AWS Outage – Backup

What Businesses Can Learn from the AWS Outage

On 20 October 2025, business processes around the world ground to a halt as Amazon Web Services (AWS) went offline due to a technical error at one of its US data centres.

As companies on several continents scrambled to restore their data and recoup millions of dollars in losses, the cybersecurity community’s focus turned to the vulnerabilities of a world dominated by three major cloud giants and the urgent need for multiple types of backup.

Let’s unpack the recent AWS service failure, find out what it means for data security, and highlight some ways that your business can keep its files safe by not putting all your data in one basket.

AWS Goes Down, Sparking Global Panic

Amazon Web Services, along with Google Cloud and Microsoft Azure, make up the lion’s share of cloud-based storage worldwide. 

When a single technical fault at an AWS data centre caused widespread business impact that took several financial apps such as Robinhood and Vemmo, and popular social meadia apps, including Snapchat and Reddit offline, the power of one glitch to cause digital chaos was on full display.

Despite Amazon having resolved the issue and businesses being back online later the same day, many companies are still counting the financial and reputational cost of the outage, Amazon itself included.

In the week of this major outage, which is certainly not the first of its kind to affect major providers in recent years, cybersecurity providers were reminded that multiple backup methods remain the safest way to ensure comprehensive data security

  • While secure cloud storage is generally the gold standard in data backup, the possibility of an outage of the kind that affected AWS recurring in the future is not zero. 
  • As a result, it’s imperative for businesses to not only back up their data automatically in the cloud but also invest in a hard drive backup.

The main lesson from the AWS outage is to always back up your data in the cloud and have a backup for your backup. 

The Case for Hybrid and Hard Drive Backups

Soteria Cloud’s Total Data Protection package allows a precise copy of the contents of your physical drive to be stored securely (including via initial seeding service) and updated on a regular basis.

Customers using this service benefit from expanded peace of mind arising from multiple layers of protection. 

  • On a practical level, if a file fails to back up due to a cloud-syncing error, a copy of the same file stored on your hard drive can still be backed up to the cloud at the next scheduled run. 
  • Having multiple copies of sensitive files enhances the safety of your data, giving you the ability to retrieve it from more than one location in the event of a cyberattack or outage.

While technology may never be perfect, taking a proactive and multi-layered approach to data security can help you keep all your important business data encrypted, accessible, and ready to be retrieved when needed.

To learn more about our Total Data Protection package and how it can keep your data safe, click the button below. One product, zero compromise – all you need to detect, protect and recover

Aiming for Zero Data Loss – Online Backup

Why Zero Data Loss Recovery Is Becoming Essential

Recent cyber incidents in countries around the world and closer to home are highlighting the devastating impact of data loss with South Africa seen as a soft target.

Well-known local brands targeted by cyberattacks have faced major service outages, financial disruption, and reputational damage after critical systems failed – and the trend shows no signs of letting up. 

These cases show that traditional data backup models can be insufficient in the face of sophisticated cyberattacks, and why organisations are now rethinking their approach to data recovery.

The new protocol sweeping the industry is “zero data loss”. Here’s what it is and how to implement it.

Unpacking Zero Data Loss

The concept of zero data loss goes much further than simply having regular backups. 

  • Zero data loss means being able to restore systems to the exact state they were in before a disruption, with no downtime and no gaps in data
  • Traditional daily or even hourly backups leave businesses exposed, because any transactions or updates between cycles are lost. 
  • In a world where ransomware, outages, and human error are constant risks, this margin of loss is no longer acceptable.

To close all possible gaps, zero data loss requires continuous protection

This can take the form of real-time replication, journaling, or advanced recovery appliances that capture every change as it happens. 

It also demands immutability, so that backups cannot be altered, and auditability, so that businesses can prove their data integrity to regulators and customers alike. We have featured immutable storage as part of our service offering for several years with excellent results. 

The benefits of Zero Data Loss: hard to overestimate 

It’s no secret: the risk of losing crucial data in the current cybersecurity climate has never been greater.

