The Buzz On IT
Making Ongoing Risk Management An Operational Standard
No business today is 100 percent secure from cyberthreats and more businesses are waking up to this reality now than ever before. It’s no wonder cybersecurity investment in 2020 is pegged to grow by 5.6 percent to reach nearly $43.1 billion in value.1 With...
Employee security tips
The weakest link in your security chain is always your people. When it comes to protecting your business against potentially detrimental cyber attacks is educating your employees to be more aware and to take precautionary steps to ensure their safety, and the safety...
2021 Cybersecurity Predictions
0It's that time of year again when the predictions are flying in every industry about the relevant trends, but when it comes to cybersecurity, of all the other trends, whether marketing, technology or other, it is by far the most important, because a single hack can...
Protect yourself online when shopping this Christmas
Christmas, the time when everyone is scrambling to buy gifts and food for Christmas get-togethers, outfits for family do's, gear for their fishing or camping trip up the west coast, and the time when online shopping is at an all-time high. With increased online...
What methods do hackers use to get into your online profiles?
Your passwords are like the key to your castle, and often, users use the same key for every room (check out our article on password vulnerability), making it super easy for hackers to get into multiple of their accounts and reap havoc but, what methods do hackers use...
Azure vs AWS vs Google Cloud
There is an intense race between the world's three top cloud computing platforms, Microsoft Azure, Amazon Web Services and Google Cloud. Each of these platforms come with their own strengths and weaknesses, and each one has a dominant strength that it holds the market...
What is ransomware?
The estimated damage inflicted to individuals and companies worldwide because of ransomware is sitting at an estimated $20 billion for 2020, up $8.5 billion from 2019's stats. With this kind of damage being done, its important to know your risks and to know the threat...
Managing your IT documentation has never been simpler
In an increasingly complex computing environment, having an in-depth knowledge of what is happening in your business network is becoming an absolute necessity for many companies, both small enterprises and large, because even smaller businesses have more technology...
Isn’t my email already protected? – Why you need email protection
Security is the buzz word at the moment and businesses are aware that email security is a necessity with all the recent breaches that have taken place in South Africa. The need for TLS (transport layer security) does a lot in the security of your emails, including...
Geographically Dispersed Teams Can Still be Protected
The dynamic of the workplace is changing drastically post COVID with Gartner saying that as much as 41% of employees will continue working from home post-COVID. With this changing dynamic, businesses are being forced to adapt their networks and technologies to suit...
It’s 2020 and passwords are still the biggest vulnerability
I have some terrible news for you, in 2020 the world’s favourite password is still “123456”. According to a study by a Turkish researcher Ata Hakçıl, who analysed more than 742 million passwords found in data breaches freely available on the darkweb. The password...