EU-flag og NIS2 – illustration af NIS2 direktiv, it sikkerhed, it drift, it rådgivning, it support erhverv, it outsourcing og compliance hos IT Forum Gruppen.
IT security

NIS2

Understanding NIS2: directly or indirectly covered? With the NIS2 directive coming into force on July 1, 2025,...
Read more about it
IT-sikkerhed
IT security

Grants for private IT consulting of up to DKK 50,000.

Get a grip on your IT security Why not say "Yes please" to 50,000 DKK? Get up ...
Read more about it
Forside af e-bog Rejsen til Azure – it outsourcing, it drift, it rådgivning, it sikkerhed og it support erhverv hos IT Forum Gruppen.
AzureAzureE-booksebookIT hostingMicrosoft 365

E-book: Journey to Azure

Wherever you are on your Azure journey - whether you're just starting to consider the possibilities, seeking knowledge or have already made ...
Read more about it
Tjekliste Forudse hackerens næste træk
Awareness TrainingE-booksebookIT securityIT SecurityITF AcademyPhishing

E-book: Checklist 10 IT security points

Can you anticipate the hacker's next move? Download the 10 IT security checklist.
Read more about it
Microsoft Copilot i Forms
Copilot in FormsCopilot for Microsoft 365IT security

Copilot in Forms

Copilot in Forms In this edition, we focus on Copilot in Forms and the exciting...
Read more about it
2 faktor godkendelse
IT security

Two-factor authentication (MFA)

GIVE YOUR IT SECURITY A BOOST WITH AN EXTRA SECURITY LAYER Get help with your two-factor authentication in...
Read more about it
onenote
Copilot in OneNoteIT security

Copilot in OneNote

Copilot in OneNote In this edition, we focus on Copilot in OneNote and the exciting...
Read more about it
Hacker - IT-sikkerhed
IT securityIT SecurityTwo-Factor Approval

MFA is indispensable for businesses

At a time when digital threats are constantly evolving, it's more crucial than ever for businesses to take active steps to protect their ...
Read more about it
it-sikkerhed-naeste-traek_itf
IT security

Anticipate the hacker's next move

Predicting the hacker's next move can be a complex task as their methods and tactics are constantly evolving. Still, you can follow a number of general...
Read more about it
it-sikkerhedstjek-e-bog-top
E-booksebookIT security

How to conduct an IT security check

Should we strengthen your defense against cyberattacks? How an IT security check works. Download our PDF here.
Read more about it
Scroll to Top