level operation, allowing you to get back online much faster.

Key Metrics: RTO and RPO

Virtualization-based DR offers a highly flexible balance between cost and performance, allowing businesses to achieve impressive recovery targets that were once only possible with more expensive solutions.

  • RTO: The maximum acceptable time your application can be offline.
  • RPO: The maximum acceptable amount of data loss, measured in time.

The typical RTO for virtualization-based recovery is measured in minutes to hours, depending on the replication technology and automation in place. The RPO can also be configured from minutes down to mere seconds, providing a robust defence against data loss without the cost of a full hot site.

Strategic Breakdown and Actionable Takeaways

This approach is highly accessible for UK SMBs, providing enterprise-grade resilience without the corresponding price tag. Here’s a strategic guide to implementing it.

  • Leverage Replication Technology: Utilise the native replication features built into your virtualization platform, such as VMware vSphere Replication or Microsoft Hyper-V Replica. These tools provide a cost-effective way to protect your critical VMs.
  • Automate with Orchestration: For complex environments with many interdependent systems, use orchestration tools like VMware Site Recovery Manager or System Center Virtual Machine Manager. These tools automate the entire failover and failback process, reducing human error and ensuring systems come online in the correct order.
  • Test Non-Disruptively: One of the biggest advantages of virtualization is the ability to test your DR plan without impacting production. You can clone your replicated VMs into an isolated network "bubble" to conduct a full test of the recovery process, verifying boot sequences and application functionality.
  • Plan for Resource Management: Ensure your recovery site has sufficient compute, storage, and networking resources to run your critical workloads. Monitor resource consumption patterns on your primary site to accurately forecast recovery site requirements. Many organisations partner with an IT provider to manage this complexity, making it a key component of their managed IT services for small and medium sized businesses.

When to Use Virtualization-Based DR

Virtualization-based disaster recovery is an excellent fit for almost any business that has virtualised its server infrastructure. It is particularly well-suited for SMBs in places like Cardiff or Leeds that need a robust, flexible, and cost-effective way to protect critical business applications. If you need to recover quickly from a disaster but cannot justify the expense of a fully synchronised hot site, this approach offers the perfect middle ground, delivering powerful protection and rapid recovery capabilities.

Disaster Recovery Methods Comparison

Disaster Recovery Type Implementation Complexity 🔄 Resource Requirements ⚡ Expected Outcomes 📊 Ideal Use Cases 💡 Key Advantages ⭐
Hot Site Disaster Recovery High complexity; requires specialized expertise and ongoing maintenance Very high; full duplicate infrastructure Immediate failover, near-zero downtime (RTO: minutes, RPO: seconds) Mission-critical systems needing minimal downtime (e.g., financial services, healthcare) Minimal downtime, high confidence, automated failover
Cold Site Disaster Recovery Low complexity; manual setup after disaster Low; basic infrastructure only Long recovery times (days to weeks), possible significant data loss Non-critical applications with tolerance for extended downtime Lowest cost, flexible hardware/software choices
Warm Site Disaster Recovery Moderate complexity; requires hardware/software pre-installation and periodic backups Medium; pre-configured hardware, limited software Moderate recovery speed (hours to days), some data lag Moderate-criticality applications balancing cost and recovery speed Balanced cost/recovery time, faster than cold sites
Cloud-Based Disaster Recovery as a Service (DRaaS) Moderate; cloud expertise needed Medium to high; scalable pay-as-you-go resources Rapid recovery (minutes to hours), scalable and automated Any size organizations seeking cost-effective, scalable DR Rapid deployment, geographic redundancy, low management overhead
Backup and Restore Disaster Recovery Low complexity; manual restoration Low; backup media and storage Longest recovery time (days to weeks), possible data loss Organizations with high tolerance for downtime, cost-sensitive Lowest cost, simple implementation, flexible scheduling
Virtualization-Based Disaster Recovery Moderate complexity; requires virtualization skills Medium; virtual infrastructure and storage Faster recovery (hours), hardware-independent deployment Organizations leveraging virtualization for flexibility Hardware independence, faster deployment, snapshot recovery

Final Thoughts

We have navigated through a comprehensive landscape of disaster recovery plan examples, from the immediate readiness of a hot site to the cost-effective simplicity of backup and restore strategies. Each example, whether it’s a cloud-based DRaaS model or a meticulously planned cold site activation, offers a distinct blueprint for resilience. The core lesson is clear: there is no one-size-fits-all solution. Your ideal strategy is a bespoke tapestry woven from your specific operational needs, risk tolerance, and financial realities.

The journey from theory to a functional, battle-ready disaster recovery plan begins with understanding these diverse approaches. The examples discussed highlight that the most effective plans are not static documents but living, breathing frameworks. They are built on a foundation of thorough risk assessment, clear communication protocols, and, most importantly, regular, rigorous testing. Ignoring any one of these pillars leaves your business exposed to unnecessary risk.

Synthesising the Examples for Your Business

Reflecting on the various disaster recovery plan examples, several critical themes emerge that are universally applicable for businesses across the UK, from a tech start-up in Manchester to a manufacturing firm in Glasgow.

  • RTO and RPO are Your North Stars: Every decision, from choosing a hot site versus a cold site to selecting a DRaaS provider, hinges on how quickly you need to recover (Recovery Time Objective) and how much data you can afford to lose (Recovery Point Objective). These two metrics should guide your entire strategy.
  • Testing is Non-Negotiable: A plan that has not been tested is merely a hypothesis. The examples of virtualisation and DRaaS particularly underscore the ease with which modern solutions can be tested without disrupting live operations. Schedule and conduct regular drills to expose weaknesses before a real disaster does.
  • Clarity in Crisis is Key: A successful recovery depends on people. Your plan must clearly define roles, responsibilities, and communication channels. Who declares a disaster? Who contacts staff, suppliers, and customers? A well-documented and accessible plan prevents chaos and enables decisive action.

From Blueprint to Business Continuity

The ultimate goal of studying these disaster recovery plan examples is to build more than just a recovery mechanism; it's to cultivate a culture of resilience. It’s about ensuring your business can withstand shocks, adapt to disruptions, and continue to serve your customers and support your employees, regardless of the circumstances. This proactive stance transforms disaster recovery from an IT-centric task into a strategic business advantage.

By taking the insights from these examples – the strategic foresight of a warm site, the flexibility of cloud recovery, the foundational security of robust backups – you are empowered to craft a plan that is not just a document, but a genuine asset. This is your organisation's commitment to continuity, a promise to your stakeholders that you are prepared for the unexpected. The time and resources invested now are a small price to pay for the survival and stability of your business tomorrow.


Navigating the complexities of disaster recovery can be daunting, but you don't have to do it alone. If you're ready to translate these examples into a customised, robust disaster recovery plan for your business, contact the experts at HGC IT Solutions. We specialise in creating bespoke IT resilience strategies that protect UK businesses.

Request a Call Back

Managed IT Support

At HGC IT Solutions, we provide expert IT services in Dorset, tailored to meet your specific needs. Our certified team provides world class support, cost-effective solutions, and enhanced security to protect your business.

  • Cookie Policy
  • Privacy Statement

© All Rights Reserved.

Get In Touch
  • Email: hello@hgcit.co.uk
  • Phone: 01305 310006
Services
  • Managed IT Support
  • Cyber Security
  • Voice
  • App Development
  • Why you need an MSP
  • IT Support for SME
  • Affordable IT Services
  • London IT Support
Locations
  • Dorset
  • Portland
  • Dorchester & Bridport
  • Poole & Bournemouth
  • Blandford Forum
IT Services and Support
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}