SlideShare une entreprise Scribd logo
1  sur  9
Dynamics 365 Security:
How To Keep Your Data Safe
Content
• Overview and Why It’s Important
• Role-based Security
• Business Units
• Record-based Security
• Teams
• Hierarchy Security
• Field-based Security
Overview and Why It’s Important
• Data hacking and security breaches
don’t always happen because of
hackers. Employees and people tasked
with handling this information are
mostly responsible for these breaches
and according to Verizon, 77% of data
breaches include an insider.
• For example, in 2014 Facebook
released 6 million user’s personal data
by mistake and an employee at
Snapchat was a victim of a phishing e-
mail scam, divulging information on
700 employees. Accidental or not, the
biggest threat to data security are the
ones responsible with using and
handling the data.
What can be done?
The key is finding the perfect balance between
security and usability. Some companies conjure
far too tight a control over their systems
(biosecurity, multi-level authentication, data
policies which allow access to only basic
information, etc) which makes using the systems
impossible for employees. This has a negative
effect, with users opting out of inputting data
and creating their own systems for record
keeping, in order for them to have easier access
to the information.
Finding the right business system is key and Microsoft Dynamics 365 is one
CRM system that helps make data secure while providing ease of use to users.
By taking advantage of the following functions, companies can ensure greater
data security.
Role-based Security
• Role-based security is ideal for grouping collections of privileges into roles that underline the
tasks that can be performed by certain users or teams. The system includes a set of predefined
security roles, which makes security management easier. The privileges define access to
creation, reading, writing, deleting and sharing records set by entity type. They also define how
broadly the privilege applies, whether it’s at user level, business unit level, or across the entire
company.
• The clusters can be as general or detailed as desired. So, for example you can choose what a
Sales representative has access to, whether they can read, write and share accounts and whether
they have the option of deleting any accounts except their own. If say there’s a more senior user,
like a Head of Sales, they can perform more tasks such as modifying data and viewing resources
as well as assigning accounts to anyone in the system.
• All Dynamics 365 users need to have a security role to access the system. These roles are
cumulative as well, which means that a user can fulfil more than one role in the company and be
given multiple roles to combine access to privileges required.
Business Units
• Business units are groups of users in Dynamics 365 that allow for a company to build
their business structure in the system. Some data needs to be kept separate from
different groups in the organisation, but there also needs to be room for collaboration
and by taking advantage of business units, companies can do that.
Record-based security
• Companies can use record-based security to take data security even further. This
feature allows for users with certain privileges to share them with users who lack those
particular ones. So, for example one user who owns a record can grant access to the
record to a user on another team if required. This sharing of privileges can be
customised, like say wanting to allow the user to view the record, but not give them
access to write.
• Once these privileges have taken effect, only then can the user access the rights. If the
user does not have the privilege to view, or read an account, they won’t be able to, even
if another user may give them access to a specific account through sharing.
Teams
By taking advantage of the teams function,
companies can effectively group users
together. It’s an easy way to share business
objects and allow for collaboration with
different people across different units. If a
team is part of a business unit, it can
include users from other units. So, for
example if you have users part of an IT
department that are split into two teams:
development and testing, but there is a
project that needs them to collaborate.
Therefore, access levels are shared
between members.
Hierarchy security
Field-based security restricts access to certain high business impact fields in an entity only to certain
users or teams. In layman’s terms it allows to read or write access of unique fields to be controlled
tightly. For example, a user may have rights to read an account, but can be restricted from viewing
specific fields in all accounts.
Field-based security
The hierarchy security model is a feature that came into being in 2015. This a crucial feature for
companies where the hierarchical structure changes often. This function is useful for example when
a director is assigned a senior manager as a direct report. This way the director can access their
report’s information and data. Also, if a colleague is covering for another employee, a company can
assign them as a subordinate and the colleague will have access to all of the information required.
It’s a simple and flexible approach to ensuring the right access to data at the correct time.
Looking for Talent?
Are you currently going through a
migration or plan to undertake one and
need some extra hands on deck? We’re
specialists in MS Dynamics recruitment
so contact us to find out how we can
help you attract the best talent out
there!
Telephone: 0161 839 4330
E-mail: info@shapeitrecruitment.co.uk

Contenu connexe

En vedette

R. Villano - Las fotos (Appendice ES 2)
R. Villano - Las fotos (Appendice ES 2)R. Villano - Las fotos (Appendice ES 2)
R. Villano - Las fotos (Appendice ES 2)Raimondo Villano
 
