Esther Kezia Thorpe
What is shadow IT?
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
Five digital transformation tips for HR
Silhouette of a team with people icons overlaid representing digital HR
digital transformation

Five digital transformation tips for HR

Digital transformation efforts can start from within your own department
22 Sep 2020
Three ways to protect PDF documents
document management systems (DMS)

Three ways to protect PDF documents

How can you safeguard your organisation's documents?
19 Aug 2020
Why it’s time to take your documents digital
document management systems (DMS)

Why it’s time to take your documents digital

Unlock the benefits of PDFs with top-class software
12 Aug 2020
How to choose an embedded analytics vendor
business intelligence (BI)

How to choose an embedded analytics vendor

The advantages of embedded analytics can only be achieved in partnership with the right vendor
4 Jun 2020
Five ways the office is evolving for the future
flexible working

Five ways the office is evolving for the future

Technology isn't the only factor driving our changing office spaces
4 May 2020
What does the future of work look like?
Silhouettes of a team of office workers with a blue technology overlay to represent the future
Careers & training

What does the future of work look like?

How remote working, automation and AI will affect the way we work
28 Apr 2020
How the enterprise can embrace hybrid cloud
Businessman sits on a cloud while working on a laptop
hybrid cloud

How the enterprise can embrace hybrid cloud

Hybrid cloud has a lot to offer organisations of all sizes, but enterprises in particular stand to gain so much
6 Apr 2020
Five obstacles holding your hybrid cloud strategy back
Cloud illustrations on a blue background with a ladder
hybrid cloud

Five obstacles holding your hybrid cloud strategy back

Overcoming these challenges is key to a successful cloud migration strategy
31 Mar 2020
How to enhance your backup strategy
backup

How to enhance your backup strategy

No matter what stage your organisation’s backup strategy is at, there is always room to improve
27 Feb 2020
What is Breach and Attack Simulation (BAS)?
penetration testing

What is Breach and Attack Simulation (BAS)?

Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Why digital transformation is essential for business growth
Business man pressing a large phone screen with digital icons around him
Business strategy

Why digital transformation is essential for business growth

Whatever a company’s vision for the future, it must include digital transformation in order to grow
29 Jan 2020
Six ways boards can step up support for cyber security
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
27 Jan 2020
Our 5-minute guide to security awareness training
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
Security

Our 5-minute guide to security awareness training

How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
What are the different types of ransomware?
Security

What are the different types of ransomware?

Ransomware comes in more than one form, so here's what to look out for
17 Jan 2020
How data can help SMBs with digital transformation
Big data
digital transformation

How data can help SMBs with digital transformation

Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
15 Jan 2020
Our 5-minute guide to enterprise cloud computing
Illustration of a code cloud raining over a city
Cloud

Our 5-minute guide to enterprise cloud computing

What is enterprise cloud computing, how is it used, and what are the business benefits?
15 Jan 2020
Nine tips to improve your disaster recovery strategy
Data centre with green high speed visualisation projection overlay
disaster recovery (DR)

Nine tips to improve your disaster recovery strategy

Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
29 Nov 2019
How can you protect your business from crypto-ransomware?
Security

How can you protect your business from crypto-ransomware?

Here are some easy-to-apply rules to help keep your data - and your business operations - safe
4 Nov 2019
What is workload automation?
Abstract illustration of cogs and arrows driving a business forward
Business strategy

What is workload automation?

How does workload automation benefit organisations and what are the use cases?
24 Oct 2019
Five giveaways that show an email is a phishing attack
Security

Five giveaways that show an email is a phishing attack

One of the biggest problems in cyber security is the phishing email
10 Oct 2019
Data recovery: Why is it so important?
Green financial data chart rising up trend
data recovery

Data recovery: Why is it so important?

We explain why your business needs to have a data recovery policy and how to manage data loss
9 Oct 2019
AI the most critical technology for CIOs in the next 5 years
AI
chief information officer (CIO)

AI the most critical technology for CIOs in the next 5 years

60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
8 Oct 2019
Five steps to an effective layered defence strategy
Security

Five steps to an effective layered defence strategy

Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019
5 things to consider when planning your Windows 10 migration
IT infrastructure

5 things to consider when planning your Windows 10 migration

Whatever stage your migration strategy is at, here are some tips to smooth the journey
27 Sep 2019
Five steps to big data project success
Open data
business intelligence (BI)

Five steps to big data project success

How organisations can get an end-to-end view of their data pipelines
24 Sep 2019
Four ways organisations are combating cyber attacks
Security shield with glowing technology circle around the outside and a red and green hue surrounding
endpoint security

Four ways organisations are combating cyber attacks

AI, machine learning, technical integration and flexible tools are leading the way
11 Sep 2019
Four tips for effective business collaboration
Business strategy

Four tips for effective business collaboration

Collaboration is about more than just removing office walls
27 Aug 2019
Our 5-minute guide to distributed caching
virtualisation

Our 5-minute guide to distributed caching

What is distributed caching and when is it used?
9 Aug 2019
85% of companies now operating in a multi-cloud environment
Illustration of a code cloud raining over a city
cloud management

85% of companies now operating in a multi-cloud environment

Organisations are embracing the use of multiple clouds, but formal management is lagging
7 Aug 2019
Under 50% of IT leaders are confident in their data security
Security lock cyber protection
data breaches

Under 50% of IT leaders are confident in their data security

Increased regulation and high-profile data breaches are causing concern among leaders across all departments
31 Jul 2019
How to reduce the impact of the skills gap in your business
Careers & training

How to reduce the impact of the skills gap in your business

Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage
22 Jul 2019
Benefits of AI and machine learning for cloud security
Robot hand and human hand joining together behind a blue security shield icon on a dark background
Security

Benefits of AI and machine learning for cloud security

AI and machine learning may not be a silver bullet, but they can still play an important part in cloud security strategies
8 Jul 2019
50% of cyber attacks now use island hopping
City office buildings image with overlay of security padlocks and network showing a data breach
Security

50% of cyber attacks now use island hopping

Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
3 Jul 2019
How automation can help digital transformation
FInger reaching out to touch a button with cogs on it, blue tech automation theme
automation

How automation can help digital transformation

Incorporating automated procedures into your digital transformation plan will reap benefits in the future
1 Jul 2019