Working to Identify and Protect SA’s Heritage Resources

Vox partnered with the South African Heritage Resources Agency (SAHRA) to deliver an integrated programme of connectivity, voice and network security, demonstrating how SAHRA connectivity and SD‑WAN for heritage sites can safeguard archives, improve communication and reduce costs. SAHRA requires a modern, secure and resilient IT environment to protect national heritage records and support remote working.

SAHRA connectivity and SD WAN for heritage sites

Planning SAHRA’s Connectivity and SD-WAN for SA’s Heritage Sites

The South African Heritage Resources Agency (SAHRA) is an agency of the Department of Sport, Arts and Culture – formerly known until 2000 as the National Monuments Council – which is tasked with an overall legislative mandate to identify, assess, manage, protect and promote heritage resources in South Africa, and to protect them for future generations.

National heritage sites need to be protected and safeguarded from damage or alteration, and it’s important to prevent development that could endanger their existence. As a national agency with additional provincial authorities, SAHRA works with local communities to identify heritage resources and record their oral and living histories, as well as increase public involvement in the preservation of heritage resources.

“South Africa has a very rich heritage,” says Stephen Muller, SAHRA ICT Manager, “and SAHRA works across a number of business units – including Heritage Properties, Burial Grounds and Graves, the Built Environment and Heritage Protection – to identify and protect heritage resources in South Africa.

3 1080 3 1080x720 1 | Vox | Working to Identify and Protect SA's Heritage Resources

 

“We have a very valuable registry in the form of our internal archives, encompassing a vast amount of heritage documents including old papers, plans, maps, information about graves…. information from the past that it’s important to protect and preserve.

“Overall, our outlook for the future is to become significantly more digitalised, including with our registry and archives, and also as an organisation overall. The work done by SAHRA is valuable and it’s important that it’s assisted in the digital realm, to protect South Africa’s Heritage Sites in the physical realm.”

South Africa has eight World Heritage Sites, as follows: Robben Island (Western Cape), iSimangaliso Wetland Park (formerly known as the Greater St Lucia Wetland Park in Kwa-Zulu/Natal); the Cradle of Humankind (Gauteng), Maloti Drakensberg Park (Kwa-Zulu/Natal), Mapungubwe Heritage Site (in Limpopo province, located at the border of South Africa, Zimbabwe and Botswana), the Cape Floral Kingdom (Western Cape), the Richtersveld Cultural and Botanical Landscape (in the Northern Cape, along the Orange River border with Namibia) and the Vredefort Dome (Free State).

In addition, there are also several heritage sites declared by SAHRA, which include the Castle of Good Hope, the Bushmanskloof Rock Painting Landscape, the Daljosafat Cultural Landscape, the SS Mendi Memorial, the South African Astronomical Observatory, Liliesleaf Farm and the West Coast Fossil Park, among others.

4 1080 5 1080x720 1 | Vox | Working to Identify and Protect SA's Heritage Resources
SS Mendi Memorial

 

The Business Challenge

“It’s our intention to have a proper electronic document records management system in place so that we can get all our information, including our records and administrative systems, more digital,” explains Muller.

“We are moving forward in this regard; for example we have a YouTube channel and we use it to broadcast on pertinent issues, including a webinar in September – which is Heritage Month in South Africa – which is geared towards allowing the public to share in the conversation. I like to say that even though we’re a heritage organisation, it doesn’t mean that our technology or infrastructure needs to be heritage as well!”

In the quest to keep SAHRA’s digital processes and communications systems modern and not ‘vintage’, the organisation has carried out a significant number of implementations or upgrades in the past 10 years or so. These include such important technology elements as:

  • Business Fibre connectivity;
  • Voice and Telephony solutions;
  • Backup of data;
  • Foundational network security; and
  • The implementation of an SD-WAN solution.

 

Some of these implementations have been carried out at SAHRA’s head office in the Western Cape, and others have been at regional offices. SAHRA operates across four sites around the country. Muller clarifies that there have been some challenges previously with getting all the sites connected with fast connectivity, including the use of a slow ADSL line at one of the regional offices.

“Our concerns were around data security and service continuity, as well as site integrations that were required to interlink all our colleagues and allow them to interact and integrate with our existing systems and offices. Vox was able to address these requirements through well detailed bids,” he explains.

 

The Business Solution

As a government entity, SAHRA is required to follow strict bidding / tender procedures each time a new project or upgrade over a particular Rand value is required. Muller explains: “Being a government entity, we have to follow a formal public procurement process and that’s always done by a means of competitive bidding. SAHRA’s relationship with Vox began when we had to shift our existing voice solution, and then we also added in the Internet connectivity as well. Later on, we found the need to include managed firewall services and most recently we have had a requirement for an SD-WAN solution.

“On each of these occasions, Vox has submitted separate tender documentation in response to the advertised tenders. In summary, Vox has helped SAHRA to improve on our operational efficiency, including the enhancement of our remote working capabilities. Additionally, Vox has helped us to strengthen our cybersecurity posture, while also reducing infrastructure costs over time.”