Students’ intentions to use technology in their learning: The effects of inte...
Students’ intentions to use technology in their learning: The effects of inte...Students’ intentions to use technology in their learning: The effects of inte...
Students’ intentions to use technology in their learning: The effects of inte...Alexander Whitelock-Wainwright
 
IkaLog Presentation at Kansai Open Forum 2015
IkaLog Presentation at Kansai Open Forum 2015IkaLog Presentation at Kansai Open Forum 2015
IkaLog Presentation at Kansai Open Forum 2015Takeshi HASEGAWA
 
How to win direct hotel bookings from data
How to win direct hotel bookings from dataHow to win direct hotel bookings from data
How to win direct hotel bookings from datatnooz
 
MicroMedia - Markkinointia MaaS-palveluna 2017
MicroMedia - Markkinointia MaaS-palveluna 2017MicroMedia - Markkinointia MaaS-palveluna 2017
MicroMedia - Markkinointia MaaS-palveluna 2017Kimmo Luoma
 
Quelle stratégie éditoriale pour booster votre performance SEO ? - Petit déj...
Quelle stratégie éditoriale pour booster votre performance SEO ?  - Petit déj...Quelle stratégie éditoriale pour booster votre performance SEO ?  - Petit déj...
Quelle stratégie éditoriale pour booster votre performance SEO ? - Petit déj...Peak Ace
 
We've been building this for years now
We've been building this for years nowWe've been building this for years now
We've been building this for years nowJacob Oduor
 
Webinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4jWebinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4jNeo4j
 
確実な再起動からはじめる クラウドネイティブオペレーション
確実な再起動からはじめる クラウドネイティブオペレーション確実な再起動からはじめる クラウドネイティブオペレーション
確実な再起動からはじめる クラウドネイティブオペレーションToru Makabe
 
2014 violencia psicologica
2014 violencia psicologica2014 violencia psicologica
2014 violencia psicologicaMiguel Salazar
 
Q4 and Full Year 2016 Results
Q4 and Full Year 2016 ResultsQ4 and Full Year 2016 Results
Q4 and Full Year 2016 ResultsGranColombiaGold
 
Lean and Kanban-based Software Development
Lean and Kanban-based Software DevelopmentLean and Kanban-based Software Development
Lean and Kanban-based Software DevelopmentTathagat Varma
 

En vedette (14)

R. Villano - Las fotos (Appendice ES 2)
R. Villano - Las fotos (Appendice ES 2)R. Villano - Las fotos (Appendice ES 2)
R. Villano - Las fotos (Appendice ES 2)
 
Students’ intentions to use technology in their learning: The effects of inte...
Students’ intentions to use technology in their learning: The effects of inte...Students’ intentions to use technology in their learning: The effects of inte...
Students’ intentions to use technology in their learning: The effects of inte...
 
IkaLog Presentation at Kansai Open Forum 2015
IkaLog Presentation at Kansai Open Forum 2015IkaLog Presentation at Kansai Open Forum 2015
IkaLog Presentation at Kansai Open Forum 2015
 
How to win direct hotel bookings from data
How to win direct hotel bookings from dataHow to win direct hotel bookings from data
How to win direct hotel bookings from data
 
Some Well-known Computer Scientists
Some Well-known Computer ScientistsSome Well-known Computer Scientists
Some Well-known Computer Scientists
 
MicroMedia - Markkinointia MaaS-palveluna 2017
MicroMedia - Markkinointia MaaS-palveluna 2017MicroMedia - Markkinointia MaaS-palveluna 2017
MicroMedia - Markkinointia MaaS-palveluna 2017
 
Quelle stratégie éditoriale pour booster votre performance SEO ? - Petit déj...
Quelle stratégie éditoriale pour booster votre performance SEO ?  - Petit déj...Quelle stratégie éditoriale pour booster votre performance SEO ?  - Petit déj...
Quelle stratégie éditoriale pour booster votre performance SEO ? - Petit déj...
 
