Create a virtual machine with the Azure portal and powershell

Create SSH key pair

You need an SSH key pair to complete this quick start. If you have an existing SSH key pair, this step can be skipped.

From a Bash shell, run this command and follow the on-screen directions. The command output includes the file name of the public key file. Copy the contents of the public key file to the clipboard. Read more

Microsoft Azure – SaaS ebook

E-book: What you need to know about Shadow IT

Shadow IT is on the rise. More than 80 percent of employees admit to using non-approved SaaS apps in their jobs, and Gartner estimates that by 2020, a third of successful attacks experienced by corporations will be on their shadow IT resources. While the urge to eliminate all shadow IT applications is understandable, it’s rarely the best solution. Read more

How to remove Wannacry Ransomware fixes from Microsoft

As you are all aware of the new ransomware has been used in the massive hacking attack, affecting tens of thousands of computers worldwide.

If any of the staff/User receive any suspicious emails and if you are not sure, please do not open any attachment files. Just forward it to your Admin for further investigation.

How to identify suspicious email:

Read more

How to install Let’s Encrypt on QNAP/NAS

Install Instructions



  1. Login to your QNAP/NAS and make sure the following Apps are installed:
  2. Make sure your QNAP/NAS is reachable on the internet under the domain you want to get a certificate for on port 80 or 443.
  3. Create a folder to store qnap-letsencrypt in under /share/YOUR_DRIVE/.

Read more

GDPR (General Data Protection Regulation)

Hope all well.

Just in case you are not talking to advisors about this already, I wanted to send you something on the topic of GDPR (General Data Protection Regulation), something which is now worrying a number of our clients.

As you may know, all UK businesses will be affected by the GDPR, particularly those who hold sensitive data about their customers.

A number of my clients are now looking closely at this given all the personal data they now hold on customers from websites, loyalty schemes, customer programmes etc. The Technology, Media and Telecoms sector faces a particular challenge around this – an ever increasing exposure to large amounts of customer data from everyday business operations. Read more