  • In regulated industries like finance or healthcare, even the smallest data gap can have legal consequences. 
  • This is especially problematic in light of the POPIA regulations which provide for multi-million Rand fines and even criminal prosecution in extreme cases. 

In sectors where customer trust is critical, a brief period of missing or corrupted records can lead to long-term damage. 

In the UK, retail giant Marks & Spencer learned this lesson recently when a massive cybersecurity failure left their business processes frozen for days. The reputational damage arising from the attack is estimated at over £40 million and may linger for months following the incident itself.

The reputational cost of data loss often outweighs the immediate financial hit, making resilience a board-level priority.

Creating a Zero Data Loss Environment 

Building systems that achieve zero data loss is not simple. The infrastructure costs can be significant, and real-time replication introduces technical challenges for companies of every size.

Ensuring consistency across multiple interdependent systems is equally complex. For this reason, achieving zero data loss must be seen as a strategic investment rather than just a technical project.

Fortunately, the multiple layers of cybersecurity technology required to minimise data loss no longer have to be built independently and separately. Comprehensive backup and cybersecurity solutions that allow users to erect a steel dome of data security around their files exist today – and we’re proud to offer a range of them. 

Powered by Acronis Cyber Protect Cloud, our platform delivers for SMBs on backup and rapid restore, disaster recovery-as-a-service, compliance and governance and full cybersecurity integrated with backup.

To learn more about our Total Data Protection package and other solutions that cover all aspects of data security across multiple platforms, click the button below.

Stay Ahead with Managed Services – Email Security

Email Security Managed Services: Strengthening Defences Against Modern Threats

Every day, hundreds of billions of emails are sent and received around the world, creating just as many opportunities for privacy breaches and cyberattacks to occur. 

Email remains a fundamental communication tool for individuals and businesses alienating and as such, it simply can’t afford to be insecure. Compromised email accounts can lead to data theft, social engineering scams, or even total account takeover through impersonation attacks.

In South Africa, cyberattacks are rising sharply, mirroring a global trend.

According to Trend Micro’s Email Threat Landscape Report, the majority of online threats in 2025 originated from email-based vectors. Attackers are refining their methods, using AI-generated phishing content, domain spoofing, and business email compromise (BEC) to bypass traditional filters and exploit human error. 

With email remaining the preferred delivery channel for malware and ransomware, the need for comprehensive, managed protection has never been greater.

Introducing Email Security as a Service 

An Email Security Managed Service addresses this challenge by combining advanced detection, automation, and real-time threat intelligence into a single managed solution. 

Rather than relying on static filters or manual monitoring, ESMS platforms continuously learn from emerging attack patterns across millions of data points worldwide. This allows them to identify suspicious links, attachments, and sender behaviour before an employee even opens a message. 

An advance warning system can help prevent malicious mails from being opened, blocking the source of 90% of cyberattacks. 

The best Email security services also help simplify cybersecurity management. 

  • Automated policy enforcement, encryption, and data loss prevention tools work silently in the background, ensuring compliance and reducing the burden on in-house IT teams. 
  • By outsourcing email security to a trusted provider, businesses gain 24/7 monitoring, proactive threat response, and expert support that would otherwise require significant in-house investment. 

For small and medium-sized enterprises in particular, this model offers enterprise-grade protection at a predictable monthly cost.

Secure your email with Soteria 

In an era when email remains both indispensable and vulnerable, managed email security services offer the best combination of convenience, automation, and peace of mind, ensuring your inbox remains a place for communication, not compromise.

Soteria’s Email Security Managed service will help protect your company email by:

  • Stopping ransomware and zero-day malware before they reach your inbox.
  • Protecting your team from clicking on malicious links across any device.
  • Blocking emerging threats with real-time threat intelligence.
  • Preventing account takeover attempts.

Secure your business email with us today. Click the button below to learn more.  

