News

Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for “Security Best Practices While Working From Home”
03/04/20

Security Best Practices While Working From Home

While COVID-19 continues to aggressively spread across the globe, many employees worldwide are facing the realities of working remotely for the first time. Simultaneously, there is increasing evidence to show that malicious actors are using concerns of the virus to prey on those same individuals. Given this, it is more important than ever before that employees understand their role in protecting their...
Read More
Featured image for “5 Common Phishing Techniques”
02/04/20

5 Common Phishing Techniques

Most email security filters are highly effective at ensuring that spam messages never make it to the inbox. However, they’re far less effective at blocking phishing, which has proven to be a more difficult issue to solve. Today’s phishing techniques are highly sophisticated, they’re bypassing email security filters, and they’re targeting your clients and employees. A well-crafted phishing email is...
Read More
Featured image for “Zoom security bug lets attackers steal Windows passwords”
02/04/20

Zoom security bug lets attackers steal Windows passwords

Zoom, the video conferencing software that’s skyrocketed in popularity as much of the globe sits at home due to the coronavirus outbreak, is quickly turning into a privacy and security nightmare. BleepingComputer reports about a newly found vulnerability in Zoom that allows an attacker to steal Windows login credentials from other users. The problem lies with the way Zoom’s chat...
Read More
Featured image for “South Africa’s new data privacy laws – Update”
01/04/20

South Africa’s new data privacy laws – Update

Update: The South Africa’s Protection of Personal Information Act (POPIA) was meant to come into effect from 1 April 2020. This date has been pushed back due to the impact of the COVID-19 coronavirus pandemic, and no new date has been set as yet.   The Act concerns the processing of personal information by companies and other agents, introducing a...
Read More
Featured image for “Massive increase in South African network attacks”
27/03/20

Massive increase in South African network attacks

The sudden increase in the number of people working remotely has some security knock on effects. Kaspersky statistics show that a major spike in network attacks took place in South Africa last week. According to these statistics, affected devices increased from 20,000-30,000 to about 310,000 in the period spanning from 15 – 21 March. “The region is seeing an increase...
Read More
Featured image for “Every Possible Reason to Migrate to Windows Server 2019, in a Nut-Shell”
28/01/20

Every Possible Reason to Migrate to Windows Server 2019, in a Nut-Shell

It is not often that the IT infrastructure is even touched, due to the disruption caused by such projects. This sometimes leaves hardware deployed for decades. With Windows Server 2016 being relatively young, one would question the need to change to Server 2019 – we might have the answers needed to brave the migration. Slower migration habits on the server...
Read More
Featured image for “Windows 7 Has Reached its EOL – But it Hasn’t Been Laid to Rest… Yet”
17/01/20

Windows 7 Has Reached its EOL – But it Hasn’t Been Laid to Rest… Yet

Windows 7 reached such popularity that it took Windows 10 FOUR years to pass it in market shares. We are well aware that even today, Windows 7 is still being used by millions of users, making up roughly 26% of the chosen operating system on PCs. Microsoft attempted changing this, even offering free upgrades to Windows 10, but this didn’t...
Read More
Featured image for “Here’s Why You Need a Scary Good Archiving System in Place”
02/01/20

Here’s Why You Need a Scary Good Archiving System in Place

Maintaining compliance in your archiving strategy can be daunting. Plagued by constant data growth and the pertaining service requirements, IT departments and legal compliance teams are juggling the ability to retain, access, discover and supervise compliant content in a world of fast evolving regulations. Where would you even begin to troubleshoot? Consider the following nightmare as a prime example: Can...
Read More
Featured image for ““123456” Once Again Claims Top Spot For Worst Password of The Year”
24/12/19

“123456” Once Again Claims Top Spot For Worst Password of The Year

Other poor choices include “password,” “princess,” “qwerty,” “iloveyou” and “welcome,” according to the 2019 list from SplashData. Admit it, you’ve used one of those known to be simple, hackable passwords at some stage of your life. It’s an understandable temptation, being quick and easy to remember. This would explain why so many people use bad passwords, while knowing better. Notably,...
Read More
Featured image for “Cyber Security – How Safe is Your Business?”
16/12/19

Cyber Security – How Safe is Your Business?

We all know that cyber-crime is an ever increasing worldwide threat, one with a series of notable incidents occurring throughout 2019, which prove how easily a data breach can affect any organization or establishment. One of the most memorable hacks that occurred this year must be when Quest Diagnostics, a clinical laboratory announced, “that an unauthorized user had accessed data...
Read More
Featured image for “Essential Settings for EOP and Office 365 ATP security”
02/12/19

Essential Settings for EOP and Office 365 ATP security

Techtron has been migrating to and managing Office 365 enviroments for some time now.  One of the most common scenarios we find is companies have left many of the security features set to default, which according to Microsoft and other leading experts is not recomended.  These settings are often neglected because everything seems to “just work” out of the box. ...
Read More
Featured image for “Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared”
14/11/19

Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared

In our final blog in this series on how passwords help you protect your most important business data, We look at how rock-solid password management can also protect you from legal trouble. These days, most businesses are subject to data protection laws or regulations of one kind or another. Some come with pretty stiff penalties. To help demonstrate you’re compliantwith...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.