Sandra Vogel
Sandra Vogel is a freelance journalist with a wealth of experience in the tech sector. Sandra has produced work across a diverse range of formats including long-form and explainer content, research papers, case studies, white papers, blogs, books, and hardware reviews.
At ITPro, Sandra has contributed articles on artificial intelligence (AI), measures that can be taken to cope with inflation, the telecoms industry, risk management, and C-suite strategies. In the past, Sandra also contributed handset reviews for ITPro and has written for the brand for more than 13 years in total.
Sandra’s other work includes being a main phone and laptop reviewer for ZDNet for many years till 2023, national newspapers, and many of the best-known technology websites. Outside the world of tech journalism, Sandra also has a strong interest in volunteering and consulting in the community sector. She was formerly head of information at the housing and homelessness charity Shelter and is currently a trustee of several organizations. She is a keen saxophone player.
Latest articles by Sandra Vogel
![A man using a laptop while waving at a person on a video call](https://cdn.mos.cms.futurecdn.net/KyKWaYuCMoZzrfZPqn9MsR-320-80.jpg)
Strategies for effective upward management while working remotely
By Sandra Vogel published
In-depth Upward management is a basic tenet of good business practice, but how has it been affected by remote working?
![A bear trap on a circuit board](https://cdn.mos.cms.futurecdn.net/Ev4zyd4xb3H2rgpuP6qthZ-320-80.jpg)
Rushing digital transformation will create cyber security 'bear traps'
By Sandra Vogel published
In-depth Although digital transformation brings many benefits, rushing projects may result in unforeseen cyber security risks
![Zero trust graphic to showcase how it interfaces with IoT](https://cdn.mos.cms.futurecdn.net/SRBrHvHJLs4K7c6zPDPvVU-320-80.jpg)
Implementing zero trust with the Internet of Things (IoT)
By Sandra Vogel published
In-depth Continuous focus on organizational security is a necessary part of modern life, but are you giving your IoT devices enough attention?
![An abstract illustration of a profile of a human face on a red and black starry cosmic background](https://cdn.mos.cms.futurecdn.net/myGdxg8RqacENNEDv362vM-320-80.jpg)
Four ways AI is helping knowledge workers excel
By Sandra Vogel published
Case Study From medical diagnostics to mining and exploration, many industries are using AI to make their workers more effective
![Four increasingly large blocks with red arrows to show rising inflation for small businesses](https://cdn.mos.cms.futurecdn.net/eZPySnxZkevyzTgRpWJf3j-320-80.jpg)
How can small businesses cope with inflation?
By Sandra Vogel published
Tutorial With high inflation increasing the cost of doing business, how can small businesses weather the storm?
![Several green locked padlocks surrounding one orange unlocked padlock](https://cdn.mos.cms.futurecdn.net/whPJc65oQLRkoJomfojyEd-320-80.jpg)
Do risk awareness and risk management strategies actually make a difference?
By Sandra Vogel published
In-depth If cyber attacks are a matter of when, not if, it's tempting to ask whether risk awareness and risk management are effective
![Graphic showing a red bar going up and up to signify inflation](https://cdn.mos.cms.futurecdn.net/zLmQ9Qdb4gG8dFSzYLYr3Y-320-80.jpg)
How to deal with inflation while undergoing digital transformation
By Sandra Vogel published
In-depth How can organizations stave off inflation while attempting to grow by digitally transforming their businesses?
![Four increasingly large blocks with red arrows to show rising inflation for small businesses](https://cdn.mos.cms.futurecdn.net/eZPySnxZkevyzTgRpWJf3j-320-80.jpg)
How businesses can use technology to fight inflation
By Sandra Vogel published
TUTORIAL While technology can’t provide all the answers to fight rising inflation, it can help ease the pain on businesses in the long term
![The reflection of a hacker seen in a broken mirror to represent identity-based cyber attacks](https://cdn.mos.cms.futurecdn.net/fYUM6JWPRVgRkHVduyaHcB-320-80.jpg)
How to mitigate identity-based attacks
By Sandra Vogel published
In-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
![A shot of a woman sat at her desk in a dimly lit office, with her eyes closed and a stressed expression on her face, her hands raised to massage her temples. In the foreground, blue code is rising to either side of the frame to indicate complexity in the task that her unseen screen is showing](https://cdn.mos.cms.futurecdn.net/D6ZFS3xgHqChAfbizUojYN-320-80.jpg)
Five zero trust pitfalls to avoid
By Sandra Vogel published
In-depth Zero Trust is the gold standard for organizations in protecting systems from cyber attacks, but there are many common implementation pitfalls businesses must avoid
![Graphic of data emerging from a cloud to illustrate cloud repatriation](https://cdn.mos.cms.futurecdn.net/znFUG9qETNQrkuu28XB6wP-320-80.jpg)
What is cloud repatriation?
