IT Passport March Promo
Put your data to work
CertNexus Training with New Horizons

Free Office 365 eBook

Power Hour Training from New Horizons
Training by job role

Free Webinars

See All Upcoming Webinars


Top 10 Attributes needed to Maximize your Office Influence

Register Now Research and surveys by OfficeInfluence.com identified 50 personal and business attributes that positively or negatively affect your ability to influence others within the workplace. The webinar describes the top 10 attributes ...Read More


The Most Underutilized Apps and Features of Office 365

Register Now Beyond the traditional desktop and online applications within Office 365, such as Access, Excel, OneNote, Outlook, PowerPoint, and Word, there are several additional services, apps, and features that you may ...Read More


Discovering Your Leadership Voice

Register Now By their very definition, leaders inspire followership in others. Whether speaking conversationally or presenting before a group, a powerful leadership message delivered with impact and focused on the needs ...Read More

Recent Blog Posts

Five Things to Know About Data Science

Data science has evolved from a traditional analysis-based industry into an intricate field filled with different complexities. Businesses are demanding data scientists more than ever to help them understand their growing databases and uncover useful intelligence.

Continue Reading

Transitioning to the Internet of Things (IoT) - Are You Ready?

According to CertNexus, the leading Internet of Things (IoT) certification provider, 82 percent of organizations plan to adopt some form of the IoT within the next two years. But 47% of those same businesses don’t have the skills needed to truly benefit from IoT deployment.

Continue Reading

4 Growing Cybersecurity Threats in 2019

Regardless of your industry, awareness and prevention of cybersecurity threats must be a priority. New industries, born from advances in technology, merely serve as new opportunities for cyber-criminals. Here are 4 growing cybersecurity threats that organizations everywhere need to be aware of.

Continue Reading