Esther Kezia Thorpe
Nine tips to improve your disaster recovery strategy

disaster recovery (DR)
Nine tips to improve your disaster recovery strategy
Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
7 Dec 2020
What is shadow IT?

Security
What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
Five digital transformation tips for HR

digital transformation
Five digital transformation tips for HR
Digital transformation efforts can start from within your own department
22 Sep 2020
Three ways to protect PDF documents

document management systems (DMS)
Three ways to protect PDF documents
How can you safeguard your organisation's documents?
19 Aug 2020
Why it’s time to take your documents digital

document management systems (DMS)
Why it’s time to take your documents digital
Unlock the benefits of PDFs with top-class software
12 Aug 2020
How to choose an embedded analytics vendor

business intelligence (BI)
How to choose an embedded analytics vendor
The advantages of embedded analytics can only be achieved in partnership with the right vendor
4 Jun 2020
Five ways the office is evolving for the future

flexible working
Five ways the office is evolving for the future
Technology isn't the only factor driving our changing office spaces
4 May 2020
What does the future of work look like?

Careers & training
What does the future of work look like?
How remote working, automation and AI will affect the way we work
28 Apr 2020
How the enterprise can embrace hybrid cloud

hybrid cloud
How the enterprise can embrace hybrid cloud
Hybrid cloud has a lot to offer organisations of all sizes, but enterprises in particular stand to gain so much
6 Apr 2020
Five obstacles holding your hybrid cloud strategy back

hybrid cloud
Five obstacles holding your hybrid cloud strategy back
Overcoming these challenges is key to a successful cloud migration strategy
31 Mar 2020
How to enhance your backup strategy

backup
How to enhance your backup strategy
No matter what stage your organisation’s backup strategy is at, there is always room to improve
27 Feb 2020
What is Breach and Attack Simulation (BAS)?

penetration testing
What is Breach and Attack Simulation (BAS)?
Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Six ways boards can step up support for cyber security

Business strategy
Six ways boards can step up support for cyber security
Security is an enterprise-wide risk management concern, not merely an IT issue
27 Jan 2020
Our 5-minute guide to security awareness training

Security
Our 5-minute guide to security awareness training
How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
What are the different types of ransomware?

Security
What are the different types of ransomware?
Ransomware comes in more than one form, so here's what to look out for
17 Jan 2020
How data can help SMBs with digital transformation

digital transformation
How data can help SMBs with digital transformation
Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
15 Jan 2020
Our 5-minute guide to enterprise cloud computing

Cloud
Our 5-minute guide to enterprise cloud computing
What is enterprise cloud computing, how is it used, and what are the business benefits?
15 Jan 2020
How can you protect your business from crypto-ransomware?

Security
How can you protect your business from crypto-ransomware?
Here are some easy-to-apply rules to help keep your data - and your business operations - safe
4 Nov 2019
What is workload automation?

Business strategy
What is workload automation?
How does workload automation benefit organisations and what are the use cases?
24 Oct 2019
Five giveaways that show an email is a phishing attack

Security
Five giveaways that show an email is a phishing attack
One of the biggest problems in cyber security is the phishing email
10 Oct 2019
Data recovery: Why is it so important?

data recovery
Data recovery: Why is it so important?
We explain why your business needs to have a data recovery policy and how to manage data loss
9 Oct 2019
AI the most critical technology for CIOs in the next 5 years

chief information officer (CIO)
AI the most critical technology for CIOs in the next 5 years
60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
8 Oct 2019
Five steps to an effective layered defence strategy

Security
Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019
5 things to consider when planning your Windows 10 migration

IT infrastructure
5 things to consider when planning your Windows 10 migration
Whatever stage your migration strategy is at, here are some tips to smooth the journey
27 Sep 2019
Five steps to big data project success

business intelligence (BI)
Five steps to big data project success
How organisations can get an end-to-end view of their data pipelines
24 Sep 2019
Four ways organisations are combating cyber attacks

endpoint security
Four ways organisations are combating cyber attacks
AI, machine learning, technical integration and flexible tools are leading the way
11 Sep 2019
Four tips for effective business collaboration

Business strategy
Four tips for effective business collaboration
Collaboration is about more than just removing office walls
27 Aug 2019
Our 5-minute guide to distributed caching

virtualisation
Our 5-minute guide to distributed caching
What is distributed caching and when is it used?
9 Aug 2019
85% of companies now operating in a multi-cloud environment

cloud management
85% of companies now operating in a multi-cloud environment
Organisations are embracing the use of multiple clouds, but formal management is lagging
7 Aug 2019
Under 50% of IT leaders are confident in their data security

data breaches
Under 50% of IT leaders are confident in their data security
Increased regulation and high-profile data breaches are causing concern among leaders across all departments
31 Jul 2019
How to reduce the impact of the skills gap in your business

Careers & training
How to reduce the impact of the skills gap in your business
Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage
22 Jul 2019
Benefits of AI and machine learning for cloud security

Security
Benefits of AI and machine learning for cloud security
AI and machine learning may not be a silver bullet, but they can still play an important part in cloud security strategies
8 Jul 2019
50% of cyber attacks now use island hopping

Security
50% of cyber attacks now use island hopping
Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
3 Jul 2019
How automation can help digital transformation

automation
How automation can help digital transformation
Incorporating automated procedures into your digital transformation plan will reap benefits in the future
1 Jul 2019
Why cloud should be part of your disaster recovery strategy

disaster recovery (DR)
Why cloud should be part of your disaster recovery strategy
Cloud-based solutions can help support businesses of all sizes through unplanned downtime
7 Jun 2019