Blog & Insights Articles from Northdoor

Thoughts, Opinions & Ideas From The World Of Data Security, Protection and Technology

Are you ready to get in touch?

Request a Call back

Quantum Computing and 1024-bit Encryption: Is your data already at risk?

Quantum computing threatens your current encryption. Attackers are harvesting your data now. Here is what to do about it now.

When the NCSC Says Act Now, Boards Should Listen

The NCSC has warned of a severe and enduring cyber threat to UK organisations. Northdoor sets out what the guidance means in practice and what boards need to decide, not just endorse.

From Legacy to Agile:
How AI is Transforming IBM Power Application Modernisation

IBM Power application modernisation is more achievable with AI. Learn how to tackle the skills gap and move legacy code forward.

DSARs: Why manual processes are setting you up to fail

Manual DSAR processes leave organisations unable to guarantee UK GDPR compliance particularly where shadow IT is present. Discover why a dedicated DSAR solution is the only defensible approach

IBM Power Modernisation:
How IBM Bob changes the economics of legacy transformation

IBM Bob is IBM’s AI-powered SDLC partner built for enterprise complexity. For organisations running IBM i, AIX, and legacy enterprise applications, it changes what is economically viable in a…[ ]

IBM Quantum Safe: How to build your post-quantum migration plan

Discover how IBM Quantum Safe helps organisations build a cryptographic inventory, prioritise risk and migrate to post-quantum standards, step by step.

Is now the time to evaluate Red Hat OpenShift Virtualisation?

Facing steep VMware/Broadcom price increases? Discover why organisations are shifting to Red Hat OpenShift Virtualisation and how Northdoor’s expert migration assessment delivers clarity, confidence…[ ]

Blueprint Two is gone, but the London Market Core Platform signals a smarter path forward

Blueprint Two is gone, but the London Market Core Platform signals a more pragmatic route to modernisation. Here’s what LMCP means for firms now.

Blueprint Two is cancelled.
Now the London Market must own its future

Lloyd’s Blueprint Two has been shelved. AJ Thompson explains why it failed, what it means for London Market firms, and how to move your technology modernisation forward without it.

Red Hat licensing optimisation guide 2026:
How to reduce RHEL costs and maintain compliance

Red Hat licensing optimisation reduces RHEL overspend by up to 40% closes compliance gaps, and helps you regain control of your Linux estate.

The quantum clock is ticking. Your encryption is already at risk

Your encrypted data is already being harvested. Learn the 5 urgent steps to assess your quantum encryption risk and migrate to NIST post-quantum standards now.

Subject Access Request Automation:
Stop treating SARs as a filing exercise

Automate Subject Access Request processing under UK GDPR. Cut response times, ensure consistent redaction, and build a full audit trail.

Red Hat OpenShift Virtualisation
Why it’s become the go-to VMware exit for UK organisations

Broadcom’s acquisition of VMware has triggered price increases of up to 1,000% for UK organisations. AJ Thompson, CCO at Northdoor, explains why Red Hat OpenShift Virtualisation has emerged as the…[ ]

Quantum-safe encryption
Why the threat to your data is already here

Quantum computers will break today’s encryption. With harvest now, decrypt later attacks already underway, find out what quantum-safe encryption means for your organisation.

The Quantum Revolution

Discover how quantum computing is reshaping healthcare, finance and climate science and why organisations need to start preparing today.

The AI infrastructure spending surge: investment, risk and market reality

Microsoft and Oracle are investing billions in AI infrastructure. Here’s what that spending signals for investors, enterprise adoption, and cloud competition.

When does SQL Server 2016 support end?

Microsoft SQL Server 2016 support ends 14 July 2026. Learn migration timelines (2-12 months), three migration paths, and why starting in Q1 2025 matters for your organisation.

What is ransomware? Why backups no longer protect your data

Beyond the Backup: The new era of ransomware extortion and data theft.

Cloud computing costs in the UK: The soaring reality and how to regain control

Cloud spend is now the 2nd largest cost for UK IT firms, often hitting 12-18% of revenue. Discover why AI is driving 20%+ of bills and 5 actionable strategies UK CIOs are using to cut costs by 20-30%

Five IT trends that will define the UK SME market in 2026

Five UK SME IT trends for 2026, covering AI readiness, cyber security, cloud sovereignty, ESG reporting and DORA-driven compliance.

2026 Insurance Technology Predictions

Explore 2026 insurance industry predictions, from Blueprint Two delays to AI adoption, sanctions compliance, and cybersecurity. Learn how insurers can prepare for change

IT Security Predictions for 2026

Discover the top IT security predictions for 2026 from AI-first cyber defence and automated Zero Trust ecosystems to supply chain resilience and quantum-resistant encryption. Learn how regulations…[ ]

How data is learning to speak: The new era of conversational BI

We answer the most pressing questions about conversational BI, from implementation challenges to future trends. Discover how AI is transforming business intelligence and what leaders need to know.

Financial data breaches and AI security trends: 2025 industry analysis

Explore 2025’s financial data breach statistics and AI security risks. Learn proven strategies to strengthen cyber resilience in finance.

How the Cloudflare outage exposed hidden risks

Discover expert answers to the most common questions about the 2025 Cloudflare outage, hidden dependencies, and how to strengthen digital resilience for your busiess.

UK sanctions list update:
What businesses need to know before 28 January 2026

From 28 January 2026, the UK Sanctions List will replace the OFSI Consolidated List as the single source for sanctions data. Learn how Northdoor’s Sanctions Checker helps you stay compliant.

The UK's new cyber rules are coming: 5 surprising changes you can't ignore

Discover the UK’s new Cyber Security and Resilience Bill, its surprising changes, and how it impacts businesses. Learn about new responsibilities, stricter timelines, and significant penalties.

The real cost of IT Support for SMEs

Discover the real IT support costs SME businesses face beyond basic salaries. Our detailed analysis reveals hidden expenses, compares in-house vs outsourced options, and shows why most small…[ ]

IBM Expert Care: Premium IT Support

Discover how IBM Power and Storage Expert Care reduces downtime, boosts resilience, and protects mission-critical IT systems.

What happens after an attack?

Cyber breaches are inevitable. Learn why response not prevention, defines business survival.

IBM Multivendor Support Services: a smarter path for VMware and Oracle customers

Discover how IBM multivendor support services help reduce VMware and Oracle costs, avoid vendor lock-in, and future-proof IT infrastructure.

Passwordless authentication: reality vs hype

Discover the truth about passwordless authentication. Learn about the real vulnerabilities, fallback challenges and why passwords aren’t dead.

Rethinking Data Warehousing Webinar: strategies for modern businesses

Join our data warehousing webinar to discover practical strategies on how modern architectures improve agility, governance, and ROI.

Tesco’s £100M lawsuit exposes VMware licensing risks

Tesco’s £100M lawsuit over VMware licensing exposes major risks. Learn what it means for your business and how to protect your IT strategy.

Cloud hosting: essential questions answered for UK businesses

Explore expert answers to common cloud hosting questions from Northdoor’s Dominic Green. Learn about types, security, costs, and migration strategies for UK businesses.

Human factors in cyber security

Discover how human factors in cyber security and emotional decision-making impact your organisation’s vulnerability to attacks. Take our free phishing security test today.

Supply chain security risks drive data breach costs for UK in 2025

Supply chain breaches cost UK CISOs £241,620 more. Shadow AI accounts for 20% of breaches. Learn how to reduce data breach costs in 2025.

VMware vSphere End of Support: Key dates, risks and your options

VMware vSphere 7 support ends October 2025, vSphere 8 in October 2027. Prevent security risks & costs. Contact Northdoor for transition planning.

IT infrastructure modernisation: Expert Insights with Tom Richards

Tom Richards shares practical insights on overcoming today’s IT infrastructure modernisation challenges, covering legacy system updates, storage strategies, compliance, and hybrid IT environments.

Cyber insurance for SMBs

SMBs are a big market for cyber insurance sales, but underwriters need a clear view of risk to price accurately. Learn how.

Creating a robust cybersecurity business continuity plan

Discover how to integrate cybersecurity into your business continuity plan. Learn best practices, risk management strategies, and protect against cyber attacks. Expert guidance from Northdoor

Captcha scams: How to identify and protect yourself

Learn to defend captcha scams. Protect your personal data with expert cybersecurity tips on avoiding fake CAPTCHA attacks.

Protecting donor data: the triple threat facing UK Charities

UK charities face 924,000 cybercrimes annually. Learn how to protect donor data and strengthen security with limited resources.

Maximise your enterprise Linux with Red Hat

Discover How Red Hat Enterprise Linux can standardise your IT Environment, offering enterprise-grade support, security and cloud readiness.

Azure Security: Safeguarding your business data in the cloud

Discover how Azure security protects your business data in the cloud. Learn best practices for robust cloud security and data protection.

Maximising your hybrid cloud operations

Ensure your hybrid cloud delivers optimal performance with strategies to tackle integration challenges, manage costs, & maintain compliance.

Microsoft Azure: Enterprise-Grade Solutions for Every Business

Learn how Microsoft Azure makes enterprise-grade solutions accessible, scalable, and secure for businesses of all sizes.

Protecting highly regulated sectors from cybercrime

Discover the escalating cybercrime threat and challenges faced by regulated industries, and the proactive measures to fortify cyber security.

Quishing: The rising threat of QR Code phishing every CISO must address

Learn about Quishing, the emerging QR code phishing threat that’s alarming cybersecurity experts. Download the Quishing report.

10 practical steps to help organisations adopt AI

Discover 10 steps to adopt AI while safeguarding sensitive data. Learn safe implementation strategies, regulatory insight, and expert guidance

1

Our Awards & Accreditations