Managed Business & IT Training Solutions

MBIT Training Ltd


Throughout December we tweeted out some new additions to the NCSC glossary. Our aim with the glossary is to build a set of straightforward definitions to common cyber security terms.

cyber , security , ncsc

Each year, fraudulent activity accounts for $600 billion in losses in the United States. Explore this resource to gain insight into policy regulations and how to secure your data while maintaining regulatory compliance.

The full article can be viewed here:

By Logicworks. Available from this link (email required):

By Centrify. Available from this link (email required):

Security guru Steve Gibson cooks up a new, easy, no-bull utility that scans your machine and tells you, point blank, whether you’re vulnerable to Meltdown or Spectre.

Full article at:

A Gartner Research survey shows that while companies often use a variety of Office 365 elements, only two – email and the Office apps – provide real value.

Full article at:

The 'Long-term Servicing Branch' of Windows 10 was initially aimed at enterprises that wanted to avoid Microsoft's Windows-as-a-service model and delay frequent feature updates. Here's how it's supposed to work.

Full article at:

Office for Mac 2016 gets an auto-save feature matching what Windows users have had since last August. AutoSave is available only to Office for Mac 2016 users who also subscribe to Office 365.

Full article at:

If you own a PC from Dell, HP or Lenovo, chances are very good that the BIOS or UEFI firmware update you installed earlier this month is bad. Here’s how to dig yourself out of the Meltdown/Spectre mess.

Full article at:

Am pleased to be working again with one of the UK's leading gaming companies who are looking to use Intune and System Center to control and to automate their network. Deploying Windows Devices and Enterprise Apps (20695) will definitely be helpful to achieve this.