Avoiding Spam Calls with WhatsApp – Cybersecurity Threats

A Renewed Shift to WhatsApp with an Increase in Spam Calls

Mobile voice calling in South Africa has been under pressure in recent years, driven by the rise of data and messaging apps – and now a relentless onslaught of spam calls is threatening to make the phone call obsolete.

Lately, when an unknown number appears, the call goes unanswered. That level of distrust between people threatens to chip away at the very value proposition that voice once held for families, businesses, customer support, and networking.

Here’s what every business owner needs to know about spam voice calls and how to migrate to alternatives like WhatsApp safely.

Spam calls shine a spotlight on sales and telemarketing

There’s no doubt that the sales industry has a role to play in the explosion of ‘robo’ calls in markets around the world, with SA being no exception. 

Telemarketers and call centres have evolved their tactics to exploit human behaviour and system loopholes. They now rely heavily on strategies like these:

  • Mobile number spoofing and misuse: Instead of using obvious 087 or landline numbers (which almost always get rejected), spammers now present calls as mobile numbers to increase pickup rates.
  • SIM rotation / burner tactics: Prepaid SIMs are cycled out as soon as flags are raised, enabling mass dialling operations to persist.
  • Regulatory arbitrage (“policy stretching”): Some, especially brazen companies, push the boundaries of “fair use” policies, or use minimal effort to appear compliant while continuing intrusive practices. 

In the face of rising spam calls, companies and individuals are seeking ways to opt out of nuisance communications which have the potential to be used for social engineering attacks. But navigating your legal options can be tricky.

Blocking Spam: The regulatory puzzle

Ridding your company or personal device of spam communications isn’t as easy as flicking a switch. 

Networks including Vodacom say they can’t analyse the content of calls without breaching interception laws under RICA. As the country’s oldest network put it, distinguishing spam via content inspection would amount to “unlawful interception.” 

Meanwhile, regulators are scrambling to catch up. Upgrades to the Protection of Personal Information Act (POPIA), effective April 2025, now explicitly target direct marketing abuses. Some of the key changes include:

  • Telemarketers must record telephonic consent on first contact—even with automated systems—and make those recordings available to consumers on demand.
  • “Opt-out” no longer qualifies as valid consent. Marketers must obtain explicit opt-in consent before contacting non-customers. 
  • Consent records must be stored, auditable, and accessible.
  • Consumers gain stronger rights to request deletion, correction, or objection of their personal data, with prompt response obligations (within 30 days).
  • A mandatory e-portal was introduced to report data breaches and spam complaints, with the aim of improving transparency and regulatory response.

These changes are intended to tilt the balance in favour of consumers. But critics warn that enforcement is still uneven, and spammers adapt faster than the law can intervene. As a result, South Africans are ignoring calls completely and switching to platforms like Whatsapp.

Switching to WhatsApp safely in the age of spam calls

With Spam calls turning users away from traditional telephonic communications, WhatsApp is emerging as the natural alternative. 

But simply using the app without taking the necessary precautions could be like going from the frying pan to the fire: WhatsApp is also vulnerable to certain types of cyberattacks. 

Recent reports show that even with apps like Truecaller and built-in filters, spam calls slip through at alarming rates. In one test, up to 90% of calls to a South African number were spam. 

To complicate matters further, Truecaller itself is under investigation for alleged POPIA violations, raising big questions about the credibility of third party apps.

With spam overwhelming voice channels and regulation still lagging, many individuals and businesses are moving their primary communications to apps like WhatsApp. But while WhatsApp provides more control over who can reach you, it is not immune to cybercrime. 
Criminals have been known to hijack accounts, distribute phishing links, and impersonate trusted contacts.

