Esther Kezia Thorpe
Our 5-minute guide to security awareness training
How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
Four ways CIOs can drive digital transformation
Practical steps business leaders can take to overcome digital transformation challenges
What are the different types of ransomware?
Ransomware comes in more than one form, so here's what to look out for
How data can help SMBs with digital transformation
Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
How the enterprise can embrace hybrid cloud
Hybrid cloud has much to offer organisations of all sizes, but enterprises in particular stand to gain so much
Our 5-minute guide to enterprise cloud computing
What is enterprise cloud computing, how is it used, and what are the business benefits?
software as a service (SaaS)
How digital workspaces are changing the way we work
The way we work is changing, and the way we manage our IT tools needs to change with it
disaster recovery (DR)
Nine tips to improve your disaster recovery strategy
Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
Careers & training
What does the future of work look like?
How remote working, automation and AI will affect the way we work
Why digital transformation is essential for business growth
Whatever a company’s vision for the future, it must include digital transformation in order to grow
business intelligence (BI)
How to choose an embedded analytics vendor
The advantages of embedded analytics can only be achieved in partnership with the right vendor
How can you protect your business from crypto-ransomware?
Here are some easy-to-apply rules to help keep your data - and your business operations - safe
What is workload automation?
How does workload automation benefit organisations and what are the use cases?
Five giveaways that show an email is a phishing attack
One of the biggest problems in cyber security is the phishing email
How to enhance your backup strategy
No matter what stage your organisation’s backup strategy is at, there is always room to improve
Data recovery: Why is it so important?
We explain why your business needs to have a data recovery policy and how to manage data loss
chief information officer (CIO)
AI the most critical technology for CIOs in the next 5 years
60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
What is cloud-to-cloud backup?
C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
5 things to consider when planning your Windows 10 migration
Whatever stage your migration strategy is at, here are some tips to smooth the journey
business intelligence (BI)
Five steps to big data project success
How organisations can get an end-to-end view of their data pipelines
Four ways organisations are combating cyber attacks
AI, machine learning, technical integration and flexible tools are leading the way
Five ways the office is evolving for the future
Technology isn't the only factor driving our changing office spaces
Five digital transformation tips for HR
Digital transformation efforts can start from within your own department
Four tips for effective business collaboration
Collaboration is about more than just removing office walls
What to look for in a secure cloud system
Not all cloud products support the same level of security, so what should organisations be looking out for?
document management systems (DMS)
Why it’s time to take your documents digital
Paper workflows can have serious implications for data processing and legal security
Our 5-minute guide to distributed caching
What is distributed caching and when is it used?
85% of companies now operating in a multi-cloud environment
Organisations are embracing the use of multiple clouds, but formal management is lagging
Under 50% of IT leaders are confident in their data security
Increased regulation and high-profile data breaches are causing concern among leaders across all departments
Careers & training
How to reduce the impact of the skills gap in your business
Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage
What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
Five obstacles holding your hybrid cloud strategy back
Overcoming these challenges is key to a successful cloud migration strategy
Benefits of AI and machine learning for cloud security
AI and machine learning may not be a silver bullet, but they can still play an important part in cloud security strategies
50% of cyber attacks now use island hopping
Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method