Create SSH key pair

You need an SSH key pair to complete this quick start. If you have an existing SSH key pair, this step can be skipped.

From a Bash shell, run this command and follow the on-screen directions. The command output includes the file name of the public key file. Copy the contents of the public key file to the clipboard. Read more

E-book: What you need to know about Shadow IT

Shadow IT is on the rise. More than 80 percent of employees admit to using non-approved SaaS apps in their jobs, and Gartner estimates that by 2020, a third of successful attacks experienced by corporations will be on their shadow IT resources. While the urge to eliminate all shadow IT applications is understandable, it’s rarely the best solution. Read more

As you are all aware of the new ransomware has been used in the massive hacking attack, affecting tens of thousands of computers worldwide.

If any of the staff/User receive any suspicious emails and if you are not sure, please do not open any attachment files. Just forward it to your Admin for further investigation.

How to identify suspicious email:

Read more

Install Instructions

Method 1- QNAP/NAS Setup

  1. Login to your QNAP/NAS and make sure the following Apps are installed:
  2. Make sure your QNAP/NAS is reachable on the internet under the domain you want to get a certificate for on port 80 or 443.
  3. Create a folder to store qnap-letsencrypt in under /share/YOUR_DRIVE/.

Read more

Hope all well.

Just in case you are not talking to advisors about this already, I wanted to send you something on the topic of GDPR (General Data Protection Regulation), something which is now worrying a number of our clients.

As you may know, all UK businesses will be affected by the GDPR, particularly those who hold sensitive data about their customers.

A number of my clients are now looking closely at this given all the personal data they now hold on customers from websites, loyalty schemes, customer programmes etc. The Technology, Media and Telecoms sector faces a particular challenge around this – an ever increasing exposure to large amounts of customer data from everyday business operations. Read more

Learn how to provision, manage, and access Amazon WorkSpaces

Welcome

In this project, you’ll learn how to deploy cloud desktops using Amazon WorkSpaces and the AWS Directory Service. Amazon WorkSpaces is a fully managed, secure desktop computing service which runs on the AWS cloud. Amazon WorkSpaces allows you to easily provision cloud-based virtual desktops and provide your users access to the documents, applications, and resources they need. The AWS Directory Service makes it easy to setup and run Microsoft Active Directory (AD) in the AWS cloud, or connect your AWS resources with an existing on-premises Microsoft Active Directory.

What you’ll accomplish:

  • Provision Cloud Desktops using Amazon WorkSpaces, and access them using the Amazon WorkSpaces client application, available for Windows and Mac computers, Chromebooks, iPads, Fire tablets, and Android
  • Create a new directory using Microsoft AD and add As part of the project, you’ll learn how to assign Amazon WorkSpaces to users in your Microsoft AD.
  • Perform basic administrative tasks using the AWS Management Console. You’ll learn how to reboot and rebuilt Amazon WorkSpaces, create your own custom image which you can use for provisioning new Amazon WorkSpaces, and remove Amazon

Read more