News

Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for “IT support and how it benefits your business”
26/04/18

IT support and how it benefits your business

With an excess of technical issues that a small to mid-size business experiences every day, an IT support dream team is a necessity. Making use of an in-house IT team is seemingly beneficial but more often than not there is a lack of technical skills and capability to be able to manage and maintain the variety of IT problems that...
Read More
Featured image for “Google’s Cloud IoT Core is now available”
09/04/18

Google’s Cloud IoT Core is now available

Cloud IoT Core, Google’s fully managed service for connecting, managing and ingesting data from IoT devices, is now out of beta and generally available. Google envisions the service, which launched in public beta last September, as the first entry point for IoT data into its cloud. Once the data has been ingested, users can use Cloud IoT Core to push data to Google’s cloud databases,...
Read More
Featured image for “Firewall Management Practices: Top Practices”
02/04/18

Firewall Management Practices: Top Practices

Firewalls that protect enterprise networks play a crucial role on the front line of defence. The people who administer these firewalls have a lot of responsibility in seeing that only the right kind of traffic gets through when it should, and all the bad stuff gets blocked. The Top Practices of Firewalls  Keep the enterprise security policy manager or compliance...
Read More
Featured image for “Firewalls and the era of sophisticated attacks”
26/03/18

Firewalls and the era of sophisticated attacks

It’s important to understand the role firewall network security plays in information security controls.  Enterprise security pros should think of a firewall as one layer in a set of defences that comprise a defence-in-depth strategy, rather than as a standalone defence that protects against a specific set of attacks.  The reality is many potential attacks are dissatisfied because of the interaction of...
Read More
Featured image for “Security measures to protect your servers”
19/03/18

Security measures to protect your servers

Most businesses find data security just as important as physical security. Would you leave critical business information, intellectual property and client data that you store on your servers, sitting on your desk with the door unlocked? No, you would not, and that’s why you shouldn’t leave it stored on your servers without putting adequate measures in place. Most people know...
Read More
Featured image for “South Africa is a hot spot for cyber attacks”
12/03/18

South Africa is a hot spot for cyber attacks

A 2018 report revealed that cyber incidents remain a top threat, with 38% being from South African businesses. A cyber attack is a deliberate act through cyberspace to manipulate or destroy computers, networks or the information in them. Cyber attacks may include the following consequences: Identity theft, fraud, extortion Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses Stolen hardware,...
Read More
02/03/18

What You Need To Know About Managed Servers

What are servers? A server is a computer designed to process requests and deliver data to another computer over the internet or a local network.  Simply put, a server is a computer (or a computer program) that is the main component of a network. It manages access to the resources, files, programs and services used by all the other computers...
Read More
26/02/18

Intel Computers security flaw places all phones and computers at risk

Earlier in 2018, security researchers disclosed a set of safety flaws that could potentially give hackers the opportunity to steal sensitive information from many modern computing devices. The devices that are most at risk are those that contain chips such as those from computing company, Intel, among others. Intel issued a statement insisting that this is not a design flaw,...
Read More
31/01/18

Is your personal information safe?

Over 30 million people’s personal records have been stolen. The ‘masterdeeds’ data breach is South Africa’s biggest ever. Troy Hunt, the web security expert who dealt with this breach, said that it listed “almost every living person” in South Africa. This happened due to incompetence by the owner of the server. Regulatory penalties should apply to loss of data, however...
Read More
31/01/18

The PoPI Act and what it means for you

The era we live in is continuously referred to as the “information age.” This is because of how easy it has become to access information. At the push of a button, information that would have required multiple visits to the library can be made available in seconds. The weather forecast, navigation routes, grocery store sales and even good holiday destinations...
Read More
31/01/18

IoT Technology breaks ground to save the Rhino

The mission to save the Rhinos is one all South Africans should get behind. These majestic beasts and symbols of African power and strength are facing extinction because of the very misguided notion that their horns can make Chinese traditional medicine more effective. Because of this myth, the Rhinos are dying in droves. They are being massacred by poachers that...
Read More
15/01/18

Social media life after death

In the 21st century, social media is a big part of people’s lives. From sharing photos to job applications to establishing relationships and communicating personal and professional information. Platforms like Twitter, Facebook and WhatsApp are big aspects of modern culture. However, how many people have considered what happens to their social media accounts when they die? The thought can be...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.