Esther Kezia Thorpe
Five digital transformation tips for HR
Silhouette of a team with people icons overlaid representing digital HR
digital transformation

Five digital transformation tips for HR

Digital transformation efforts can start from within your own department
22 Sep 2020
Three ways to protect PDF documents
document management systems (DMS)

Three ways to protect PDF documents

How can you safeguard your organisation's documents?
19 Aug 2020
Why it’s time to take your documents digital
document management systems (DMS)

Why it’s time to take your documents digital

Unlock the benefits of PDFs with top-class software
12 Aug 2020
What is shadow IT?
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
6 Jul 2020
How to choose an embedded analytics vendor
business intelligence (BI)

How to choose an embedded analytics vendor

The advantages of embedded analytics can only be achieved in partnership with the right vendor
4 Jun 2020
Five ways the office is evolving for the future
flexible working

Five ways the office is evolving for the future

Technology isn't the only factor driving our changing office spaces
4 May 2020
What does the future of work look like?
Silhouettes of a team of office workers with a blue technology overlay to represent the future
Careers & training

What does the future of work look like?

How remote working, automation and AI will affect the way we work
28 Apr 2020
What to look for in a secure cloud system
Blue square background with a yellow cloud superimposed, with a cut-out key icon on it to represent cloud security
cloud security

What to look for in a secure cloud system

Not all cloud products support the same level of security, so what should organisations be looking out for?
15 Apr 2020
How the enterprise can embrace hybrid cloud
hybrid cloud

How the enterprise can embrace hybrid cloud

Hybrid cloud has a lot to offer organisations of all sizes, but enterprises in particular stand to gain so much
6 Apr 2020
CTO job description: What does a CTO do?
Business strategy

CTO job description: What does a CTO do?

More than a glorified IT manager, a CTO can have real clout in an organisation
1 Apr 2020
Five obstacles holding your hybrid cloud strategy back
Cloud illustrations on a blue background with a ladder
hybrid cloud

Five obstacles holding your hybrid cloud strategy back

Overcoming these challenges is key to a successful cloud migration strategy
31 Mar 2020
How to enhance your backup strategy
backup

How to enhance your backup strategy

No matter what stage your organisation’s backup strategy is at, there is always room to improve
27 Feb 2020
How digital workspaces are changing the way we work
software as a service (SaaS)

How digital workspaces are changing the way we work

The way we work is changing, and the way we manage our IT tools needs to change with it
21 Feb 2020
What is cloud-to-cloud backup?
Multi cloud illustration on a blue and orange coloured background, with real cloud images overlaid
cloud backup

What is cloud-to-cloud backup?

C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
18 Feb 2020
Five business benefits of Digital Transaction Management
Filing cabinets with digital art flowing up to numbers
business transformation

Five business benefits of Digital Transaction Management

What is Digital Transaction Management and how can it help your business?
6 Feb 2020
Who should take ownership of your cyber security strategy?
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
enterprise security

Who should take ownership of your cyber security strategy?

We explore the options of who should be in charge of this increasingly important area
31 Jan 2020
What is Breach and Attack Simulation (BAS)?
penetration testing

What is Breach and Attack Simulation (BAS)?

Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Why digital transformation is essential for business growth
Business man pressing a large phone screen with digital icons around him
Business strategy

Why digital transformation is essential for business growth

Whatever a company’s vision for the future, it must include digital transformation in order to grow
29 Jan 2020
Six ways boards can step up support for cyber security
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
27 Jan 2020
Our 5-minute guide to security awareness training
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
Security

Our 5-minute guide to security awareness training

How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
Four ways CIOs can drive digital transformation
digital transformation

Four ways CIOs can drive digital transformation

Practical steps business leaders can take to overcome digital transformation challenges
17 Jan 2020
What are the different types of ransomware?
Security

What are the different types of ransomware?

Ransomware comes in more than one form, so here's what to look out for
17 Jan 2020
How data can help SMBs with digital transformation
Big data
digital transformation

How data can help SMBs with digital transformation

Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
15 Jan 2020
Our 5-minute guide to enterprise cloud computing
Illustration of a code cloud raining over a city
Cloud

Our 5-minute guide to enterprise cloud computing

What is enterprise cloud computing, how is it used, and what are the business benefits?
15 Jan 2020
Nine tips to improve your disaster recovery strategy
Data centre with green high speed visualisation projection overlay
disaster recovery (DR)

Nine tips to improve your disaster recovery strategy

Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
29 Nov 2019
How can you protect your business from crypto-ransomware?
Security

How can you protect your business from crypto-ransomware?

Here are some easy-to-apply rules to help keep your data - and your business operations - safe
4 Nov 2019
What is workload automation?
Abstract illustration of cogs and arrows driving a business forward
Business strategy

What is workload automation?

How does workload automation benefit organisations and what are the use cases?
24 Oct 2019
Five giveaways that show an email is a phishing attack
Security

Five giveaways that show an email is a phishing attack

One of the biggest problems in cyber security is the phishing email
10 Oct 2019
Data recovery: Why is it so important?
Green financial data chart rising up trend
data recovery

Data recovery: Why is it so important?

We explain why your business needs to have a data recovery policy and how to manage data loss
9 Oct 2019
AI the most critical technology for CIOs in the next 5 years
AI
chief information officer (CIO)

AI the most critical technology for CIOs in the next 5 years

60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
8 Oct 2019
Five steps to an effective layered defence strategy
Security

Five steps to an effective layered defence strategy

Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019
5 things to consider when planning your Windows 10 migration
IT infrastructure

5 things to consider when planning your Windows 10 migration

Whatever stage your migration strategy is at, here are some tips to smooth the journey
27 Sep 2019
Five steps to big data project success
Open data
business intelligence (BI)

Five steps to big data project success

How organisations can get an end-to-end view of their data pipelines
24 Sep 2019
Four ways organisations are combating cyber attacks
Security shield with glowing technology circle around the outside and a red and green hue surrounding
endpoint security

Four ways organisations are combating cyber attacks

AI, machine learning, technical integration and flexible tools are leading the way
11 Sep 2019
Four tips for effective business collaboration
Business strategy

Four tips for effective business collaboration

Collaboration is about more than just removing office walls
27 Aug 2019