We've been building this for years now
We've been building this for years nowWe've been building this for years now
We've been building this for years now
 
Webinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4jWebinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4j
 
Predicting employee burnout
Predicting employee burnoutPredicting employee burnout
Predicting employee burnout
 
確実な再起動からはじめる クラウドネイティブオペレーション
確実な再起動からはじめる クラウドネイティブオペレーション確実な再起動からはじめる クラウドネイティブオペレーション
確実な再起動からはじめる クラウドネイティブオペレーション
 
2014 violencia psicologica
2014 violencia psicologica2014 violencia psicologica
2014 violencia psicologica
 
Q4 and Full Year 2016 Results
Q4 and Full Year 2016 ResultsQ4 and Full Year 2016 Results
Q4 and Full Year 2016 Results
 
Lean and Kanban-based Software Development
Lean and Kanban-based Software DevelopmentLean and Kanban-based Software Development
Lean and Kanban-based Software Development
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Dynamics 365 security: How to keep your data safe

  • 1. Dynamics 365 Security: How To Keep Your Data Safe
  • 2. Content • Overview and Why It’s Important • Role-based Security • Business Units • Record-based Security • Teams • Hierarchy Security • Field-based Security
  • 3. Overview and Why It’s Important • Data hacking and security breaches don’t always happen because of hackers. Employees and people tasked with handling this information are mostly responsible for these breaches and according to Verizon, 77% of data breaches include an insider. • For example, in 2014 Facebook released 6 million user’s personal data by mistake and an employee at Snapchat was a victim of a phishing e- mail scam, divulging information on 700 employees. Accidental or not, the biggest threat to data security are the ones responsible with using and handling the data.
  • 4. What can be done? The key is finding the perfect balance between security and usability. Some companies conjure far too tight a control over their systems (biosecurity, multi-level authentication, data policies which allow access to only basic information, etc) which makes using the systems impossible for employees. This has a negative effect, with users opting out of inputting data and creating their own systems for record keeping, in order for them to have easier access to the information. Finding the right business system is key and Microsoft Dynamics 365 is one CRM system that helps make data secure while providing ease of use to users. By taking advantage of the following functions, companies can ensure greater data security.
  • 5. Role-based Security • Role-based security is ideal for grouping collections of privileges into roles that underline the tasks that can be performed by certain users or teams. The system includes a set of predefined security roles, which makes security management easier. The privileges define access to creation, reading, writing, deleting and sharing records set by entity type. They also define how broadly the privilege applies, whether it’s at user level, business unit level, or across the entire company. • The clusters can be as general or detailed as desired. So, for example you can choose what a Sales representative has access to, whether they can read, write and share accounts and whether they have the option of deleting any accounts except their own. If say there’s a more senior user, like a Head of Sales, they can perform more tasks such as modifying data and viewing resources as well as assigning accounts to anyone in the system. • All Dynamics 365 users need to have a security role to access the system. These roles are cumulative as well, which means that a user can fulfil more than one role in the company and be given multiple roles to combine access to privileges required.
  • 6. Business Units • Business units are groups of users in Dynamics 365 that allow for a company to build their business structure in the system. Some data needs to be kept separate from different groups in the organisation, but there also needs to be room for collaboration and by taking advantage of business units, companies can do that. Record-based security • Companies can use record-based security to take data security even further. This feature allows for users with certain privileges to share them with users who lack those particular ones. So, for example one user who owns a record can grant access to the record to a user on another team if required. This sharing of privileges can be customised, like say wanting to allow the user to view the record, but not give them access to write. • Once these privileges have taken effect, only then can the user access the rights. If the user does not have the privilege to view, or read an account, they won’t be able to, even if another user may give them access to a specific account through sharing.
  • 7. Teams By taking advantage of the teams function, companies can effectively group users together. It’s an easy way to share business objects and allow for collaboration with different people across different units. If a team is part of a business unit, it can include users from other units. So, for example if you have users part of an IT department that are split into two teams: development and testing, but there is a project that needs them to collaborate. Therefore, access levels are shared between members.
  • 8. Hierarchy security Field-based security restricts access to certain high business impact fields in an entity only to certain users or teams. In layman’s terms it allows to read or write access of unique fields to be controlled tightly. For example, a user may have rights to read an account, but can be restricted from viewing specific fields in all accounts. Field-based security The hierarchy security model is a feature that came into being in 2015. This a crucial feature for companies where the hierarchical structure changes often. This function is useful for example when a director is assigned a senior manager as a direct report. This way the director can access their report’s information and data. Also, if a colleague is covering for another employee, a company can assign them as a subordinate and the colleague will have access to all of the information required. It’s a simple and flexible approach to ensuring the right access to data at the correct time.
  • 9. Looking for Talent? Are you currently going through a migration or plan to undertake one and need some extra hands on deck? We’re specialists in MS Dynamics recruitment so contact us to find out how we can help you attract the best talent out there! Telephone: 0161 839 4330 E-mail: info@shapeitrecruitment.co.uk