Tech update:
DORA, supplier risks, legacy applications and AI
Northdoor’s AJ Thompson shares a tech update on DORA, Supply Chain risks, legacy applications and AI. Stay informed about the latest trends.
Eight challenges organisations face with DORA
Explore the challenges faced by the financial sector organisations in achieving DORA regulation compliance.
The massive data leak - Mother of all Breaches (MOAB)
Explore the implications of the MOAB data leak with 26 billion records. Discover actionable steps to protect your data from cyber threats.
2024 Tech Trends: Sustainability and AI
Explore how sustainability and AI are set to shape the IT agenda in 2024. Understand the role of technology in driving sustainable business practices, the impact of AI on industries, and the…[ ]
What are the top four technology trends in 2024 everyone must be ready for?
Discover the top tech trends in 2024 from cyber resilience, generative AI, sustainable technology, quantum computing and more
Navigating Digital Transformation in the Insurance Industry for 2024
Discover key insights on digital transformation in the insurance industry for 2024. The impact of Blueprint Two, cyber security measures, cloud migration strategies & compliance considerations.
How can Financial Services protect themselves from supply chain cyber attacks?
Learn how financial services businesses can safeguard against cyber attacks & improve supply chain security. Get free supplier analysis.
Navigating IBM Cognos Analytics
Optimise your business intelligence with IBM Cognos Analytics. Unleash the power of your data and make informed decisions with confidence.
Digital Transformation in 2024
Rob Batters shares insights on digital transformation in 2024, offering strategies to navigate challenges and seize opportunities for success
The rising threat of supply chain vulnerabilities
Discover the impact of growing supply chain threats on organizations. Explore recent high-profile hacks and the need to be proactive.
Strengthening DORA Compliance with IBM Solutions
Discover how IBM’s Solutions empower organisations to achieve DORA compliance effortlessly. Find out about the DORA Assessment workshop.
8 steps to achieve cyber security compliance
Master cyber security compliance in eight crucial steps to put your organisation on the right path with Northdoor.
Technology Insights: AI, Cyber Security Solutions
Gain a competitive edge with Technology insights from AJ Thompson. Stay informed about the latest trends from AI, cyber security and more.
Purchase new IBM storage and trade in old storage for a rebate
Discover the IBM Storage Trade-In Program with Northdoor. Earn direct payments from IBM when upgrading to eligible IBM storage and trading in outdated storage solutions. Optimise your storage…[ ]
How can firms strengthen Operational Resilience under DORA?
To comply with DORA & FCA’s operational resilience regulations, financial firms must assess cyber risks & build resilience. First steps.
How have phishing attacks evolved in 2023?
The report reveals the most phished topics and trends of 2023, shedding light on the tactics cybercriminals employ to deceive unsuspecting individuals.
Supply Chain cyberattacks: The invisible threat organisations must address
In light of the recent supply chain cyberattacks, AJ Thompson highlights the increasing risks organisations of all sizes must address, urging proactive data protection.
Actionable AI Advice for business from the experts
Learn about the key insights on leveraging AI in business shared during a webinar hosted by IBM and Northdoor experts.
How IBM Watsonx uses AI to transform business
An overview of how IBM Watsonx leverages artificial intelligence to optimise processes, enhance customer experiences, and drive innovation across industries
Sanctions Screening and the role of a sanctions checker application
Looking to understand what a sanctions checker application is or need help with financial sanctions screening?
How the NIS2 Directive will impact UK Companies
Understand the key points of the NIS2 Directive. Stay compliant with this latest cybersecurity regulation impacting UK businesses.
DORA Regulation - Key points explained
Discover the key points of the Digital Operational Resilience Act (DORA) and learn what you need to do to comply with the regulation.
Are breached organisations hesitant to increase security spend despite soaring breach costs?
Discover the 2023 IBM Cost of the Data Breach report. Uncover strategies to strengthen your security measures and protect your organisation
New changes to Lloyd's of London's Blueprint Two roll-out:
what companies need to know
Learn about the recent changes to Lloyd’s of London’s Blueprint Two roll-out, introducing Phase One and Phase Two approaches for companies. Discover these changes, reasons & tips.
Northdoor upholds strong Data Protection with renewed Cyber Essentials Certification
Northdoor has received the Cyber Essentials certification again this year, demonstrating our commitment to cybersecurity standards.
Data Science vs. Machine Learning: Understanding the difference
Learn how data science brings structure to big data, while machine learning focuses on learning from the data itself.
