Esther Kezia Thorpe
What is shadow IT?
Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
document management systems (DMS)
Why it’s time to take your documents digital
Paper workflows can have serious implications for data processing and legal security
Careers & training
What does the future of work look like?
How remote working, automation and AI will affect the way we work
What to look for in a secure cloud system
Not all cloud products support the same level of security, so what should organisations be looking out for?
How the enterprise can embrace hybrid cloud
Hybrid cloud has a lot to offer organisations of all sizes, but enterprises in particular stand to gain so much
CTO job description: What does a CTO do?
More than a glorified IT manager, a CTO can have real clout in an organisation
Five obstacles holding your hybrid cloud strategy back
Overcoming these challenges is key to a successful cloud migration strategy
How to enhance your backup strategy
No matter what stage your organisation’s backup strategy is at, there is always room to improve
software as a service (SaaS)
How digital workspaces are changing the way we work
The way we work is changing, and the way we manage our IT tools needs to change with it
What is cloud-to-cloud backup?
C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
Five business benefits of Digital Transaction Management
What is Digital Transaction Management and how can it help your business?
Who should take ownership of your cyber security strategy?
We explore the options of who should be in charge of this increasingly important area
What is Breach and Attack Simulation (BAS)?
Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
Why digital transformation is essential for business growth
Whatever a company’s vision for the future, it must include digital transformation in order to grow
Six ways boards can step up support for cyber security
Security is an enterprise-wide risk management concern, not merely an IT issue
Our 5-minute guide to security awareness training
How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
Four ways CIOs can drive digital transformation
Practical steps business leaders can take to overcome digital transformation challenges
What are the different types of ransomware?
Ransomware comes in more than one form, so here's what to look out for
How data can help SMBs with digital transformation
Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
Our 5-minute guide to enterprise cloud computing
What is enterprise cloud computing, how is it used, and what are the business benefits?
disaster recovery (DR)
Nine tips to improve your disaster recovery strategy
Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
How can you protect your business from crypto-ransomware?
Here are some easy-to-apply rules to help keep your data - and your business operations - safe
What is workload automation?
How does workload automation benefit organisations and what are the use cases?
Five giveaways that show an email is a phishing attack
One of the biggest problems in cyber security is the phishing email
Data recovery: Why is it so important?
We explain why your business needs to have a data recovery policy and how to manage data loss
chief information officer (CIO)
AI the most critical technology for CIOs in the next 5 years
60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
5 things to consider when planning your Windows 10 migration
Whatever stage your migration strategy is at, here are some tips to smooth the journey
business intelligence (BI)
Five steps to big data project success
How organisations can get an end-to-end view of their data pipelines
Four ways organisations are combating cyber attacks
AI, machine learning, technical integration and flexible tools are leading the way
Four tips for effective business collaboration
Collaboration is about more than just removing office walls
Our 5-minute guide to distributed caching
What is distributed caching and when is it used?
85% of companies now operating in a multi-cloud environment
Organisations are embracing the use of multiple clouds, but formal management is lagging
Under 50% of IT leaders are confident in their data security
Increased regulation and high-profile data breaches are causing concern among leaders across all departments
Careers & training
How to reduce the impact of the skills gap in your business
Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage