Skip to main content
false
Joseph Nduhiu

Joseph is an ICT consultant and trainer with over 18 years of global experience across multiple sectors. His passion is assisting business units and IT departments in executing their digital transformation strategies and streamlining their operations in line with global standards and best practices. His areas of expertise include business process reengineering, IT service management, project management and cyber resilience. You can connect with Joseph @josephnduhio and on LinkedIn.

Learn 6 Min Read

Business Process Reengineering (BPE) Explained

Let’s face it: processes at work don’t always work. Business process reengineering helps you stay on top of constant change while still accomplishing your most important goals.
Learn 7 Min Read

Business Impact Analysis (BIA): The Complete Guide

A business impact analysis helps you prepare for service continuity in the face of disruption. Get the full story and the 8-step BIA process here.
Learn 5 Min Read

Scalability in IT: The Complete Guide To Scaling

Scalability is one of the main selling points of migrating to the cloud. What exactly does it mean & how do you do it? Get the full story here.
Learn 5 Min Read

ISO 27002: Information Security Controls Explained

In this article, we will look at the origin story of the ISO 27002 standard, as well as its structure, and how to apply the guidelines.
Learn 1 Min Read

Incident Response Plans: The Complete Guide To Creating & Maintaining IRPs

Need to update your incident response plan? Start here! We’ll show how to create one that works, and how to maintain it for the long haul so it stays effective.
Learn 6 Min Read

Availability Management: An Introduction

Understand application availability, why traditional availability monitoring fails, and best practices for end-to-end monitoring for today’s availability.
Learn 6 Min Read

Shadow IT & How To Manage It Today

Shadow IT exists for a few reasons: is one side more right? Is there a middle ground? Get the full story from IT expert Joseph Nduhiu in this article.
Learn 7 Min Read

What’s IT Monitoring? IT Systems Monitoring Explained

IT monitoring is THE thing you need to make sure your technology works, so you can keep customers happy. Monitoring can detect and resolve all sorts of issues.
Learn 5 Min Read

Infrastructure Management & Lifecycle Explained

Managing your IT infrastructure is a critical aspect of your business, even if you don't think it is. See how a 4-phase approach covers the entire span of the infrastructure management practice.
Learn 6 Min Read

Infrastructure Monitoring Today: How It Works & What It Does

Monitoring your infrastructure starts long before systems go live. Let’s look at approaches, tools, challenges & future trends of infrastructure monitoring.
Learn 6 Min Read

IT Infrastructure Defined

Let's answer the question "What exactly is IT infrastructure?" We'll drill down on the different types and categories of IT infrastructure, how to manage it, as well as what the future holds.
Learn 6 Min Read

Data Governance vs. Data Management: What's The Difference?

Understanding the difference between data governance and data management is paramount in any setting where you’re managing (and monetizing) data.
Learn 5 Min Read

Spear Phishing & How To Prevent It

Highly targeted spear phishing attacks focus on specific individuals in businesses. Are you one of them? Are you being targeted? Find out here.
Learn 5 Min Read

CSIRTs: Computer Security Incident Response Teams

A major security incident happens: you need to minimize the impact and restore normality ASAP. The best way to do it? The CSIRT. Get all the details about this team.
Learn 5 Min Read

Business Resilience: What It Is & How To Build It

Business resilience is an encompassing way to prepare your organization for anything. Research shows how resiliency enables you to thrive amid change!
Learn 4 Min Read

CMDBs Explained: Configuration Management Databases

Meant to provide visibility into all IT assets, CMDBs are routinely underutilized. Learn how to plan, implement and maintain a CMDB to maximize business value.