Revolutionising healthcare analytics to reduce waiting times and save lives
As Hospital Accident & Emergency Department deaths surge by over 20% since 2021, healthcare providers must explore innovative ways to minimise waiting times.
Ensuring compliance with the Digital Operational Resilience Act (DORA): safeguarding the financial sector
Discover the key aspects of the Digital Operational Resilience Act (DORA) and learn how UK financial companies can prepare for its implementation to enhance cybersecurity and ensure compliance.
British Airways, Boots, and the BBC hit by supply chain attack: a wake-up call for companies
Supply chain attacks highlight the urgent need for comprehensive supply chain security measures.
The six cyber security challenges for business in 2023
Organisations are struggling to deal with six cyber security pain points, but there are solutions to these cyber security challenges.
Northdoor wins Big Data/Analytics Solution of the Year
at 2023 IT Europa Channel Awards
Northdoor wins Big Data/Analytics Solution of the Year award at the 2023 IT Europa Channel Awards for Maidstone and Tunbridge Wells NHS Trust
Northdoor launches Blueprint Two solution "Alternate" to support London Market's Digital transformation
Introducing Alternate: A Blueprint Two Solution for London Market Carriers. Achieve digital transformation with minimal disruption. Learn more now!
IBM ending support for several IBM Storage products in 2023
Learn about IBM’s upcoming end of support for several storage products and why upgrading to newer systems is essential.
Northdoor are finalists in multiple categories in the 2023 IT Europa Channel Awards
Northdoor is a finalist in four categories in the 2023 IT Europa Channel Awards recognising their expertise in complex projects
End of Support for IBM POWER8: What Businesses Need to Know
IBM POWER8 support is ending, and businesses must upgrade to continue receiving mainstream IBM maintenance and support.
How to execute an effective, proactive cyber security strategy
The rise of cyber attacks calls for a proactive approach to security. Learn the pitfalls of reactive defences, the benefits of a proactive strategy, and how to execute it effectively.
Why supply chain security is crucial for the Insurance sector
Mitigate cyber risk for insurance firms with AI-powered solutions to identify vulnerabilities in supply chains. Learn more.
Cloudtango names Northdoor as a top managed service provider
Northdoor named one of the top Managed Service Providers by Cloudtango MSP Select 2023
Modernise, Build, Test and Deploy IBM Applications in Azure with Skytap
Discover how the Skytap and ARCAD partnership accelerates IBM i application modernisation with agile DevTestOps automation on Azure. Streamline your development process and increase innovation pace.…[ ]
Northdoor plc joins the Association for Cooperative Operations Research and Development (ACORD)
Northdoor joins ACORD for the Lloyd’s of London Blueprint Two
What are the consequences of data breaches on share prices?
A study shows the far-reaching consequences of data breaches on companies, including a significant drop in share prices. Learn what businesses need to know to protect themselves and their investors.
5 tips for a successful data migration
Data migrations can be complex. Avoid these five common mistakes to ensure a successful data migration in your digital workplace
Why a new approach to email security is needed
Change is needed in email security responses due to escalating threats. Learn advanced detection techniques and promote cybersecurity culture.
Cyber Security as a Managed Service
Protect critical data from core systems to partner ecosystems, with cyber security as a fully managed service from Northdoor.
Azure Migration Success: Blue Cube Travel's migration to Azure transports its business to new places
Video transcription: Dominic Green talks to Kevin Trill, about Blue Cube Travel’s process of migrating their IT systems to the Microsoft Azure Cloud.
Drive greater value from IT with expert managed services
In tough economic times, outsourcing to an expert managed services provider can reduce cost & focus internal resources on business priorities.
Learn the key considerations for Digital Transformation in the Public Sector and NHS in 2023
Public Sector organisations keen to deliver a better service to customers while driving down costs need to harness insights from their data for better, more informed decision-making.
Key trends impacting the insurance market in 2023 and beyond
The Lloyd’s Insurance market is not immune from the recession. Stuart Favier talks about the key factors impacting insurers in 2023 and the affect that Blueprint Two will have as Lloyd’s prepares…[ ]
Managed Cybersecurity Services for SMEs: Protect Your Business from Data Breaches and Cyber Attacks
Learn how to protect your business from data breaches and cyber attacks with Northdoor’s managed cybersecurity services for SMEs.
Supply chain attacks: The importance of proactive monitoring
There has been a significant rise in cyber attacks on companies via third parties and partners. NCSC’s recommendations can help improve security and protect companies from these attacks.
Subscribe to our newsletter
Subscribe to our newsletter to get the very latest insights and updates in the world of enterprise IT and data security: