NIS2
Understanding NIS2: directly or indirectly covered? With the NIS2 directive coming into force on July 1, 2025,...
Read more about it
Grants for private IT consulting of up to DKK 50,000.
Get a grip on your IT security Why not say "Yes please" to 50,000 DKK? Get up ...
Read more about it
E-book: Journey to Azure
Wherever you are on your Azure journey - whether you're just starting to consider the possibilities, seeking knowledge or have already made ...
Read more about it
E-book: Checklist 10 IT security points
Can you anticipate the hacker's next move? Download the 10 IT security checklist.
Read more about it
Copilot in Forms
Copilot in Forms In this edition, we focus on Copilot in Forms and the exciting...
Read more about it
Two-factor authentication (MFA)
GIVE YOUR IT SECURITY A BOOST WITH AN EXTRA SECURITY LAYER Get help with your two-factor authentication in...
Read more about it
Copilot in OneNote
Copilot in OneNote In this edition, we focus on Copilot in OneNote and the exciting...
Read more about it
MFA is indispensable for businesses
At a time when digital threats are constantly evolving, it's more crucial than ever for businesses to take active steps to protect their ...
Read more about it
Anticipate the hacker's next move
Predicting the hacker's next move can be a complex task as their methods and tactics are constantly evolving. Still, you can follow a number of general...
Read more about it
How to conduct an IT security check
Should we strengthen your defense against cyberattacks? How an IT security check works. Download our PDF here.
Read more about it