Cloud Encryption | Cybersecurity

23 Nov

cloud encryption

The how and why of cloud encryption Data encryption is a major part of every effective cybersecurity setup – but what is it, how does it work, and why should you be interested in data storage, and more specifically, how your data is encrypted in the cloud? To answer these questions, we’ve put together a […]

Back tracking | Smartphones & Privacy

16 Nov

smartphones & privacy

Is your phone ‘back’ tracking you? Billions of people around the world rely on their mobile phones for much more than just communication. In fact, these devices have become inseparable from their owners in every sense – including data privacy. is your smart phone working for you or against you? Backing up your data and […]

Cyber-incident Response Plan | Cybercrime

9 Nov

response plan

How to Build a Cyber-incident Response Plan No matter how hard you work to prevent data leaks or hacking incidents, the sheer number of these events taking place recently means that your business may have to deal with the reality of being the target of cybercrime in the future. Like any crisis, it’s what you […]

Security Awareness Programme for Employees | Cybersecurity

2 Nov

security awareness programme for employees

The key to building a security awareness programme for employees The best cyber security system in the world won’t be able to protect your business if your employees leave the door open for cyber criminals – even if they don’t mean to. Since human error is usually the weak link in every digital security chain, it’s […]

Data Strategy | Data Driven Storage

26 Oct

Dump the hard drive – data driven storage for the post-pandemic world The world of business is hugely different than it was pre-pandemic. So why are we still using outdated physical hardware storage rather than using a strategy of data driven storage? With workers and management carrying out tasks remotely there’s an urgent need for […]

Have the Right Credentials | Ransomware Attacks

19 Oct

right credentials ransomware attacks

Do you have the right Credentials to evade Ransomware attacks? Ransomware is a particularly nasty type of malware that’s used to hijack your important business data and – like the name says – demand a ransom in exchange for its release. Attacks of this type have been rising in South Africa, with big names like […]

Facebook Lost Control | Mobile Apps

12 Oct

facebook control

Has Facebook lost control? Social media is a huge part of our lives and for most of us, Facebook is the platform we go to for news, entertainment and to keep up with everyone we know. This wildly successful social media platform has grown exponentially over the years and is now used by 3 billion people […]

Cybersecurity Vulnerabilities | Data Threats

5 Oct

cybersecurity vulnerabilities

Does your company have cybersecurity vulnerabilities? As a 21st-century entrepreneur you possibly do a lot of business on the Internet. There’s no doubt it’s a great strategy, but it comes with its own set of risks. From data breaches to ransom ware and your run-of-the-mill viruses, there are a host of dangers out there on the […]

South African Security Breaches | Hackers

28 Sep

security breaches

South African Security Breaches Raise Hackles The latest surge in security breaches during 2021 has raised the hackles of CIOs and business owners who access sensitive data in their organisation, particularly from remote work environments. Hackers have clearly been using the lull caused by COVID-19 to hone and master their hacking skills. most recent security […]

Digital Passports | Mobile Apps

21 Sep

digital vaccine passport

Digital Vaccine Passports – Are They a Blessing or a Security Risk? Digital passports: are they the answer to opening up the country again or simply an unsecured backdoor left swinging in the wind? How would a digital vaccine passport affect, your business, and your personal life? These are the questions that need answering if […]