Vox was the successful winner of a number of tender processes for SAHRA in recent years, as follows:

2018/2019: Hosted Digital Communication System

  • Fibre connectivity
  • Verto Hosted PBX and Yealink handsets
  • Uncapped Voice
  • Communications Manager (TMS)
  • Network Cabling
  • Chrome Air (Voice over LTE)
  • Number porting

 

2020: Poly Studio VC Solution

 

2021: Veeam Backup & Replication Enterprise Plus

 

2022: Connectivity and Voice and Network security

  • Primary and failover connectivity at five sites
    • Consists of fibre, wireless and LTE
  • Moved from Verto Supreme to 3CX Cloud for PBX, Unified Communication and mobility services
  • Uncapped Voice
  • Fortigate Firewall at five sites

 

2024: Connectivity and Voice and Network security / SD-WAN

  • Provision of two stand-alone internet links at four sites
    • Consists of fibre, wireless and LTE
  • Moved from Verto Supreme to 3CX Cloud for PBX, Unified Communication and mobility services
  • Uncapped Voice
  • Fortigate Firewall at five sites with SD-WAN for WAN resiliency

 

René Minnie, Key Account Manager at Vox, clarifies that the most recent 2024 upgrades are of particular interest and significance for SAHRA, involving upgrades to the entity’s connectivity, voice and network security. She says: “When we look at the migration from Verto Supreme to 3CX Cloud, we see that Vox is providing SAHRA with a solution that is future-proof and rich in functionality, and which allows more control. With regards to the implementation of an SD-WAN solution, it is important to note that Vox has provisioned for the ability to use both links at each site.

“As for the benefits of SD-WAN, it’s a modern networking solution that simplifies the management and operation of a wide area network (WAN) by decoupling the network hardware from its control mechanism, with key benefits including improved network performance, cost efficiency, enhanced security, simplified management, and scalability and flexibility.”

More details on the benefits of SD-WAN are as follows:

  • Improved Performance: SD-WAN intelligently routes traffic across the most efficient paths, reducing latency and improving application performance, especially for cloud-based services.
  • Cost Efficiency: SD-WAN allows businesses to use lower-cost internet connections (like broadband) alongside or instead of expensive MPLS links, significantly reducing WAN costs.
  • Enhanced Security: Built-in encryption, firewall capabilities and centralised security policies help protect data across all network endpoints.
  • Simplified Management: Centralised control makes it easier to configure, monitor and manage the network, reducing the need for manual intervention and on-site IT support.
  • Scalability and Flexibility: SD-WAN supports rapid deployment across multiple locations and adapts easily to changing business needs, making it ideal for growing organisations.

 

 

A Strategic Partner Towards the SAHRA IT Unit

Muller says he has been very happy with both the service and the products received from Vox overall, and enjoys an extremely positive relationship with Vox. He clarifies: “The service levels have always been consistently high, and in fact have always exceeded what we at SAHRA have requested. We also very much appreciate the scalability of the available offerings.

“You could say that Vox has essentially become a strategic partner towards the SAHRA IT unit, and as a company, its employees and divisions are very good at communicating the available offerings, both for a present requirement as well as for future possibilities and planning – I find Vox to be well-structured and transparent.”

Muller also praises the quality of Vox’s tender documents, which, he says, are unfailingly of a high quality and provide all the information – and sometimes more – than actually required.

“Usually, we look to see that the potential service providers are able to meet or even exceed our minimum requirements,” he explains. “Then we look at proven reliability and uptime, scalability, security and compliance. Cost-effectiveness plays a vital role as well, and we also look at strong support and after-sales service.

“Vox scores consistently highly across all these categories, including with excellent service and competitive pricing across all its products. The type of bid received from Vox overall is always excellent. No matter big or small, there’s always enough information. If it’s a specific brand or model mentioned, there will be a specification sheet that paints a clear picture.”

Minnie adds that the interactions with Muller and the rest of his team at SAHRA have always been most pleasant: “As a company, people across a number of divisions at Vox appreciate SAHRA’s business relationship, which is based on mutual politeness and respect. Our two companies work extremely well together, and we look forward to continuing to be of assistance to SAHRA for many years into the future,” she says.

“I believe that in Vox, SAHRA has found an excellent partner and over the years, we have met regularly and enjoyed smooth operations overall. And so if I could sum it up, Vox’s offerings are a clear commitment to a partnership with long-term value overall, because of the scalability and expansions that are offered by Vox,” concludes Muller.

FAQs

What is SD‑WAN and why is it important for heritage institutions?
SD‑WAN is a modern WAN architecture that intelligently routes traffic across multiple links. It improves performance, resilience and security, which is critical for institutions needing reliable access to cloud archives and remote collaboration.

Which Vox products were implemented at SAHRA?
Vox implemented Business Fibre, voice platforms (Verto Hosted PBX historically and migration to 3CX Cloud), Yealink handsets, Fortigate firewalls, Veeam backup and Poly Studio VC, plus wireless/LTE failover.

How does SD‑WAN improve security?
SD‑WAN supports centralised security policies, encryption of WAN links and integration with managed firewalls, reducing exposure for distributed sites and sensitive data.

Can SD‑WAN reduce costs for government agencies?
Yes. By enabling the use of lower‑cost broadband and LTE alongside fibre, SD‑WAN can lower WAN expenses while maintaining performance and resilience.

How did Vox ensure compliance with SAHRA’s procurement rules?
All implementations were awarded through formal competitive tenders, with Vox submitting detailed, compliant bid documents for each procurement phase.

Will SD‑WAN help with disaster recovery and backups?
SD‑WAN improves connectivity resilience which supports replication and backup workflows. Combined with solutions like Veeam, it strengthens overall data protection and recovery capabilities.

Is 3CX Cloud suitable for public sector organisations?
3CX Cloud provides unified communications, mobility and scalability, making it suitable for public sector needs when paired with secure network infrastructure and managed services.

How can heritage organisations begin modernising their IT?
Start with a connectivity assessment, define continuity and security requirements, and procure resilient links, firewall protection and a future‑proof voice platform. Consider a phased tendered approach similar to SAHRA’s.

The Real Cost of a Data Breach for Individuals

Another day, another data breach.

It seems like every other week that some big company announces they’ve been hacked (seriously, hospitals – heard of a firewall?). Entire databases of private, confidential information are sent into the digital wild more frequently than Trump changes his mind. And, the sad part is, the individuals who’ve been compromised often suffer as much as the entities who let it happen.

A good PR campaign and said company can get back on their feet. Know who can’t? The affected parties who now must recover financially, emotionally, and socially.

 

Financial Impact: Immediate and Hidden Costs

credit card 1591492 1280 | Vox | The Real Cost of a Data Breach for Individuals

When people think about breaches, the first implication they consider is financial – rightfully so, as the immediate effect is usually on your pocket.

Fraud, loans and damaged credit:

Criminals don’t even need actual money to run wild – just your card details are enough of a launching pad. How so? Here are some ways:

  • They may start fraudulently purchasing gift items, electronics, or crypto before you’re even aware of it.
  • Many criminals take out excessive loans linked to another account using stolen identities. The victim only finds out once collection is due.
  • On a smaller scale, quick cash-outs via e-wallet, ride sharing, and even food delivery accounts are also small ways victims have been hit.

 

Think it’s not relevant? Let’s look at the history:

An Equifax breach exposed the personal information of 147 MILLION people in 2017. Most of these victims later reported fake loan approvals and fraudulent credit card applications within a matter of days. And, even if the matter is eventually resolved, you can’t put a price on the stress, hours lost waiting on hold, or any residual damage to your credit score.

Identity theft — a long‑term risk:

cybersecurity 6949298 1280 | Vox | The Real Cost of a Data Breach for Individuals

Unlike a wallet, you can’t just “get a new” digital identity. Once your data is compromised, criminals can use it for decades. Think credit fraud, tax fraud, or even medical identity theft for prescription drugs.

The knock-on effect of these breaches is immense. They can impact on your ability to rent, apply for loans, and in some cases even find jobs.

The human cost — stress, relationships and reputation:

Everyone talks about Data breaches numerically, but what the victims go through is often overlooked. Many victims have to live with the daunting reality of:

  • Mounting anxiety as they log in and out of their banking app. Repeatedly.
  • The uncertainty of not knowing whether your info has been stolen.
  • The pain of repeatedly explaining your situation to strangers.

 

Think sleepless nights, relationship stress, and a never-ending daunting feeling. Cybercrime steals more than data – it takes away peace of mind.

Privacy harms that money can’t fix:

Many breaches expose extremely sensitive information. Think dating apps, health records, or your browser history (shudder).

And, unlike credit cards, your bank can’t (eventually) undo this one.

  • Ever heard of Ashley Madison? They were Tinder before Tinder. Until, one day, users were blackmailed with threats to expose their private activity. You can imagine how this went down.
  • Or spare a second to think about health-related breaches – and how stigmatised patients can feel when their conditions become public.

 

Some impacts transcend monetary value – they can damage reputations, careers, respect and relationships.

The problem with a breach is often the delayed effect. Cybercrime has a long tail, and slow burning effect. Once your Data is sold on the dark web, it stays there. In fact, it can even be resold, and repeat issues emerge for multiple years.

internet 4894814 1280 | Vox | The Real Cost of a Data Breach for Individuals

 

What to do right now if your data’s been breached

But enough fearmongering, what can we do if we find ourselves compromised? Here’s an easy guide:

  1. Change your passwords. Immediately. ALL of them.
  2. Enable your multifactor authentication (MFA).
  3. Verify whether your email has also been leaked (use sites like “have I been pwnd” – you can even do it now).
  4. Monitor your bank accounts (and notify your bank).
  5. Temporarily freeze your credit file.
  6. Double-check any calls, emails, or texts asking for information.

You can’t simply measure the true cost of a Data breach via a spreadsheet. The price you pay is intangible, and how do you quantify a lifetime of looking over your shoulder?

 

Act now – protect your data

Companies can move on – but victims carry the burden even once the headlines fade. This is why taking your cybersecurity seriously is no longer optional. It’s necessary. Because, in today’s digital world, your bank account isn’t your most valuable asset – your data is.

You can’t undo every breach, but you can limit the damage. Change passwords, enable MFA, keep an eye on your accounts and use reputable security tools. Treat data protection as essential because your information is often more valuable than the cash in your account.

Get immediate protection with Norton from Vox.

 

FAQs

What immediate steps should I take after a breach?
Change passwords, enable MFA, check Have I Been Pwned, notify your bank, and consider freezing your credit.

How long can identity theft affect me?
It can last years. Stolen data can be resold and reused, so ongoing monitoring is essential.

Will my bank always refund fraud losses?
Not always. Many banks will help, but you still face time spent on disputes and potential credit impacts. Report fraud immediately.

Can consumer security software really help?
Yes. Reputable suites (like Norton 360 offered through Vox) reduce your risk of phishing, smishing and device compromise and include privacy tools and 24/7 support.

Protect Your Older Parents Online with Norton from Vox

No, Mom – DON’T click on that link! 

I know an elderly lady who is dignified and respectable, with grown-up children and grandchildren. She is, as they say, a ‘pillar of her community’. She also, rather startlingly, has some, shall we say, unfortunate images on her phone at the moment, involving various anatomical closeups of naked people.

But this is not an article about a seemingly-sweet old lady who is at the helm of a mafia-style criminal empire – no, that’s not it at all, because she actually has NO IDEA that these images are currently on her phone (and her family members haven’t yet had the courage to tell her).

Vox has teamed up with global cybersecurity expert company Norton™ to offer comprehensive protection for your devices and online privacy, for the whole family, all in one solution. Traditionally, people have worried about their own online safety as well as their children’s, but there is no reason why your older parents can’t benefit also.

In this article, we look at how so many older people today have absolutely no idea of the perils that lurk online. We discuss how to protect people of an older generation who didn’t grow up with technology at their fingertips.

And we look at how acquiring the right software can take away the stress of having to keep saying: “NO, Mom – DON’T click on that link!”

Elderly Exploitation | Vox | Protect Your Older Parents Online with Norton from Vox

 

Why Older People Are Especially Vulnerable Online

Criminals have always seen older people as being a soft target, and today’s digital world simply presents long-existing criminal tendencies in a brand-new wrapping. When the goal is to scam older people out of their hard-earned savings, the Internet, online banking and social media all just make it easier for cyber criminals, because many older people are just not that comfortable with today’s technology.

This is largely because, in contrast to younger generations, older citizens had to learn to use information technology when they were already adults. It’s something that was initially entirely new to them.

And so the relationship that today’s senior citizens have with technology can be an uneasy or uncomfortable one, as shown in this clip from the popular and acclaimed Netflix sitcom, ‘Grace and Frankie’.

In the video clip, we see clearly just how some of the older generation think about technology – Frankie is deeply afraid of it at first. (Grace, as a retired former CEO, does at least know how to boot up a new laptop.)

Take a look for a bit of show, not tell!

fc69f28d b309 4d37 9f05 288f37f7e25a screenshot | Vox | Protect Your Older Parents Online with Norton from Vox

The video clip raises another point: if so many of today’s older generation are uncomfortable simply with acquiring new technology, you can imagine that they’re even more vulnerable once they’re finally online.

Senior citizens can be particularly vulnerable to cybercriminals who use social engineering – deception intended to manipulate people into sharing confidential or personal information – to lure their victims into handing over valuable personal details.

 

Why The Older Generation Is Vulnerable Online

Online criminals prey on qualities shared by many older users, including a fear of technology that they don’t fully understand, loneliness as their children grow up and leave home, an ingrained respect for authority and institutions, and an increasing need to feel financially secure as they get older.

If this is all sounding just a bit too familiar and close to the bone, the good news is that there are ways in which you can help protect your older parent or relative against would-be online scammers.

 

Keep It Simple — Three Rules to Teach Your Parent

Firstly, share the following information with your older parent to try to help them recognise when a criminal is trying to steal their bank account information, passwords or credit card numbers, or otherwise trying to separate them from their money.

  • Trust no one: never click links or open attachments from unexpected senders.
  • Ask first: establish a rule — “Call or text me before you act.”
  • Don’t share security details: never send PINs, passwords or banking details by message or phone.

 

These short, repeatable rules are easier to remember than long lectures. Think of them as being the digital equivalent of “Don’t open the door to strangers.”

In summary: ‘Don’t click on every link that looks like fun or promises you a great bargain.’ It’s the Internet version of ‘If it looks too good to be true, it probably is.’

Things that Make It Difficult for Older Adults to Use Technology 1 | Vox | Protect Your Older Parents Online with Norton from Vox

 

How Norton from Vox helps — Straightforward, Family-Wide Protection

You can try to teach all the rules in the world, but intuitive software makes prevention easier. Stop the malware from getting in by blocking those seductive ‘Click here’ messages before they even reach your parent’s phone, tablet or laptop with their exotic and interesting click-bait messaging.

Norton’s software safeguards your entire family’s PCs, Macs®, tablets and smartphones from viruses, ransomware, phishing and other cyber threats while you bank, shop and browse online.

Norton 360 family protection provides multiple layers of defence against viruses, malware, ransomware and phishing, which are the common tools criminals use to target seniors. Key benefits for elderly parents:

  • Blocks malicious links and phishing attempts before they land.
  • Protects PCs, Macs, Android and iOS devices with one app.
  • Simplifies security for non‑tech users — automatic updates and background protection.
  • Centralised family protection so you can check that your parent’s devices are safe.

 

Buying Norton via Vox gives you a local, reliable channel to purchase and manage the licence, which is one less thing to worry about.

 

Practical steps for immediate protection

  • Install Norton on every device your parent uses and enable automatic updates.
  • Turn on email and web protection to block suspicious links.
  • Set up one shared contact (you) who your parent must call before sharing money or details.
  • Back up important files so ransomware can’t hold photos or documents hostage.

 

Norton from Vox  offers robust, all-in-one protection against viruses, malware, ransomware and online threats – for the whole family, including your elderly parents. It’s Internet safety for the elderly – like the virtual equivalent of a home security guard, refusing to allow the criminal over the threshold while your mom or dad are blissfully unaware and watching their favourite show or match on TV.

And if your elderly family members aren’t downloading dodgy links, you don’t have to spend precious time cleaning up their phones at a later stage.

 

Frequently Asked Questions

How do I start a sensitive conversation with my ageing parent?

  • Choose a calm moment, be honest but respectful, ask open questions and listen to their priorities

 

How can I suggest home-safety changes without upsetting them?

  • Frame changes as ways to keep them independent, offer choices and involve them in decision-making.

Secure Your Connectivity with our Fibre Plus Firewall Bundle October Special

Secure connectivity is about speed and protection.

 

South African networks face multiple threats on a daily basis. Recent reporting shows that Interpol detected roughly 230 million cyber threats in South Africa, which is a clear signal that homes and businesses must harden their borders.

Secure connectivity prevents unauthorised access, data loss and downtime, helping you to keep operations and productivity running smoothly within your business.

 

Sophos Firewalls with Vox

Vox has partnered with Sophos to offer next-generation firewalls to help you better protect your network, quickly and efficiently.

Sophos Gold Partner 1 | Vox | Secure Your Connectivity with our Fibre Plus Firewall Bundle October Special

With Sophos firewalls from Vox, you can enjoy no hidden costs – just great security, and you will find that it’s easy to use, even if you’re not technical.

The advanced threat protection blocks viruses, ransomware and hackers, leaving you with peace of mind. You can also block websites and non-work apps so that your employees’ efficiency is boosted, allowing you to boost security and productivity at the same time.

The solution is designed to promote a fast and secure network that continues running at high speed, which serves as another productivity value-add.

 

Why A Fibre Plus Firewall Bundle Is Crucial

Vox’s Fibre Plus Firewall bundle gives you both speed AND protection.

Our October 2025 special offer combines resilient Vox Fibre with next‑gen Sophos Firewall protection, allowing you to protect your devices, data and productivity with a single, easy solution.

 

Firewalls: Your First Line of Defence

Optimised SophosXGSSeries Web ValueAdd Banner V2 | Vox | Secure Your Connectivity with our Fibre Plus Firewall Bundle October Special

A Firewall monitors and filters incoming and outgoing traffic based on set rules, creating a perimeter between your trusted network and the internet. Modern, next‑generation Firewalls also:

  • Detect and block intrusions and malware (IDS/IPS).
  • Support VPNs for secure remote access.
  • Log activity for rapid incident response.
  • Block malicious websites and non‑work apps to protect users and increase productivity.

 

Why Pairing Fibre with a Firewall is a Great Idea

Fibre delivers fast, symmetrical bandwidth essential for cloud apps, video conferencing and backups. Pairing that connectivity with a dedicated Firewall ensures high performance isn’t offset by exposure to threats. The Fibre plus Firewall bundle gives you:

  • Speed and security in one purchase.
  • Simpler billing and deployment with Vox.
  • Managed support to keep both connectivity and protection performing.

 

Sophos Firewalls with Vox: What You Get

The key benefits include the following:

  • Advanced threat protection against viruses, ransomware and hackers.
  • VPN support for secure remote workers and branch offices.
  • Centralised logging and reporting for faster incident handling.
  • Options to block websites and non‑work apps to boost staff productivity.
  • Backed by Vox 24/7 support and clear pricing with no hidden costs.

 

October special: Fibre plus Firewall bundle

This October, Vox is running a limited‑time Fibre plus Firewall bundle special. It’s an ideal time to:

  • Move to faster Fibre connectivity;
  • Add enterprise‑grade Sophos Firewall protection; and
  • Consolidate services and simplify billing.

 

Enquire early to reserve bundle availability and special pricing.

 

How To Get Started

Assess your needs in terms of the required bandwidth, number of users and remote access requirements. Then:

  1. Choose a Vox Fibre package and Sophos Firewall level.
  2. Book installation and configuration with Vox support.
  3. Activate monitoring and policies with assistance from Vox 24/7 support.

 

Protect Your Network with Vox and Sophos

By protecting your sensitive data, devices and systems from threats like malware, hackers, denial of service attacks and malicious software, firewalls are a fundamental component of any network security strategy.

Contact us today to find out more on how you can implement a firewall to protect your network.

 

Frequently Asked Questions

What is a Fibre plus Firewall bundle?

A Fibre plus Firewall bundle combines Vox Fibre internet connectivity with a managed next‑generation Sophos Firewall, to deliver both high performance and network security in a single package.

Why should I buy a Firewall if I already have Fibre?

Fibre gives you speed; a Firewall protects that connection. Without a Firewall, your fast connection can make attacks more damaging. A combined solution ensures both performance and protection.

What protection do Sophos Firewalls provide?

Sophos Firewalls include intrusion detection and prevention, anti‑malware and ransomware protection, VPN support, web and app control, and central logging for incident response.

Who is the Fibre plus Firewall bundle suitable for?

The bundle is ideal for small businesses and larger organisations that need reliable Fibre speeds with enterprise‑grade security and managed support.

When is the Vox October special available?

