E-book: What you need to know about Shadow IT

Shadow IT is on the rise. More than 80 percent of employees admit to using non-approved SaaS apps in their jobs, and Gartner estimates that by 2020, a third of successful attacks experienced by corporations will be on their shadow IT resources. While the urge to eliminate all shadow IT applications is understandable, it’s rarely the best solution. Read more

As you are all aware of the new ransomware has been used in the massive hacking attack, affecting tens of thousands of computers worldwide.

If any of the staff/User receive any suspicious emails and if you are not sure, please do not open any attachment files. Just forward it to your Admin for further investigation.

How to identify suspicious email:

Read more

The most extensive study into the impact of digital transformation on UK organisations at a time of great uncertainty in the British economy.

Download the extensive 52-page report now

Read more

Step by step Ms project 2013 guide

Before you need to start learning please download Exercise ebook and open first chapter on Ms project 2013.

Read more

How to create Azure Virtual Machines (VMs)? See below full videos and presentations and how they differ from VMs in your own datacenter. Qualify how to create then, see how to configure disks and networking to communicate VMs, and watch and listen the basics around using Azure Virtual Machines.

Learn the basics around using Azure Virtual Machines, find out what they are, and see how to configure disks and networking so VMs can communicate.


Read more