Skip to main content
false

Joseph Nduhiu

Joseph is an ICT consultant and trainer with over 18 years of global experience across multiple sectors. His passion is assisting business units and IT departments in executing their digital transformation strategies and streamlining their operations in line with global standards and best practices. His areas of expertise include business process reengineering, IT service management, project management and cyber resilience. You can connect with Joseph @josephnduhio and on LinkedIn.

Learn 6 Min Read

Configuration Management & Configuration Items (CI) Explained

Protect your systems and ensure stability with configuration management. Discover the benefits and implement an effective strategy for your business.
Learn 4 Min Read

What is Continuous Improvement?

Explore continuous improvement principles, Lean techniques like Agile, Scrum, and Kanban, and how IT leaders use them to enhance value and efficiency.
Learn 4 Min Read

What’s Reliability? Reliability Metrics To Know

These top reliability metrics indicate where organizations should focus in order to support reliability requirements for uptime and performance.
Learn 6 Min Read

Cybersecurity Policies: Types & Best Practices

Learn how to structure effective cybersecurity policies to protect critical systems, address evolving threats, and meet regulatory obligations.
Learn 7 Min Read

What is Infrastructure Monitoring?

Monitoring your infrastructure starts long before systems go live. Let’s look at approaches, tools, challenges & future trends of infrastructure monitoring.
Learn 5 Min Read

What Is ISO 42001 for AI?

ISO 42001 is a standard for establishing, implementing, maintaining, and continually improving your Artificial Intelligence Management System (AIMS).
Learn 6 Min Read

Vendor Management: The Complete Guide

Vendor management is an important practice for most organizations. Learn how to do it well, step by step, in this complete guide.
Learn 2 Min Read

ITOM vs. ITSM: IT Operations Management & IT Service Management

ITOM and ITSM both help your IT teams to better manage and deliver IT services to the business. What’s the difference? Get the full story here.
Learn 6 Min Read

What Is Service Continuity Management?

Service continuity management helps your organization to respond to disruption and ensure the availability and performance of services are maintained.
Learn 6 Min Read

Shadow IT & How To Manage It Today

Shadow IT exists for a few reasons: is one side more right? Is there a middle ground? Get the full story from IT expert Joseph Nduhiu in this article.
Learn 8 Min Read

ISO/IEC 31000 for Risk Management

When it comes to managing risk, there’s a LOT to consider. Start with ISO 31000, the International Standard for organizational risk management.
Learn 5 Min Read

IT/ITIL® Event Management

Learn how to succeed with IT event management. Which events are important, and the rest of just noise? Get the full story here.
Learn 6 Min Read

Customer Experience (CX) Metrics

Learn everything you need to know about network architecture and follow the best practices to maintain your architecture’s security.
Learn 6 Min Read

Critical Infrastructure & Managing Risk

Risks to critical infrastructure are both physical and digital, and the consequences can be enormous. Read more in this introduction to critical infrastructure.
Learn 6 Min Read

Business Process Reengineering Explained

Let’s face it: processes at work don’t always work. Business process reengineering helps you stay on top of constant change while still accomplishing your most important goals.
Learn 7 Min Read

What is Business Impact Analysis?

A business impact analysis helps you prepare for service continuity in the face of disruption. Get the full story and the 8-step BIA process here.
Learn 5 Min Read

Scalability in IT: The Complete Guide To Scaling

Scalability is one of the main selling points of migrating to the cloud. What exactly does it mean & how do you do it? Get the full story here.
Learn 5 Min Read

ISO 27002: Information Security Controls Explained

In this article, we will look at the origin story of the ISO 27002 standard, as well as its structure, and how to apply the guidelines.