Microsoft Office

Cybersecurity for the Modern Era
The book explores how cyber attacks and compliance issues are evolving and outlines how you can create...

Managing Sprawl in Microsoft 365
How content sprawl happens, why it matters, and steps every IT leader should take to avoid it. Sprawl...

HitchHiker's Guide to Veeam Backup and Replication Community Edition
Businesses and individuals alike rely on using and accessing their data, whether it be for critical business...

Conversational Teams Management and Migration
The abrupt transition to everyone working from home forced IT to cut through all of the usual bureaucracy...

An Authentication Authority at Your Fingertips: PingFederate
Having an authentication authority within your infrastructure allows you to have a single source of truth...

Cyber Attack Trends: Check Point’s 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...

Ransomware Prevention Is Possible
Ransomware is a form of malware that encrypts files to prevent victims from accessing their systems and...

The Gorilla Guide to Achieving IT Asset Management Success
ITAM is about knowing what you've got, where it is, who's using it and how much it costs. If you want...

Microsoft Teams Backup - a Conversational Geek E-book
Learn everything you need to know about protecting Teams data from this Conversational Geek e-book by...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.