With the use of Software as a Service offerings increasing, with 99% of businesses projected to use one or more SaaS solutions in an industry that is worth $165Bn a year. There are 15,529 companies providing SaaS solutions , and so it seems like a logical choice to start using… Continue Reading Risks of SaaS

We have all been there, either by working with someone straight out of University or when you were entering the workforce straight out of education – full of passion and enthusiasm, and keen to make a change. The teenager (or person in their twenties) may challenge and ask questions about… Continue Reading Teenagers might have answers

Why is it that business transformation so difficult to successfully achieve? I believe that the fears and insecurities that keep people locked into behaviours, even invisible fears, even when we know rationally that we should change. Whilst it is possible to change policies, processes, office layout and other external factors,… Continue Reading Change is about people, not policies

With the increased prevalence of working from home initiated by the Covid-19 pandemic, we all need to be more aware of the concern with remote working, which is to include your colleagues. Back in pre-coronavirus days, the concept of “working from home” was often reserved for senior employees, and used… Continue Reading Remote working – include your colleagues

Does your organisation have a culture of cybersecurity? Or, is your company taking a ‘traditional’ approach with cybersecurity and considering it to be a layer that is applied by the IT department? The way that most modern organisations are evolving is that cybersecurity is a culture, not an action to… Continue Reading Cybersecurity is a culture, not an action

I started my career on Exchange 5.0 in late 1997, and the product became my main skill area for nearly 22 years. In that time, I experienced hacking attacks and website defacement of OWA, stability battles and architecture changes when Microsoft evolved the system towards cloud capability. When my career… Continue Reading Exchange on-premises hack: who still has servers?

The Australian Cyber Security Centre (ACSC) developed prioritised mitigation strategies and published them in February 2017, to help organisations mitigate cybersecurity incidents caused by various cyber threats. The Essential 8 are to be considered a baseline of the minimum standards that any business should follow to protect themselves and their… Continue Reading What is the Essential 8

Today I was promoted to CIO within the Naval Shipbuilding College, to build on the vision of a data-driven enterprise to evolve the sovereign capability of naval shipbuilding in Australia. I am honoured to be recognised after my first eight months to be credited with having the abilities and approach… Continue Reading My journey to CIO

If you work in IT, then you will know that there is the ever-present spectre of zombie systems, which remain active and running, but not actually doing anything. These can be servers that were implemented for a project that got cancelled, file shares that are no longer accessed, databases that… Continue Reading What is a Scream Test

I will show you how to achieve successes through playing off the inherent nature of people to be lazy. There is a tendency for people – no matter how intelligent and engaged they are – to take the easiest option, and there are ways that you can use this to… Continue Reading Use the lazy option for success

I have encountered many baffling processes in businesses that leaves me wondering – who is your process written for? You may have spent many hours performing a Digital Transformation, focusing on streamlining processes and removing paper forms and taking advantage of new technologies to automate and accelerate processes and functions… Continue Reading Who is your process written for?

A hot topic around the world is the use of digital systems to record health information for people. It’s not just the healthcare record security concerns – the fear that information can be hacked or even changed, it also has roots in incomplete recording of information, and how healthcare professionals… Continue Reading Healthcare record security concerns

We have all heard it before; “I am not worried about my data, I am not very interesting or important” or similar assertions that their bank account does not have much money to steal, or their Facebook / Instagram posts are not embarassing or personal. However, this common viewpoint is… Continue Reading Why be concerned with personal data security?

Unfortunately working extra hours and overworking has become a ‘badge of honour’ to try and prove that you are a hard worker and somehow to justify that you are valuable to your business. I strongly disagree and consider overworking a disease that must be cured. Overworking leads to burnout. Overworking… Continue Reading The overworking disease

Every week, millions of people dutifully complete their timesheets, just as businesses have expected of them for decades. The tyranny of timesheets has been something that many employees have endured and been frustrated by for almost as long – we all hate timesheets. Admittedly, there are some positive reasons for… Continue Reading The tyranny of timesheets

2020 has not started well, particularly in Australia with bushfires, floods and now Coronavirus. It is undeniable that life and culture will be changed forever by the lockdown of business and society caused by the global pandemic that has gripped the whole world. The short, medium and long term effects… Continue Reading How Covid-19 may change business and IT