Using WhatsApp securely

If you’re making the switch, take steps to harden your security:

  • Enable two-step verification: Add a PIN to protect your account from SIM-swap attacks.
  • Lock your app: Use biometric or device-level passwords so nobody can access chats if your phone is stolen.
  • Stay alert to phishing: Don’t click on suspicious links or open unknown attachments, even from familiar numbers.
  • Verify business accounts: Look for the green tick badge on official business profiles to avoid imposters.
  • Backup carefully: Enable encrypted backups but store them securely to avoid exposing chat histories.
  • Limit group exposure: Review who can add you to groups, reducing your chances of being pulled into spam or scam groups.
  • Educate staff: Train employees on secure use of WhatsApp, including how to spot social engineering attempts.

Now is the time for comprehensive data security

With spam calls and the risk of cybercrime making it difficult, if not impossible, to do something as simple as accept a phone call, it has never been clearer that our digital world is becoming less secure. 

Fortunately, for every innovation cybercriminals develop to steal your data, there is a powerful tool available from Soteria, in partnership with Acronis, to help keep your valuable files safe and encrypted in the cloud.

Businesses that decide to switch their communications exclusively to app-based platforms will need to ensure that data transferred via these channels is properly backed up. 

A turnkey solution like File Sync and Share with Acronis Cyber Protect Cloud could be the ideal choice for any business migrating to fully digital communications in 2025 with backup and recovery, anti-malware, endpoint protection management and file sharing.

Click the button below to learn more.

Partner with Soteria | Cloud storage

Affiliates and Resellers: Grow Your Business with Soteria Cloud

When it comes to growing revenue in the tech industry, there’s no such thing as a one-size-fits-all approach.

Influencers may capture thousands of likes and followers, but cybersecurity resellers bring something different to the table: deep technical expertise and the infrastructure to support clients of every size. Both approaches have value, but neither compares to delivering true peace of mind through cutting-edge online security.

With this in mind, Soteria Cloud, powered by Acronis cyber protection technology, offers two distinct partnership models—tailored to match different business strategies and growth goals.

  • An Affiliate Model, perfect for generating passive, recurring income without operational overhead.
  • A Reseller Model, ideal for businesses ready to take full control, own the client relationship, and build branded solutions.

Whether you want a hands-off revenue stream or a fully customised offering, both models put you on the path to growth.

Share Your Network With an Affiliate Partnership

The Affiliate Model is designed for individuals and businesses with trusted networks who want to earn recurring commissions without managing technical operations.

How It Works:

  • Sign up as an affiliate and receive your unique referral link.
  • Share the link with your clients, audience, or community.
  • Soteria handles everything from onboarding, billing, and customer service to ongoing service delivery.
  • You earn recurring income for the lifetime of the referred customer.

Key Benefits:

  • Zero Overhead: No infrastructure, support teams, or billing systems needed.
  • Effortless Earnings: Get paid monthly, with commissions stacking as your network grows.
  • Trusted Technology: Backed by Acronis, a global leader in cyber protection.

To help affiliate partners spread the news about our data protection packages, we provide comprehensive marketing collateral. You’ll get the  banners, brochures, and content included to help you promote quickly and get great results. 

This type of partnership is ideal for consultants, bloggers, thought leaders, and advisors who want to leverage their reputation and generate a steady income without operational complexity. 

Expand Your Offering With a Reseller Partnership

Our Reseller Model is designed for businesses ready to own the customer experience while leveraging Soteria’s robust infrastructure and Acronis-powered solutions.

How It Works:

  • Purchase wholesale access to Soteria’s platform.
  • Use the Reseller Control Panel to configure, price, and package your services.
  • White-label the solution under your own brand and add additional value for your clients.

As a reseller, you decide the pricing model, whether per workload, GB, or device, and manage the client relationship independently.

Key Benefits:

  • Total Brand Control: Offer solutions under your own name, with Soteria powering the backend.
  • Flexible Billing: Set your own margins and pricing structures.
  • Scalable Service Offering: Add advanced tools like EDR, XDR, DLP, disaster recovery, and email security to create premium packages.
  • Local Expertise, Global Tech: Combine Soteria’s local-based support with world class Acronis technology.

Our reseller programme is aimed at MSPs, ISPs, IT providers, and cybersecurity businesses looking to differentiate their services and maximise profitability while maintaining direct client relationships.

