4 mins read
5 Factors That Really Matter When Finding Accommodation for Picky Travellers

We all have our preferences when it comes to personal travel, and while some business travellers are...

4 mins read
Why Hotel Choice and Proximity To Destination Are Key For Business Travel Bookings

The choice of a hotel and its proximity to the business destination is absolutely vital.

3 mins read
Safe Business Travel: Your Responsibilities for Employees On The Road

Do you know what to do if an employee is involved in a crisis while out of the office?

5 mins read
3 Strategies to Make You a Better Planner – at Travel and Business

For many business owners, business travel is unavoidable. In the last year, it’s likely that you’ve...

3 mins read
How a New Generation of Business Traveller is Rewriting the Rules

“Business traveller.” For many, the term evokes an image of a middle-aged man, briefcase in hand, ru...

4 mins read
3 Bizarre Travel Scenarios… And What Travel Managers Can Do About Them

When bizarre situations strike, what can travel managers do to help their business travellers?

3 mins read
Weary Business Travellers: Check Out These 9 Inspirational Quotes

We’ve previously shared 9 travel quotes to inspire business travellers. But sometimes we all need an...

3 mins read
Reporting on hotel spending: An in-depth analysis

If you’re a travel manager, there are a few things you can do to improve the data collection and rep...

4 mins read
4 Ways Business Travel Insurance Can Help the Bottom Line

As a business owner, your financial decisions have wide-reaching consequences on the bottom line.

4 mins read
How to Survive a Business Trip with a Colleague You Don’t Know

Your survival guide for travelling with unknown colleagues. It can be a great experience – and we’ll...

4 mins read
The Rules of Business Drinks

How can you strike a balance between enjoying downtime without having to face an awkward conversatio...

3 mins read
How to Protect Your Travellers from Cyber Attacks

Did you know that an estimated 40% of data breaches are caused by external intrusions?