Vox will run the Fibre plus Firewall bundle special in October 2025 – contact us to confirm availability, exact pricing and terms.

Can Vox manage the Firewall for me?

Yes. Vox offers managed services and 24/7 support to help configure, monitor and maintain your Firewall and connectivity.

Will a Firewall slow down my Fibre connection?

Properly configured next‑gen Firewalls are designed to protect without significant performance impact. Vox matches Firewall capacity to your Fibre speed to preserve throughput.

How do I enquire about the October bundle?

Click here on the Vox website to request details and a tailored quote.

Protect Your Kids from Online Predators

Some practical thoughts to guide parents and grandparents

It can’t happen in my home… can it?

Just because your children are playing online games in the safety of your home doesn’t mean that they are safe from perverts.

This is the reality of today’s digital world.

It’s hard to believe, but every parent’s worst worry is now partly digital: how to protect kids from online predators who can reach children through games, apps and social networks in the safety of your own home. This guide discusses online grooming, practical steps you can take at home, and how tools from Vox and Norton™ can help you keep children safer online.

[Editor’s note: This article comes with a sensitivity warning, particularly for parents, grandparents and other concerned family and friends.]

According to the United Nations Children’s Fund (UNICEF), in South Africa, according to its ‘SA Kids Online Study’, one-third of children in the country are at risk of online violence, exploitation and abuse.

  • One-quarter (25%) of those surveyed confirmed that they had added people whom they’d never met face-to-face to their friends or contacts list.
  • Similarly, nearly one-fifth (18%) of those surveyed had sent a photo or video of themselves to someone they had never met in real life.

 

These stats also confirm just how naïve and vulnerable children can be – and why parents and guardians need to protect them.

Protect kids from online grooming_1

And so, when we read about the pervasiveness of online grooming, your first response as a parent might be: ‘It can’t happen in my home – can it?’ but your second response should be: ‘How can I make absolutely sure that it doesn’t?”

With Vox and global cybersecurity expert company Norton™, parents can exert real parental control by setting up tools to help your kids explore the Internet more safely.

 

Unpacking Online Grooming

In decades past, parents and caregivers worried about ‘flashers’ – perverts lurking around schools in long coats, who waited to suddenly give their young victims an eyeful that they weren’t expecting.

Today, the perverts are looking for the reveal to be the other way around – and the effects can be far more lingering and devastating.

Online grooming

Norton™ warns that, as part of the attempted grooming process: ‘…predators may spend months steadily getting to know their potential victims. They might start this process by contacting children as they play popular online games such as Fortnite or Minecraft.

‘…Once predators gain the trust of their victims, they will then steer conversations more often toward sexual topics and will eventually ask children to engage in sexual conversations, send explicit photos, or meet them in real life.’

Reports have also surfaced of cyber predators infiltrating another online game popular with kids, namely Roblox.

But there ARE ways to fight back – and in the Vox family, we’re definitely here to help.

 

The Danger Lurking Behind Everyday Apps

Vox has teamed up with Norton™, which provides industry-leading antivirus and security software for PC, Mac and mobile devices.

According to Norton, children today gravitate toward social media apps that allow them to connect easily with their friends. But these social networking apps and websites are also favoured by predators who use them to communicate with their intended victims.

Norton says that, in addition to online games, some of the apps that predators may use to communicate with children include WhatsApp, Snapchat, TikTok, Kik, Monkey, Whisper and Chat Avenue.

For any parent, it’s frightening to think about the multiple ways that predators can use technology to find and target their victims.

So let the experts take care of it for you.

child 1073638 1920 | Vox | Protect Your Kids from Online Predators

 

What Norton and Vox can do for you 

Vox has partnered with Norton to make industry-standard protections readily available to families with Norton Family and Norton 360 providing one app for many devices.

These tools don’t replace conversations, but they give you clear alerts, activity reports and the ability to set safe boundaries.

Smart monitoring allows parents to monitor search terms, videos and app downloads; receive alerts for unsafe behaviour; and get detailed activity reports.

In addition, options such as location tracking allow you to define safe zones for your children and receive real-time alerts if those boundaries are crossed. Children can share their location through the mobile app.

All of these safety features – and many more – are available from Norton’s comprehensive protection for your devices and online privacy.

 

Protect Kids from Online Predators at Home

UNICEF says that keeping children safe online also relies on parents and caregivers maintaining open communication; using technology to protect children; spending time with them online; and encouraging healthy online habits

  • Talk regularly and openly: Start conversations about online life the same way you’d talk about who your child plays with in the street. Ask gentle questions: who are your friends online? What games do you play? What apps do you use?
  • Agree house rules: Device-free zones (dinner table, bedrooms at night), time limits for play, and rules about sharing photos or personal information.
  • Use parental controls: Industry tools such as Norton Family and Norton 360 offer activity monitoring, content filtering, screen-time limits, location supervision and alerts for risky behaviour. These tools help you set boundaries while still allowing kids to explore.
  • Co-play and co-view: Sit with younger children while they play online and encourage older children to show you new apps and settings. This builds trust and gives you a live view of who they interact with.
  • Check privacy and friend lists: Make sure profiles are set to private, review followers and friends together, and remind children never to share addresses or phone numbers in chats.
  • Watch for signs: Increased secrecy, sudden changes in behaviour, new devices or new online friends that appear overnight are all red flags.