Grow Your Business Your Way With Us

With Soteria Cloud, you don’t have to compromise. Whether you prefer a social income stream or want to build a full-service cyber protection offering under your brand, both models put you in control of your business growth.

If you’re ready to get started, Visit Soteria Cloud Partnerships and choose the path that works for you.

BYOD Risks – Cybersecurity

The Cyber Risks of BYOD

Bringing your own device (BYOD) to work policies may be convenient, but it could be putting your entire company’s cybersecurity at risk.

As hybrid and in-office work become the standard (with fully remote setups becoming less common outside of the tech sector), BYOD policies mean more employees are using their own tablets, laptops, and smartphones in the workplace than ever before.

The convenience and familiarity of personal devices are undeniable, but without proper security protocols, BYOD can expose businesses to significant risks. Unpatched operating systems, weak passwords, and unmonitored devices all create opportunities for cybercriminals. Sensitive customer data, confidential files, and business-critical applications are especially vulnerable.

That’s why Soteria Cloud, powered by Acronis Cyber Protect Cloud, offers a smarter way to safeguard against BYOD risks. Our partnership with Acronis delivers an integrated platform that combines backup, disaster recovery, advanced cybersecurity, endpoint management, and secure cloud storage – all at scale.

For resellers and partners, this means streamlined operations, powerful automation, and margin protection. For businesses, it means market-leading security and peace of mind.

Why BYOD poses unique cybersecurity risks

The dangers of using personal devices in the workplace were highlighted in the recent KnowBe4 Africa Human Risk Management report, which found that up to 70% of devices in offices across Africa are inadequately secured.

This is especially concerning in the wake of the surge in cyberattacks across South Africa. The reality is simple: personal devices can no longer be assumed to be safe.

Here are just some of the ways hackers exploit BYOD to infiltrate company networks:

  • Out-of-date operating systems, including Windows and macOS.
  • Lack of enterprise-grade cybersecurity or secure cloud storage software.
  • Failure to activate multi-factor authentication (MFA).
  • Mixing personal and business email or messaging accounts, which widens the attack surface for phishing and social engineering scams.

If your company allows BYOD, a formal cybersecurity policy for personal devices is no longer optional—it’s essential.

How to Keep Your Company Safe Online in the Age of BYOD

While BYOD offers flexibility and productivity benefits, companies must take proactive measures to stay secure. Here’s a cybersecurity readiness and BYOD checklist every organisation should follow:

1. A formal BYOD policy

Establish clear rules on how personal devices may be used for work, including restrictions on apps, data sharing, and access to sensitive systems.

2. Regular software updates

Ensure all devices are updated with the latest operating system patches, apps, and security tools. Even one unpatched device can expose the whole network.

3. Cybersecurity software audits

Only allow devices with approved endpoint protection and secure cloud storage solutions to connect to company systems. Enterprise-grade tools are far more effective than free consumer apps.

4. Enable multi-factor authentication (MFA)

Require MFA for all company accounts and sensitive data access. It’s one of the simplest and most effective defenses against breaches.

5. Secure communication channels

Keep personal and business accounts separate. Provide employees with company-approved email, messaging, and file-sharing tools.

6. Cybersecurity awareness training

Educate staff on spotting phishing attempts, using strong passwords, and following safe browsing practices. Human error is still the biggest cyber risk.

7. Regular monitoring

Implement monitoring tools to flag unusual activity and carry out periodic device audits. Proactive oversight helps identify risks before they escalate.

Safeguard your onsite devices with Total Data Protection

With employees bringing multiple devices into the office, a comprehensive cybersecurity solution is the only realistic way to keep your business safe.

Soteria Cloud’s Total Data Protection, powered by Acronis Cyber Protect Cloud, gives your organisation the ability to:

  • Protect all endpoints—whether personal or company-issued.
  • Automate backups and disaster recovery for business continuity.
  • Deploy enterprise-grade cybersecurity that neutralises modern threats.
  • Streamline IT operations with advanced monitoring and integrations.

