You've requested...

Schools Focused on IT Transformation Are at the Head of the Class in Data Protection

If a new window did not open, click here to view this asset.

Download this next:

HBR: Improving Employee and Customer Experiences Through Workflow Digitisation

Creating a great employee experience isn’t just a top priority for organisations today – it’s essential for increasing customer satisfaction and loyalty.

Organisations that cultivate and support strong employee experiences enjoy increased collaboration and productivity, higher quality work and better customer experiences.

And it all starts with workflow digitisation.

A recent study on workflow digitisation by Harvard Business Review Analytic Services reveals the positive impact it can have on businesses – especially the most digitally mature.

Read the full report to learn more about the state of workflow digitisation, how to overcome its challenges, and ways you can start reaping its benefits.

These are also closely related to: "Schools Focused on IT Transformation Are at the Head of the Class in Data Protection"

  • Royal Holloway: Protecting investors from cyber threats

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. Here we ask “What are the principal cyber threats to investors’ assets on UK investment platforms and what can be done to prevent or mitigate these threats?”

    To put the research in context, this article summarises first how a growing number of personal investors are being ‘pushed’ online to use new and emerging technologies to manage their finances. Investment platforms are the technology of choice.

    It then outlines the development of a maturing criminal economy that is well-positioned to attack personal investors in this evolving sector. Cyber theft from personal investors should be expected to increase, but are investment platforms prepared for such attacks? Cyber security professionals typically use strategic and operational threat intelligence models to make sense of (and thus prevent or mitigate) cyber attacks. This research demonstrates that existing threat models are inadequate to meet the new threats facing personal investors.

    Using new synthesised real-world attack data, a new threat model is developed which focuses specifically on the risks to individual investors, not solely on the risks to investment platforms or banks. This allows us to offer some new insights into actual attacks on investors and provides a new threat intelligence capability to anticipate and defend against future attacks.

  • Leader’s guide to network management for educational IT

    Technology underpins many of today’s educational experiences. Because of this, ensuring smooth networking is a top priority for schools. But in the face of understaffed IT teams and proliferating threats, accomplishing that goal is no simple task.

    So, how can schools strengthen their network management? Enter this 16-page e-book, which explores:

    • 6 components of a successful network
    • 9 questions to consider
    • Technology that can level up your network design
    • And more

    Keep reading to explore these insights in full.

Find more content like what you just read:

  • Selecting an internet provider for your K-12 school

    As schools continue to become more reliant on internet access and technology, it has become critical for schools to ensure that their infrastructure and connections are as advanced as possible. However, quality internet access can only be achieved with a quality service provider. Browse this guide to learn more.

    Download

  • Leader’s guide to ISPs and education

    Whether they have hundreds or thousands of students, higher education institutions need reliable internet that can undergird successful learning experiences. Because of this, selecting the right internet service provider (ISP) is a critical decision for IT leaders. To unlock a leader’s guide to choosing an ISP, download this white paper.

    Download

  • CW Europe December 2019: Deutsche Bank creates innovation division

    German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.

    Download

  • Roadmap to identity-driven optimization: Benefits & more

    For a 9-page guide to identity-driven optimization for CIOs, tap into this white paper that explores harnessing a universal control plane, balancing security and usability, and more.

    Download

  • Private Cloud Computing E-Zine Volume 1: Private cloud computing as a business strategy

    While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure.

    Download

  • Singapore Builds on Its Digital Foundations to Secure its Place as a Leader In The Digital Age

    In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.

    Download

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

    Download

  • Risk management: 5 stages to compliance

    Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.

    Download

  • IT in Europe: Adopting an Application-Centric Architecture

    Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view.

    Download

  • Computer Weekly – 30 March 2021: The ticking timebomb of IR35

    In this week's Computer Weekly, we reveal that IT contractors are seeking a multimillion-pound payout after confusion over the forthcoming IR35 tax reforms. Many firms are building data lakes to improve their analytics – we examine the storage implications. And we talk to the CIO at the London School of Economics. Read the issue now.

    Download

  • A Computer Weekly Buyer's Guide to Digital Transformation

    The future of organisations depends on their handling of digital transformation. In this14-page buyer's guide, Computer Weekly looks at how the IT operation can lead strategy, whether network security is keeping up and what can be learned from GE's digital journey.

    Download

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

    Download

  • Education leader’s guide to better UC

    Between student safety and parental relations, school systems are presented with a handful of unique communication challenges. So, when it’s critical for these areas to be smooth and functional, how can educators ensure that their specific unified communications (UC) needs are met? Browse this guide to learn more.

    Download

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

    Download

  • Computer Weekly – 30 April 2019: Inside Huawei

    In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.

    Download

  • Why hyper-converged infrastructure could improve overall IT performance

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

    Download

  • Computer Weekly – 15 May 2018: Will government IT be ready for Brexit?

    In this week's Computer Weekly, as the UK government struggles to get new IT systems up and running before Brexit, we examine the challenges ahead. We look at serverless computing and ask why this emerging cloud technology is so important. And we discuss the latest best practice in mobile strategy for SMEs. Read the issue now.

    Download

  • Migration to cloud backup spares data from destruction: But how?

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

    Download

  • Confronting the Largest Attack Surface Ever with Converged Endpoint Management (XEM)

    It’s easy to manage endpoints when the attack surface isn’t growing or lead digital transformation when it doesn’t need to happen overnight. But that isn't our reality. Converged solutions unite tools and data into one unified solution. A converged solution is a system that enables convergence. Read on to learn more.

    Download

  • The secret to better communication for educators

    Today’s education professionals need efficient ways to communicate and interact with parents, administrators, students, and coworkers. However, due to school budget restrictions and other challenges, many educators find themselves unsure of how to proceed. Dig into this white paper to learn more.

    Download

  • Escaping legacy – removing a major roadblock to a digital future

    Core legacy systems inhibit businesses' ability to meet changing customer demands in the digital age. The scale and nature of the problem is such that it needs to be addressed now.

    Download

  • An evaluation of the top 10 CDN providers

    The commercial content delivery network (CDN) market is a mature market that carries a substantial portion of the world's internet traffic. Read this IDC report to fully understand the CDN market and the ingredients that drive growth and differentiation in this marketplace amongst CDN services and providers.

    Download

  • Top 10 ANZ IT stories of 2021

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

    Download

  • 4 steps to prepare for the AI-driven decade

    Access this research report to learn why the most future-ready organizations will be the ones that make AI a competitive advantage, as well as 4 steps business leaders can take today to accelerate their transformations, starting with evaluating their data and AI maturity.

    Download

  • Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

    In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on how to motivate IT staff in a hybrid working environment. And we meet the Dutch hackers helping to secure the internet.

    Download

  • Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

    In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.

    Download

  • CIO Trends APAC: Developing a data-driven culture

    In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.

    Download

  • Guide to edge computing in a cloud native world

    What really is edge computing? And how are near edge, far edge and tiny edge different? This guide explains what edge computing means for your business and how you can take advantage of it in a cloud native world. Read it here.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • CW Benelux ezine February 2019

    Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

    Download

  • A look into the minds of the 50 most influential IT leaders

    In this week's Computer Weekly, we reveal the 7th annual UKtech50 – our list of the 50 most influential people in UK IT. And we talk to this year's winner, ARM CEO Simon Segars, about the prospects for the UK tech sector after the uncertainty caused by the Brexit referendum vote. Read the issue now.

    Download

  • Computer Weekly – 19 January 2021: The UK's struggle with digital schooling

    In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.

    Download

  • CW Benelux - May-July 2022: Meta shelves hyperscale datacentre plan in Netherlands

    Meta's plan for a hyperscale datacentre in the Netherlands which was to serve the metaverse world has been halted following a campaign by environmentalists and the Dutch parliament's call for the government to do everything in its power to stop the facility being built. Read about it in this issue of CW Benelux.

    Download

  • How to use containers in an HCI environment

    In this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.

    Download

  • Computer Weekly – 11 June 2019: Are schools delivering on digital skills?

    In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.

    Download

  • Computer Weekly – 10 October 2017: The most influential women in UK IT

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.

    Download

  • Take the classroom technology experience to the next level

    When schools invest in technology, they need hardware that is compatible, reliable, and easy to use. Whether it is audio, video, or peripherals, this equipment is necessary. Having technology that works in any ecosystem allows students to thrive and learn. Read on to learn more about how to equip students for success in the classroom.

    Download

  • Computer Weekly – 6 October 2020: The Most Influential Women in UK Technology 2020

    In this week's Computer Weekly, we announce our annual list of the Most Influential Women in UK Technology, and talk to this year's winner, Stemettes CEO and diversity campaigner Anne-Marie Imafidon. Meet our five Rising Stars and the latest entrants to our women in tech Hall of Fame. Read the issue now.

    Download

  • CIO’s Definitive Guide to Achieving Secure Cloud Networking

    CIOs and IT departments are rapidly turning to cloud networking in the face of increased technology demand to deliver improved flexibility, efficiency and security. Download this guide to learn about several cloud-based networking solutions – such as SD-WAN-as-a-Service and Network-as-a-Service – to help you set up your enterprise for the future.

    Download

  • Top 10 Middle East stories of 2018

    With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.

    Download

  • Computer Weekly - 18 January 2022: The race to quantum computing

    In this week's Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now.

    Download

  • Computer Weekly – 1 October 2019: The most influential women in UK technology

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology. Meet the winner, Debbie Forster, CEO of Tech Talent Charter, and find out who are this year's five rising stars. Also, our latest buyer's guide looks at the latest developments in robotic process automation. Read the issue now.

    Download

  • Computer Weekly - 15 June 2021: Discovering great ideas - innovation at the Discovery Channel

    In this week's Computer Weekly, we talk to the owner of the Discovery Channel, about how collaboration software enabled a culture of innovation. Our latest buyer's guide looks at developments in cloud printing technology. And we hear from the technology chief at Rightmove about the online property site's digital transformation. Read the issue now.

    Download

  • Equipping your employees for hybrid work

    In a recent study of CEO priorities for 2022-23, workforce-related issues were among the top 3 strategic business priorities, likely stemming from a shift to hybrid and remote work. Download this e-book to explore how to equip your employees for optimal remote collaboration.

    Download

  • Computer Weekly – 12 January 2021: Can AI ever match the power of the brain?

    In this week's Computer Weekly, artificial intelligence is still no match for the brain – we talk to Intel's neuromorphic computing lab to see how researchers are trying to address that. Our buyer's guide examines identity and access management. And we find out why datacentres are becoming a new target for financial investors. Read the issue now.

    Download

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

    Download

  • VMworld 2017 recap: Adapting legacy IT

    In this week's Computer Weekly, experts at VMworld 2017 discussed how to adapt legacy IT to make the most of modern technology – we listened in. Artificial intelligence is touted as an aid to decision-making, but it needs to be handled with care. And we learn how Wales has become a hotspot for cyber security innovation. Read the issue now.

    Download