 

Balancing Safety and Privacy

Monitoring doesn’t mean spying. Explain to your child why you’re using parental controls and that the aim is safety, not punishment. As children grow, shift from more direct monitoring to regular check-ins and shared agreements about responsible online behaviour.

Quick checklist for parents and grandparents (bullet list for snippet targeting)

  • Have an open conversation about online risks this week.
  • Set simple house rules for devices and sharing.
  • Install parental controls and review activity reports weekly.
  • Make social profiles private and review friend lists together.
  • Know how to report abuse to the app/platform and to local authorities.
  • Keep devices in communal spaces for younger children.

 

Before our world became as digital as it is today, parents only had to worry about their children’s safety in the physical environment. Today, we have to be concerned about online predators that can access our homes through our digital devices.

This is all a lot to think about, so why not let Vox and Norton take care of it for you with our comprehensive and proactive suite of solutions?

We’re here to help you keep your children safe in the online world for as long as possible without becoming another statistic.  Please click here for more information.

 

“Making the decision to have a child is momentous. It is to decide forever to have your heart go walking around outside your body.” ~Elizabeth Stone, author

mother 2935723 1280 | Vox | Protect Your Kids from Online Predators

 

Frequently Asked Questions

How can I tell if my child is being groomed online?
Look for signs such as secrecy around devices, sudden new friendships, unexplained gifts, changes in mood or sleep, or attempts to isolate the child from family. If a child is using private messaging apps or deleting chat histories, take note and ask open, non-judgemental questions.

What do Norton parental controls actually do?
Norton Family and Norton 360 provide content filtering, web and search supervision, screen-time controls, social media monitoring, location supervision and alerts for unsafe behaviour. They produce activity reports so you can spot potential problems early.

Will parental controls invade my child’s privacy?
Used thoughtfully, parental controls are a safety tool. Be transparent: explain why you’re using them, involve your child in setting the rules, and gradually reduce monitoring as your child demonstrates responsible behaviour.

At what age should I set up parental controls?
Start young, because even pre-schoolers benefit from basic content filtering and supervised access. For older children, combine tools with conversation and digital literacy lessons so they understand safe behaviour.

What should I do immediately if I suspect grooming?
Stay calm, listen to the child, preserve any evidence (screenshots, chat logs), report the account to the platform, and contact local authorities or child-protection organisations for guidance.

Where can I get help in South Africa if I need to report abuse?
Report serious threats to the police (SAPS) and the platform where it occurred. Seek support from child-protection organisations and trusted local counselling services.

 

 

Cyber Attacks on Small Businesses

Cyber attacks on small businesses are on the rise – why SMEs are more vulnerable to cyberattacks, and how to stay safe

When we think of cyberattacks, we often picture a giant corporation with hackers trying to break into a billion-dollar cyberdeck (we blame the movies). The truth, however, lies on the opposite end of the spectrum – cyberattacks on small businesses are rising.

Thi is mainly because many SMEs have limited budgets, outdated systems and minimal staff training. Put simply: attackers go where the doors are easiest to open.

Think of it like this: large corporates invest heavily in security teams and layers of protection. Smaller businesses are often leaner, making them attractive targets for opportunistic hackers. Below we explain why, and give practical, affordable steps you can implement right away.

 

business 3639565 1280 | Vox | Cyber Attacks on Small Businesses

 

Why small businesses are vulnerable to cyber attacks

Limited budget = limited defence: Large firms can afford dedicated security teams, regular audits and enterprise-grade tools. Most SMEs operate on tight margins, so security is often deferred. That can mean unpatched systems, basic antivirus only and no 24/7 monitoring — an invitation to attackers.

A false sense of security: Many small business owners assume they’re “too small to matter”. In reality, cyber criminals treat SMEs as low-effort, high-reward targets. Simple breaches multiplied across dozens of businesses still pay off.

Human error and lack of training: All it takes is a click. Yup. Just one innocent click from a person who doesn’t know better can take down an entire organisation. Employees without regular training often can’t spot scams, dangerous links, or social engineering tricks. Good habits are the frontline defence.

Weak Passwords  and Outdated Systems: Is your team still using the hand-me-down PC that needed replacing about 4 years ago? And when was the last time anyone – ANYONE – updated their software? Nothing screams entry point like an unpatched system. Combine this with weak or recycled passwords, and you’ve basically left the front door open. Attackers scan for known vulnerabilities — if your systems aren’t updated, you’re presenting an easy route in.

 

Practical Steps Every SME Can Take Today

You don’t need a military-grade budget to reduce risk. Adopt these practical measures and you’ll significantly lower your exposure to cyberattacks on small businesses.

data privacy 9611620 1280 | Vox | Cyber Attacks on Small Businesses

Maintain cyber hygiene

  • Keep operating systems and applications up to date.
  • Apply security patches promptly.
  • Use a password manager and enforce strong, unique passwords.
  • Enable multi-factor authentication (MFA) for all critical accounts.

 

Train your people regularly

  • Run short, frequent sessions on spotting phishing emails, suspicious links and safe browsing.
  • Make cybersecurity part of employee onboarding and monthly refreshers.

 

Backup and test backups

  • Use both cloud and offline backups for critical data.
  • Test restores regularly so you know your backups work when you need them.

