News

Latest from Business Technology Leaders

Don’t want to miss an update then please register for our newsletter.

Tech Strategy & Modernisation Shadow IT

THREATS POSED BY SHADOW IT

THREATS POSED BY SHADOW IT Data theft Many of the controls that organisations apply to devices and services (such as encryption and allow/deny listing) are unlikely to be applied effectively…

Read More
Tech Strategy & Modernisation Shadow IT

TYPES OF SHADOW IT

TYPES OF SHADOW IT Shadow IT is most likely to manifest itself in your organisation, with the associated threats they introduce. Unmanaged devices A widely understood area of shadow IT…

Read More
Tech Strategy & Modernisation Shadow IT

SHADOW IT IS NOT BYOD

SHADOW IT IS NOT BYOD BYOD (Bring Your Own Device) can be an effective way of reducing shadow IT with an effective BYOD policy, providing your organisation with some level…

Read More
Tech Strategy & Modernisation Shadow IT

WHAT IS SHADOW IT?

WHAT IS SHADOW IT? The term ‘shadow IT’ (also known as ‘grey IT’) refers to the unknown assets that are used within an organisation for business purposes. Since these are…

Read More
1 2 3 4 5 7 8 9 10

Our Services

  • Portfolio Business Technology Leaders
  • Team Development and Leadership
  • Tech Strategy & Modernisation
  • Independent Tech Audit / Due Diligence
  • Process Improvement / AI Assessment
  • Project Rescue
  • Cyber Security & Compliance
  • Software Development
  • Systems Procurement & Integration

Would you like to see how we can help?​

Contact us for an impartial, no obligation discussion on how we can add value to your business.