News

Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for “Firewalls and the era of sophisticated attacks”
26/03/18

Firewalls and the era of sophisticated attacks

It’s important to understand the role firewall network security plays in information security controls.  Enterprise security pros should think of a firewall as one layer in a set of defences that comprise a defence-in-depth strategy, rather than as a standalone defence that protects against a specific set of attacks.  The reality is many potential attacks are dissatisfied because of the interaction of...
Read More
Featured image for “Security measures to protect your servers”
19/03/18

Security measures to protect your servers

Most businesses find data security just as important as physical security. Would you leave critical business information, intellectual property and client data that you store on your servers, sitting on your desk with the door unlocked? No, you would not, and that’s why you shouldn’t leave it stored on your servers without putting adequate measures in place. Most people know...
Read More
Featured image for “South Africa is a hot spot for cyber attacks”
12/03/18

South Africa is a hot spot for cyber attacks

A 2018 report revealed that cyber incidents remain a top threat, with 38% being from South African businesses. A cyber attack is a deliberate act through cyberspace to manipulate or destroy computers, networks or the information in them. Cyber attacks may include the following consequences: Identity theft, fraud, extortion Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses Stolen hardware,...
Read More
02/03/18

What You Need To Know About Managed Servers

What are servers? A server is a computer designed to process requests and deliver data to another computer over the internet or a local network.  Simply put, a server is a computer (or a computer program) that is the main component of a network. It manages access to the resources, files, programs and services used by all the other computers...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.