Esther Kezia Thorpe
Visit/security/33537/what-is-shadow-it
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
6 Jul 2020
Visit/pdf-software/29855/why-it-s-time-to-take-your-documents-digital
document management systems (DMS)

Why it’s time to take your documents digital

Paper workflows can have serious implications for data processing and legal security
19 May 2020
Visit/careers/29106/what-does-the-future-of-work-look-like
Silhouettes of a team of office workers with a blue technology overlay to represent the future
Careers & training

What does the future of work look like?

How remote working, automation and AI will affect the way we work
28 Apr 2020
Visit/cloud-security/30923/what-to-look-for-in-a-secure-cloud-system
Blue square background with a yellow cloud superimposed, with a cut-out key icon on it to represent cloud security
cloud security

What to look for in a secure cloud system

Not all cloud products support the same level of security, so what should organisations be looking out for?
15 Apr 2020
Advertisement
Visit/hybrid-cloud/30714/how-the-enterprise-can-embrace-hybrid-cloud
hybrid cloud

How the enterprise can embrace hybrid cloud

Hybrid cloud has a lot to offer organisations of all sizes, but enterprises in particular stand to gain so much
6 Apr 2020
Visit/strategy/28237/cto-job-description-what-does-a-cto-do
Business strategy

CTO job description: What does a CTO do?

More than a glorified IT manager, a CTO can have real clout in an organisation
1 Apr 2020
Visit/hybrid-cloud/29599/five-obstacles-holding-your-hybrid-cloud-strategy-back
Cloud illustrations on a blue background with a ladder
hybrid cloud

Five obstacles holding your hybrid cloud strategy back

Overcoming these challenges is key to a successful cloud migration strategy
31 Mar 2020
Visit/back-up/29084/how-to-enhance-your-backup-strategy
backup

How to enhance your backup strategy

No matter what stage your organisation’s backup strategy is at, there is always room to improve
27 Feb 2020
Advertisement
Visit/software-as-a-service-saas/30514/how-digital-workspaces-are-changing-the-way-we-work
software as a service (SaaS)

How digital workspaces are changing the way we work

The way we work is changing, and the way we manage our IT tools needs to change with it
21 Feb 2020
Visit/cloud-backup/33760/what-is-cloud-to-cloud-backup
Multi cloud illustration on a blue and orange coloured background, with real cloud images overlaid
cloud backup

What is cloud-to-cloud backup?

C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
18 Feb 2020
Advertisement
Visit/business-transformation/31933/four-business-benefits-of-digital-transaction-management
Filing cabinets with digital art flowing up to numbers
business transformation

Five business benefits of Digital Transaction Management

What is Digital Transaction Management and how can it help your business?
6 Feb 2020
Visit/enterprise-security/34017/who-should-take-ownership-of-your-cyber-security-strategy
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
enterprise security

Who should take ownership of your cyber security strategy?

We explore the options of who should be in charge of this increasingly important area
31 Jan 2020
Visit/security/penetration-testing/354645/what-is-breach-and-attack-simulation-bas
penetration testing

What is Breach and Attack Simulation (BAS)?

Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
29 Jan 2020
Visit/strategy/29899/three-reasons-why-digital-transformation-is-essential-for-business-growth
Business man pressing a large phone screen with digital icons around him
Business strategy

Why digital transformation is essential for business growth

Whatever a company’s vision for the future, it must include digital transformation in order to grow
29 Jan 2020
Advertisement
Visit/strategy/29101/six-ways-boards-can-step-up-support-for-cyber-security
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
27 Jan 2020
Visit/security/33974/our-5-minute-guide-to-security-awareness-training
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
Security

Our 5-minute guide to security awareness training

How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
24 Jan 2020
Visit/digital-transformation/31168/four-ways-cios-can-drive-digital-transformation
digital transformation

Four ways CIOs can drive digital transformation

Practical steps business leaders can take to overcome digital transformation challenges
17 Jan 2020
Visit/security/29241/what-are-the-different-types-of-ransomware
Security

What are the different types of ransomware?