No matter how many users you need to support, we’ll help you power up your cyber defenses and keep your data secure.

👉 Click below to learn more about Total Data Protection.

Her Story – Celebrating the Women at Soteria Cloud

Meet Santie Jooste

Regional Account Manager – Partner Services and Relationship Management, Soteria Cloud

Women are making big strides in SA’s tech industry, changing perceptions in an industry that has been long overdue for gender transformation. As we celebrate women in tech this month, we’d love to introduce our readers to Santie Jooste, our superstar Regional Account Manager. 

Santie combines her strong background in customer service and relationship management with a passion for helping our clients safeguard their data. 

Let’s get to know Santie better and find out what drives her passion for data protection.

A passion for people and protecting their data

As a valued member of our team, Santie works with organisations across the country to match them with cloud backup and recovery solutions that are secure, reliable, and tailored to their needs.

  • With mounting experience in the fast-paced tech industry, Santie has embraced the challenges and opportunities of working in data protection. 
  • What sets her apart is her curiosity and eagerness to learn. These qualities allow her to adapt quickly in a field that is constantly evolving. 

For Santie, protecting data goes beyond business requirements:  it’s her personal mission.

She views her role as not just protecting information, but also safeguarding the livelihoods and trust of the clients she serves.
Her philosophy is simple: stay curious, learn every day, and never shy away from asking questions, no matter how big or small. 

This mindset has enabled her to excellent meaningful client relationships and to deliver cyber protection solutions powered by Acronis that balance technical strength with practical application.

Another dynamic woman transforming cybersecurity in SA

Along with her passion for client relationships, Santie also takes pride in being part of an industry where women are increasingly making their mark in IT and cybersecurity. 

For professions like her, Women’s Month is a reminder that diverse voices strengthen the sector and open up new ways of solving problems at a time when data is the new gold and security solutions are critically important. 

A positive approach to life and work 

Outside of work, Santie brings the same energy and warmth to her personal life. She enjoys perfecting her coffee skills, has a knack for turning “just checking emails” into an hour-long project, and is always ready to laugh, even if it’s at her own expense and her own jokes.

By blending professionalism with approachability, Santie continues to make a difference for our clients and the broader tech community in South Africa. 

Ready to protect your data? Let our team guide you

If you’re searching for a comprehensive backup or data protection solution for your business, we’d love to connect with you. Contact us using the button below and our dedicated team members will guide you at every step of the process. 

Celebrating the Women at Soteria Cloud

Meet Leigh Naudé: Driving Relationships and Resilience 

At Soteria Cloud, we pride ourselves on providing world-class secure cloud storage, advanced backup solutions, and managed data protection services. But behind every great solution is a team of passionate people dedicated to making it work for our customers. 

This women’s month, we’re spotlighting one of the key forces behind our sales and customer relationships, Leigh Naudé, whose energy and drive have made her an indispensable part of our mission.

Two decades of industry excellence 

Leigh’s journey in technology started at just 18, when she joined BCX as an intern. It was there that her career truly took off, guided by the mentorship of industry professionals who recognised her potential early on. 

Among them was Christine Bergmann, a Microsoft Licensing Specialist who helped shape Leigh’s skills and mindset for success. “She took me under her wing and taught me not only the technical knowledge but the confidence to grow in this industry,” Leigh fondly recalls. 

Other influential figures include her mother, Elaine Meyer, an IT trailblazer in her own right, and Seshni Gafoor, Distribution Account Manager for Africa at Acronis, whose passion for empowering women in tech continues to inspire Leigh today.

  • Over 21 years later, Leigh has built an impressive track record in managing strategic accounts and nurturing long-term client partnerships. 
  • Her philosophy is simple yet powerful: people buy from people. 

In a fast-moving, high-stakes field such as women in cybersecurity, Leigh understands that trust is just as vital as technology: “I don’t enjoy working in silos. Collaboration and relationship-building are what get results”. 

