Zach Cooper
digital transformation

Four ways CIOs can drive digital transformation

Practical steps business leaders can take to overcome digital transformation challenges
17 Jan 2020
customer relationship management (CRM)

CRMs listed as top technology priority for growing SMBs

CRM investment drives the wider success roles of sales and customer experience
17 Jan 2020
Big data
digital transformation

How data can help SMBs with digital transformation

Improve collaboration, enhance customer insights and more by making data a key part of your digital transformation strategy
15 Jan 2020
hybrid cloud

How the enterprise can embrace hybrid cloud

Hybrid cloud has much to offer organisations of all sizes, but enterprises in particular stand to gain so much
15 Jan 2020
Illustration of a code cloud raining over a city

Our 5-minute guide to enterprise cloud computing

What is enterprise cloud computing, how is it used, and what are the business benefits?
15 Jan 2020
hybrid cloud

Why enterprises are moving back to on-premise data centres

The initial cloud-rush is being undone as more and more firms revert workloads to on-premise
15 Jan 2020
Windows 7
Microsoft Windows

What to do if you're still running Windows 7

Windows 7 is no longer supported, so you better upgrade, sharpish...
14 Jan 2020
Business strategy

CIO job description: What does a CIO do?

Why the CIO role is still integral to business
7 Jan 2020

Are you taking enough accountability on cyber security?

60% of organisations have had at least one serious security incident this year
18 Dec 2019
Business strategy

Benefits of flexible working (including for parents)

Flexible working is becoming more accepted in the workplace, but what are the benefits to the business and for the employees?
10 Dec 2019
software as a service (SaaS)

How digital workspaces are changing the way we work

The way we work is changing, and the way we manage our IT tools needs to change with it
5 Dec 2019
data back up button
cloud backup

Your data backup could be a disaster waiting to happen

You may think your files are protected - but could you be in for a nasty surprise when disaster strikes?
3 Dec 2019
Data centre with green high speed visualisation projection overlay
disaster recovery (DR)

Nine tips to improve your disaster recovery strategy

Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
29 Nov 2019
cyber security

Security flaws prevalent in applications produced by software vendors

Secure development is the key to a secure application
29 Nov 2019
Silhouettes of a team of office workers with a blue technology overlay to represent the future
Careers & training

What does the future of work look like?

How remote working, automation and AI will affect the way we work
13 Nov 2019
Business man pressing a large phone screen with digital icons around him
Business strategy

Why digital transformation is essential for business growth

Whatever a company’s vision for the future, it must include digital transformation in order to grow
13 Nov 2019
business intelligence (BI)

What is data analytics?

Data is just data, but with analytics it becomes actionable information
7 Nov 2019
business intelligence (BI)

How to choose an embedded analytics vendor

The advantages of embedded analytics can only be achieved in partnership with the right vendor
6 Nov 2019
A businessman opening a box of flying money to symbolise corporate spending
customer experience (CX)

Cost of critical application failures revealed

Financial losses are heightened during periods of peak customer demand
5 Nov 2019
Graphic depicting the transfer of data across the globe
file servers

Our 5-minute guide to Managed File Transfer

The ins and outs of MFT: What it is and why it surpasses the competition
1 Nov 2019
Business classroom with a woman talking about cyber security, blue padlock image on whiteboard
enterprise security

Who should take ownership of your cyber security strategy?

We explore the options of who should be in charge of this increasingly important area
30 Oct 2019
Abstract illustration of cogs and arrows driving a business forward
Business strategy

What is workload automation?

How does workload automation benefit organisations and what are the use cases?
24 Oct 2019
One red employee under flashlight
cyber security

The human element of a cyber security strategy for email

The same employees falling prey to phishing tactics are the final piece of a comprehensive cyber security strategy for email
15 Oct 2019

Five giveaways that show an email is a phishing attack

One of the biggest problems in cyber security is the phishing email
10 Oct 2019

How to enhance your backup strategy

No matter what stage your organisation’s backup strategy is at, there is always room to improve
10 Oct 2019
Robotic and human hands meeting

What is Robotic Process Automation?

How does RPA work, how is it used and what are the pros and cons?
9 Oct 2019
machine learning

Automating the end of discrimination

Tech tools such as AI and bots can help improve equality, but only if we humans build and use them the right way
8 Oct 2019
Multi cloud illustration on a blue and orange coloured background, with real cloud images overlaid
cloud backup

What is cloud-to-cloud backup?

C2C backup is growing in popularity, so what is it, and how can it help your business if the worst happens?
4 Oct 2019
penetration testing

What is penetration testing?

Sure, you’ve got your firewall – but is your business really safe from cyber attacks?
4 Oct 2019
cloud security

Trust in public cloud providers’ security is increasing

Enhanced security measures are encouraging use of cloud computing
3 Oct 2019

Five steps to an effective layered defence strategy

Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019

How to build a comprehensive cyber security strategy

Thanks to digital transformation, securing data across the business is more challenging than ever
2 Oct 2019
business intelligence (BI)

How to measure data quality

Perfect data is unlikely, but there are some fundamentals you must still measure
27 Sep 2019
Figure walking through keyhole
penetration testing

Active vs passive reconnaissance

Exploring essential tools of both ethical and malicious hackers alike
27 Sep 2019
Edge computing connecting software and applications
Internet of Things (IoT)

How edge computing can benefit businesses

Edge computing may receive less attention than cloud computing, yet it may be the secret to transforming business operations
27 Sep 2019