Esther Kezia Thorpe
Esther is a freelance media analyst, podcaster, and one-third of Media Voices. She has previously worked as a content marketing lead for Dennis Publishing and the Media Briefing. She writes frequently on topics such as subscriptions and tech developments for industry sites such as Digital Content Next and What’s New in Publishing. She is co-founder of the Publisher Podcast Awards and Publisher Podcast Summit; the first conference and awards dedicated to celebrating and elevating publisher podcasts.
Latest articles by Esther Kezia Thorpe
![Illustration of a code cloud raining over a city](https://cdn.mos.cms.futurecdn.net/MQQHbEzjxMjib6Fh7LDmbS-320-80.jpg)
Cloud services market to grow 20% by 2029 following pandemic step change
By Esther Kezia Thorpe published
Analysis Organisations are embracing the use of multiple clouds, but formal management is lagging
![Abstract image showing the inside of a data centre with graphics of clouds and symbols overlaid](https://cdn.mos.cms.futurecdn.net/SeLKhwPfYbAJUYUM9KMshi-320-80.jpg)
Our 5-minute guide to hybrid cloud storage
By Esther Kezia Thorpe last updated
In-depth What are the benefits and challenges of hybrid cloud storage?
![Cloud illustrations on a blue background with a ladder](https://cdn.mos.cms.futurecdn.net/GYmAKPRPkhN6QvrjgpqHLN-320-80.png)
Five obstacles holding your hybrid cloud strategy back
By Esther Kezia Thorpe last updated
In-depth Overcoming these challenges is key to a successful cloud migration strategy
![CGI representation of a cloud containing light, signifying data held in the cloud](https://cdn.mos.cms.futurecdn.net/QW5FsoVKvJPk3iHRNLhzmJ-320-80.jpg)
How the cloud can add value to Big Data
By Esther Kezia Thorpe last updated
In-depth Early adopters are already demonstrating how to get more from analytics via the cloud
![Abstract image showing a red circuit board containing a square chip with a glowing skull etched into it](https://cdn.mos.cms.futurecdn.net/9y74aNb3WuKxNCmStPT7Sa-320-80.jpg)
What are the different types of ransomware?
By Esther Kezia Thorpe last updated
In-depth Ransomware comes in more than one form, so here's what to look out for
![Abstract image of a sea of binary code to symbolise large volumes of data](https://cdn.mos.cms.futurecdn.net/XhNFCN42VtXCvfcPGsbzBa-320-80.jpg)
Three keys to successful data management
By Esther Kezia Thorpe last updated
In-depth Companies need to take a fresh look at data management to realise its true value
![Data centre with green high speed visualisation projection overlay](https://cdn.mos.cms.futurecdn.net/gmf93WXj8a9Arq8UDKuuWB-320-80.jpg)
Nine tips to improve your disaster recovery strategy
By Esther Kezia Thorpe last updated
In-depth Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
![Some goldfish being lured by fishing hooks](https://cdn.mos.cms.futurecdn.net/mhFyUs4GxXkyMArfG849r4-320-80.jpg)
Five giveaways that show an email is a phishing attack
By Esther Kezia Thorpe last updated
In-depth One of the biggest problems in cyber security is the phishing email
![Hand with cloud floating above it raining different currencies](https://cdn.mos.cms.futurecdn.net/Dz5J2iAftV6F7zeWyJivSE-320-80.jpg)
Four ways to keep cloud costs under control
By Esther Kezia Thorpe last updated
In-depth Individual cloud costs may look manageable, but can quickly spiral out of control. Read our tips to get a grip on cloud spending
![A corporate boardroom filled with empty chairs against a long table](https://cdn.mos.cms.futurecdn.net/9mhDVbhaNN3QbuzGhTRRE7-320-80.jpg)
Six ways boards can step up support for cyber security
By Esther Kezia Thorpe last updated
In-depth Security is an enterprise-wide risk management concern, not merely an IT issue
![ransomware](https://cdn.mos.cms.futurecdn.net/JjcjpRLzrunvtD3QprSvsM-320-80.jpg)
How can you protect your business from crypto-ransomware?