It’s an approach that has earned her not just clients, but fans and advocates, many of whom have stayed with us for years.

A professional with cutting edge knowledge to protect your business 

Leigh is deeply aware of the urgency of cybersecurity in today’s business environment. 

  • With threats evolving daily and even AI now enabling Ransomware as a Service on the dark web, she’s firmly against a reactive approach. 
  • Leigh’s favourite cybersecurity analogy is drawn from the daily commute: “It’s like driving without a seatbelt and no insurance. You might be fine for a while, but when disaster strikes, it’s too late to protect yourself,”. 

This belief in proactive protection drives her conversations with customers, where she helps them understand the importance of not just backing up data, but securing it against every possible risk.

A passionate leader who champions  work-life balance 

Outside of work, Leigh brings the same enthusiasm to family life, often singing (a hidden talent from her younger days) to her children and husband. 

Whether she’s closing a deal, sharing a laugh over coffee and chocolate, or strategising with colleagues, Leigh embodies the energy, commitment, and human connection that set Soteria Cloud apart. 

Ready to secure your data? let our team guide you 

If Leigh’s story has inspired you – and we know it has – we’d love you to experience our warmth, motivation, and professionalism first hand. 
Contact our team today or click the button below to view our range of backups solutions. 

Virtual Banking Fraud Surge – Phishing Scams

Online Scams Surge in 2025 as Cybersecurity Becomes Everyone’s Concern

As we pass the midway mark of the year, a new wave of online scams is making it harder for internet users to safeguard their data and finances.

Impersonation scams, especially those pretending to be from SARS, are costing victims thousands of rand as cybercriminals perfect the art of fraudulent communication. 

For individuals, this means greater vigilance, while for businesses and technology resellers, it signals a growing market for solutions that can help protect customers from the latest threats.

Let’s take a look at the most recent scams doing the rounds online, and how you can stay safe.

Virtual banking fraud is surging

According to the National Financial Ombud, South Africa has seen a 73% year-on-year increase in virtual banking fraud. 

  • Criminals are gaining unauthorised access to banking apps, creating virtual cards, and draining accounts before victims even realise what’s happening. 
  • In one case, a consumer lost R500 000 after being tricked into approving fraudulent transactions: a stark reminder that technically authorising a payment, even under false pretences, can leave you without recourse.

Tax season brings fresh opportunities for scammer

Fraudsters are taking full advantage of tax season, sending SMSes, emails, and WhatsApp messages claiming that their victims owe SARS money or are due a refund. 

  • Many of these messages contain links, QR codes, or attachments that lead to phishing sites designed to steal banking or eFiling credentials. 
  • Some use intimidation, threatening so-called penalties or legal action to pressure a quick payment. 
  • Others mimic SARS or a major bank’s branding so closely that even savvy users can be caught off guard.

Cybersecurity is no longer optional

In an environment where scams are growing more convincing, secure cloud storage and advanced cybersecurity tools are becoming essential. 

Platforms with built-in encryption, ransomware protection, and phishing-resistant authentication can stop criminals from accessing sensitive data, even if a scam email slips through the company’s detection system. 

Five practical safeguards to prevent losses due to scams

These tips should form the foundation of any company’s basic cybersecurity awareness strategy, and they work very well for individuals too. 

  • Never click on links or scan QR codes from unsolicited messages
  • Confirm tax or payment requests directly with SARS or your bank
  • Use secure cloud storage with encryption and access controls to safeguard your data
  • Enable multi-factor authentication on all accounts
  • Educate your staff and family members regularly on scam tactics

A growing opportunity for resellers

For cybersecurity and cloud storage resellers, this surge in online fraud is more than just a warning. It’s a growing business opportunity. 

Businesses and individuals are actively seeking tools that protect data, block phishing, and secure remote access, and we’re proud to offer an extensive range of solitons that do just that. 

Through Soteria’s affiliate programme, resellers can offer customers solutions such as encrypted cloud storage, secure file sharing, automated backups, and phishing-resistant authentication, all designed to prevent the kind of breaches making headlines. 