By Sandra Vogel published
Explainer Some organizations are turning to cloud repatriation as costs rise and demands begin to vary
![Two old CRT monitors and PCs in use to demonstrate technical debt](https://cdn.mos.cms.futurecdn.net/CU7VJNV2mJUPaQUeu6Cs5b-320-80.jpg)
What is technical debt?
By Sandra Vogel last updated
Explainer Putting off essential upgrades can lead to a build-up of technical debt, and spiralling costs down the line
![Artistic impression of a person with their brain exposed, and squiggles drawn in it](https://cdn.mos.cms.futurecdn.net/zN2u4wJpjo4cyeDqF6mfJn-320-80.jpg)
Hybrid work means we’re burning out harder and faster than ever
By Sandra Vogel published
In-depth Technology has fueled an always-on culture that’s turbocharged a new breed of burnout, but technology can also come to the rescue
![A graphic image of silos on a digital platform against a blue backdrop](https://cdn.mos.cms.futurecdn.net/AaiV2Ub37C8MsegeY5vA9G-320-80.jpg)
How to hunt down and eliminate data silos
By Sandra Vogel published
Tutorials Data silos can contain conflicting information, leading to misguided strategies and poor decision making
![Empty offices at the height of the COVID-19 pandemic in London](https://cdn.mos.cms.futurecdn.net/ABDwb5Yhc7T6WtA9aw65i7-320-80.jpg)
How the lessons of COVID-19 are shaping the future of work
By Sandra Vogel published
In-depth Three years on, businesses are reviewing how the pandemic changed work forever, with some organisations adapting well to hybrid work and others much worse
![Silhouette of telecoms infrastructure against the sunset](https://cdn.mos.cms.futurecdn.net/PVDmQTMX7qNdL9o4fHmfz8-320-80.jpg)
Why the telecoms industry might struggle more than most in 2023
By Sandra Vogel published
In-depth The industry faces the same economic pressures as any other, but concerns around 5G rollout and 3G sunsetting mean the heat is being turned up
![Dozens of overlapping paper head cutouts facing right fading from white to multicoloured](https://cdn.mos.cms.futurecdn.net/rWmJKcNV3vTM6ueB7VJBEF-320-80.jpg)
How to implement an effective diversity strategy
By Sandra Vogel published
In-depth Diversity by box-ticking, rather than building a long-term plan for change, is sure to backfire
![A computer screen showing lines going down to indicate recession](https://cdn.mos.cms.futurecdn.net/hHuu9wceTwGPK8p8LVTGrg-320-80.jpg)
Budgeting for tech projects in a financial squeeze
By Sandra Vogel published
In-depth With the current financial squeeze expected to heap more pressure on IT teams in 2023, businesses must find smarter ways to progress tech projects
![Desktop monitor and mobile phone with hand pointing](https://cdn.mos.cms.futurecdn.net/rrGZ8HhWSCRyxQFWJWSJzB-320-80.jpg)
What is MFA fatigue and how do you defend against attacks?
By Sandra Vogel published
In-depth Strong authentication is key to security, but it needs to be properly managed to avoid MFA fatigue
![Graphic of three office workers in different positions feeling unhappy](https://cdn.mos.cms.futurecdn.net/7jvNtnUCvfaC5EWef9fj9m-320-80.jpg)
Why tech is so exposed to quiet quitting
By Sandra Vogel published
In-depth What does the quiet quitting trend actually mean and what can the tech industry do to counter its root causes?
![Mockup image with padlocks to symbolise a cyber security vulnerability](https://cdn.mos.cms.futurecdn.net/Pz3CFWeJxcZh89pBoB28YV-320-80.jpg)
How to implement strong authentication
By Sandra Vogel published
In-depth Strong authentication is hugely important, but implementing any regime at scale is not without its challenges
![People using technology in lettuce production](https://cdn.mos.cms.futurecdn.net/8Q6ph2aUKY46TUZdcRoo59-320-80.jpg)
Why FoodTech M&A activity has stopped surging
By Sandra Vogel published
Analysis FoodTech’s impressive surge has stalled in 2022, but the M&A slowdown is only a blip, with the wider sector gearing up for an imminent boom
![A 2D mockup image of a business paying a cyber criminal for a ransom](https://cdn.mos.cms.futurecdn.net/bFQu3h53zHpohYToQdXjg6-320-80.jpg)
Ransomware: Why do businesses still pay up?
By Sandra Vogel published
In-depth Despite the guidance and best practice, an alarming proportion of businesses hit with ransomware simply pay to make it go away
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.