Ransomware comes in more than one form, so here's what to look out for
17 Jan 2020
Visit/digital-transformation/33137/how-data-can-help-smbs-with-digital-transformation
Big data
digital transformation

How data can help SMBs with digital transformation

Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
15 Jan 2020
Visit/cloud/32167/our-5-minute-guide-to-enterprise-cloud-computing
Illustration of a code cloud raining over a city
Cloud

Our 5-minute guide to enterprise cloud computing

What is enterprise cloud computing, how is it used, and what are the business benefits?
15 Jan 2020
Advertisement
Visit/disaster-recovery-dr/33803/tips-to-improve-your-disaster-recovery-strategy
Data centre with green high speed visualisation projection overlay
disaster recovery (DR)

Nine tips to improve your disaster recovery strategy

Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
29 Nov 2019
Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

Here are some easy-to-apply rules to help keep your data - and your business operations - safe
4 Nov 2019
Advertisement
Visit/strategy/29594/what-is-workload-automation
Abstract illustration of cogs and arrows driving a business forward
Business strategy

What is workload automation?

How does workload automation benefit organisations and what are the use cases?
24 Oct 2019
Visit/security/28744/4-giveaways-that-show-an-email-is-a-phishing-attack
Security

Five giveaways that show an email is a phishing attack

One of the biggest problems in cyber security is the phishing email
10 Oct 2019
Visit/data-loss-prevention/28864/data-recovery-why-is-it-so-important
Green financial data chart rising up trend
data recovery

Data recovery: Why is it so important?

We explain why your business needs to have a data recovery policy and how to manage data loss
9 Oct 2019
Visit/chief-information-officer-cio/34582/ai-the-most-critical-technology-for-cios-over-the-next-five
AI
chief information officer (CIO)

AI the most critical technology for CIOs in the next 5 years

60% of CIOs believe artificial intelligence and machine learning are the top critical future technologies
8 Oct 2019
Visit/security/30099/five-steps-to-an-effective-layered-defence-strategy
Security

Five steps to an effective layered defence strategy

Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019
Visit/it-infrastructure/33851/five-things-to-consider-when-planning-your-windows-10-migration
IT infrastructure

5 things to consider when planning your Windows 10 migration

Whatever stage your migration strategy is at, here are some tips to smooth the journey
27 Sep 2019
Visit/business-intelligence/29518/four-steps-to-big-data-project-success
Open data
business intelligence (BI)

Five steps to big data project success

How organisations can get an end-to-end view of their data pipelines
24 Sep 2019
Visit/endpoint-security/30837/four-strategies-organisations-are-using-to-combat-cyber-attacks
Security shield with glowing technology circle around the outside and a red and green hue surrounding
endpoint security

Four ways organisations are combating cyber attacks

AI, machine learning, technical integration and flexible tools are leading the way
11 Sep 2019
Visit/strategy/29521/three-tips-for-effective-business-collaboration
Business strategy

Four tips for effective business collaboration

Collaboration is about more than just removing office walls
27 Aug 2019
Visit/virtualisation/30271/our-5-minute-guide-to-distributed-caching
virtualisation

Our 5-minute guide to distributed caching

What is distributed caching and when is it used?
9 Aug 2019
Visit/cloud-management/34167/85-of-companies-now-operating-in-a-multi-cloud-environment
Illustration of a code cloud raining over a city
cloud management

85% of companies now operating in a multi-cloud environment

Organisations are embracing the use of multiple clouds, but formal management is lagging
7 Aug 2019
Visit/data-breaches/34124/less-than-50-of-it-leaders-are-confident-in-the-security-of-their-company-s-data
data breaches

Under 50% of IT leaders are confident in their data security

Increased regulation and high-profile data breaches are causing concern among leaders across all departments
31 Jul 2019
Visit/business-strategy/careers-training/34057/how-to-reduce-the-impact-of-the-skills-gap-in-your-business
Careers & training

How to reduce the impact of the skills gap in your business

Demand for IT skills is only expected to grow. Here's how you can anticipate and deal with the skills shortage
22 Jul 2019