By positioning yourself as a trusted partner in data security, you can meet a growing need, build recurring income, and help clients sleep easier at night. 

Celebrating the Women Reshaping Cybersecurity

Celebrating the Women Who Are Reshaping the Future of Cybersecurity

Cybersecurity has gone from being the realm of back-end teams and technical specialists to a board-level priority. As companies recognise that data protection is integral to business continuity and long-term strategy, especially as the threat landscape evolves, women are playing a prominent role in the sector’s future.

In South Africa National Women’s Day is observed on 9 August to mark the anniversary of the 1956 Women’s March to the Union Buildings in Pretoria, to protest against the apartheid pass laws. Women’s Month serves as a time to acknowledge and honour the contributions of women to society and to acknowledge the ongoing fight for gender equality. 

This Women’s Month, we celebrate the growing presence of South African women in cybersecurity: an area that’s becoming essential to how businesses operate in a digital-first economy.

Women currently represent around 25% of the continents’ cybersecurity workforce, contributing a mere 9% of South Africa’s cybersecurity workforce, although that number is beginning to increase thanks to skills initiatives, mentorship programs, and the rising visibility of female leaders in the field.

At a time when cybercrime is becoming more complex and relentless, a sector that’s diverse, highly skilled, and at the cutting edge has never been more important. Women are leading the charge to make the sector one of the best global examples of its kind.

Diverse Talent Drives Digital Transformation

South African businesses are rapidly adopting AI, automation, and cloud-first solutions to improve agility and scale. But with this transformation come both risks and opportunities.

  • Cybercriminals are now leveraging AI just as quickly as legitimate businesses are, developing faster, more convincing phishing scams and launching AI-powered malware at scale.
  • As these threats grow in complexity, so does the demand for professionals who can understand, predict, and prevent them. That’s why growing the local cybersecurity talent pool with the inclusion of more women is becoming a strategic priority.

Forward-thinking companies are already rising to the challenge. As early as 2023 SAP Africa was already pushing to achieve gender parity across its workforce, while organisations like SEACOM are investing in certification and leadership pathways specifically for women in tech.

These great initiatives are helping to ensure gender equity and nurture the skills South Africa needs to secure its digital infrastructure in the long term.

The Acronis Advantage: Supporting Progress Through Partnership

In a 2024 global survey, 71% of women in IT reported working longer hours in a clear sign of the dedication many bring to the profession. Respondents cited career advancement as their primary motivator and with the right support, training, mentorship, and visibility, that dedication is being rewarded with opportunity.

As an Acronis partner, we’re proud to stand behind a platform that not only offers cutting-edge cybersecurity solutions but also actively supports women in tech. By aligning with initiatives that raise the profile of female professionals in cybersecurity, we help build inclusive, sustainable ecosystems for our clients.

Bridge the Gap with Smarter Cybersecurity

Most businesses can’t afford to spend years building internal cybersecurity teams. At the same time, the cost of inaction is rising fast.

That’s why partnering with a secure cloud storage provider backed by Acronis technology is the best strategy. Your business and clients will enjoy the benefits of enterprise-grade cybersecurity, paired with the flexibility and scalability you need – all without the overhead of managing complex software yourself.

Our integrated security offering includes:

  • Access to the latest threat detection and prevention tools
  • Around-the-clock monitoring and rapid response
  • Flexibility to scale as your business grows
  • Cost-effective access to premium cybersecurity through Acronis
  • Peace of mind knowing your data is protected by expert

Celebrate Progress. Secure the Future

This Women’s Month, we recognise our expert team of women here at Soteria alongside the South African women who are all shaping the future of cybersecurity: one secure system at a time. Their expertise, perspective, and resilience are key to building digital systems that are not only more secure, but more inclusive.

If your business is ready to take the next step in cybersecurity and data protection, browse our full range of solutions and discover how easy it is to protect your crucial files and customer data.