By Esther Kezia Thorpe last updated
In-depth Here are some easy-to-apply rules to help keep your data - and your business operations - safe
![Businessman sits on a cloud while working on a laptop](https://cdn.mos.cms.futurecdn.net/4ggGUTQnNKFRTLshs5kcKU-320-80.jpg)
Our 5-minute guide to cloud-managed networking
By Esther Kezia Thorpe last updated
Tutorials Learn why cloud-managed networking is growing in popularity with businesses
![Man holding mobile phone over laptop with double exposure city overlay](https://cdn.mos.cms.futurecdn.net/5c346bfs6gDEbzDSjxg8mj-320-80.jpg)
What is shadow IT?
By Esther Kezia Thorpe last updated
In-depth Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
![workforce](https://cdn.mos.cms.futurecdn.net/gaWL6w7F3eJit2NLAcN4LY-320-80.jpg)
Five digital transformation tips for HR
By Esther Kezia Thorpe last updated
In-depth Digital transformation efforts can start from within your own department
![null](https://cdn.mos.cms.futurecdn.net/AF9niUzvSot2CmdzCVjR9L-320-80.jpg)
Three ways to protect PDF documents
By Esther Kezia Thorpe last updated
In-depth How can you safeguard your organisation's documents?
![null](https://cdn.mos.cms.futurecdn.net/wXrHdDAFst8KzC78AojYQo-320-80.jpg)
How to choose an embedded analytics vendor
By Esther Kezia Thorpe last updated
In-depth The advantages of embedded analytics can only be achieved in partnership with the right vendor
![null](https://cdn.mos.cms.futurecdn.net/fs8LM6FVbDr7sL7kM9ZA6S-320-80.jpg)
Five ways the office is evolving for the future
By Esther Kezia Thorpe last updated
In-depth Technology isn't the only factor driving our changing office spaces
![Silhouettes of a team of office workers with a blue technology overlay to represent the future](https://cdn.mos.cms.futurecdn.net/d9mdtgnAJC5MFBLzVgNey6-320-80.jpg)
What does the future of work look like?
By Zach Cooper, Clare Hopping, Esther Kezia Thorpe last updated
In-depth How remote working, automation and AI will affect the way we work
![Data Breach overlaying a circuitboard](https://cdn.mos.cms.futurecdn.net/fMbMro3SjAzTb5vKxrzNfc-320-80.jpg)
What is Breach and Attack Simulation (BAS)?
By Esther Kezia Thorpe published
In-depth Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences
![Business classroom with a woman talking about cyber security, blue padlock image on whiteboard](https://cdn.mos.cms.futurecdn.net/3BBjRB7TFv8wtojSeTwKWJ-320-80.jpg)
Our 5-minute guide to security awareness training
By Zach Cooper, Esther Kezia Thorpe last updated
In-depth How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack
![Illustration of a code cloud raining over a city](https://cdn.mos.cms.futurecdn.net/MQQHbEzjxMjib6Fh7LDmbS-320-80.jpg)
Our 5-minute guide to enterprise cloud computing
By Zach Cooper, Esther Kezia Thorpe, Grace Halverson last updated
In-depth What is enterprise cloud computing, how is it used, and what are the business benefits?
![security in either data protection or cyber security](https://cdn.mos.cms.futurecdn.net/iiB6QBechRHdboBBzRbb3d-320-80.jpg)
How to sell IT security effectively
By Esther Kezia Thorpe published
In-depth Today's threat landscape has never been more complex, so adding IT security to your offering is valuable for customers
![digital transformation cloud illustration](https://cdn.mos.cms.futurecdn.net/v6uK6FfssF8hVszPXHrFvm-320-80.jpg)
Five ways the cloud can benefit HR departments
By Esther Kezia Thorpe published
In-depth From greater flexibility to advanced analytics, here are some key benefits of the cloud for HR
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.