Breaking the stigma around employee monitoring

For many, the term “employee monitoring” conjures images of surveillance, distrust, and invasive oversight. This perception is outdated and misaligned with the evolving needs of modern workplaces. According to Warren Bonheim, co-founder of WorkStatz, the award-winning...

Fundamentals of positive customer experience in 2025

By getting certain fundamentals right, companies can deliver a great customer experience (CX) no matter what industry or region they operate in. Wayne Haw, regional director for CX customer success: Middle East and Africa at SAP, unpacks what it means to deliver a...

Trust no-one: Making sense of zero trust for your business

Protecting small and medium-sized enterprises (SMEs) from cyber threats goes beyond traditional firewalls. A zero-trust approach is now essential, offering enhanced security against insider threats and risks associated with remote work. Despite the initial investment,...

35 years on, is ransomware still effective?

Ransomware has been around for 35 years, with the first known case involving the AIDS Trojan. This malware was spread using physical disks, pretending to be software to assess people’s risk of developing AIDS. Since then, ransomware has become a major cyber threat,...

Essential software skills that will dominate 2025

Developers and web operations (WebOps) specialists face a challenging year as organisations strive to drive more value from their ICT investments, ramp up cloud migration, fortify cybersecurity, and address sustainability and environmental imperatives. By James...

Lower the risk of abandoned online shopping carts

Many e-commerce platforms experience elevated levels of cart abandonment because they fail to consider the perspective of the buyer. In much the same way that software can be far removed from the actual needs of the end user, so disconnects occur between online...