 

Invest sensibly

  • Move beyond free antivirus. Affordable endpoint protection, email filtering and a good firewall make a big difference.
  • Consider managed security services if you don’t have in-house expertise — they can be cost-efficient for SMEs.

 

Have an incident response plan

  • Know who to call and what steps to take if you detect a breach.
  • Assign responsibilities, contact details and a communication plan to minimise disruption.

 

Quick Checklist — Low-Cost Steps to Reduce Risk Now

  • Update all systems and software this week
  • Enable MFA on business email and admin accounts
  • Start monthly phishing-awareness emails/trainings
  • Implement a password manager and roll out strong passwords
  • Schedule automatic daily backups and test restores monthly
  • Put an incident response contact list where staff can find it

 

It’s not that small businesses don’t face the same threats as larger ones, but rather they face them with far fewer defences – which is exactly what makes them such attractive targets. However, by combining the correct mindset with easy, practical steps, you can go a long way to reducing this vulnerability.

You don’t need to build Fort Knox – you just have to make sure your doors are locked in order to sleep at night.

Stay safe, stay secure, and stay cyber smart.

Vox has partnered with global cybersecurity experts Sophos for cybersecurity solutions and we are easily able to cater to the needs of SMEs – contact us to find out more.

 

Some Frequently Asked Questions

Are small businesses at greater risk of cyberattacks?
Yes. Many small businesses have fewer security resources and less training, making them easier targets. Attackers often target SMEs for the same reasons they target larger firms: for data, money or to use compromised systems as launch points.

What types of cyberattacks target SMEs?
Common attacks include phishing emails, ransomware, credential theft, business email compromise (BEC) and unpatched software exploits. Phishing and ransomware are particularly damaging for small businesses.

How much should an SME spend on cybersecurity?
There’s no one-size-fits-all number. Start with basic protections (patching, backups, MFA, endpoint security) and scale from there. Many affordable solutions and managed services are tailored to SME budgets.

How often should employees be trained?
Short, regular sessions (quarterly or monthly refreshers) are ideal. Frequent reminders, simulated phishing tests and clear reporting steps help keep awareness high.

What should I do immediately after a cyberattack?
Disconnect affected systems if safe to do so, preserve logs where possible, notify your IT/security provider and follow your incident response plan. Report significant breaches to relevant authorities and affected parties as required.

Are backups enough to protect my business?
Backups are essential but not sufficient on their own. They protect your data from loss and ransomware, but you also need preventive measures (patching, MFA, endpoint protection) and an incident response plan.

Too Big, Too Small or Just Right? Choosing the Right Internet Plan for Your Household

Getting the right fit for your household’s size, usage habits and budget

There’s an age-old fairytale for children called ‘Goldilocks and the Three Bears’. If you think about it from a South African perspective, it’s really a tale of a home invasion – a minor and harmless one at least. One takeaway from the folk tale (besides ‘Don’t enter people’s homes when they aren’t there!’) is apparently that Goldilocks is looking for her fit in life.

Vox guide to choosing the right speed, data and connection type for your household that’s just right for everyone.
Image courtesy www.kids-pages.com

 

Here at Vox, we obviously don’t condone home invasions of any sort, but we do endorse finding the right fit. As one of South Africa’s leading Internet Service Providers (ISPs), we understand that your online experience should allow everyone in your home to enjoy seamless connectivity for all their devices and activities. We also know that choosing the right Internet plan for your household doesn’t have to be an impossible fairytale either.  

At Vox, we’ve got multiple Connectivity plans for you to choose from, but it’s important to understand some key points to make an informed decision.

So here’s a guide on selecting the best Vox Internet plan based on the size of your household, the usage habits of everyone who lives there, and your budget – because just like Goldilocks (but not in a creepy way) we understand the importance of getting it ‘just right’.

 

Assess Your Household’s Internet Usage

home internet for family 

Start by assessing your household’s Internet usage patterns. How many Internet users do you have at home and what do they do online? For example, do your family members regularly spend time streaming entertainment, gaming or in online video meetings? How many devices could potentially be connected simultaneously at any given moment? Thinking about these factors will help you to determine the required speed and data allowances of your Internet plan.

Internet speed is typically measured in megabits per second (Mbps) for downloads and uploads. So: how many teenagers – or almost teenagers – are living in your house, and are any of them currently planning a career in gaming or becoming a YouTuber? You’ll want to choose higher speeds if anyone in your home is regularly involved in bandwidth-intensive activities like online gaming or HD streaming.

The table below offers some useful guidelines.

V104.1.7 How to Choose Table V1 030225 FINAL | Vox | Too Big, Too Small or Just Right? Choosing the Right Internet Plan for Your Household
choose internet plan South Africa

Select Your Internet Plan for Seamless Connectivity

When you’re choosing a household Internet plan, you want one that offers sufficient speed to support your family’s online activities without experiencing slowdowns or buffering.

Compare pricing structures among our different Internet offerings to find a plan that fits your budget and your speed requirements, as well as whether your Internet data usage will be capped or uncapped. At any given moment, you’ll find a promotional offer available and a variety of options across all our different Connectivity options (which are outlined in the next section).

Evaluate your household’s typical data consumption and choose a plan with sufficient data allowances to avoid throttling of your Internet speeds. Throttling occurs if you use more than a certain, pre-determined (as outlined within your contract) ‘fair’ amount of data in a given timeframe.

If your Internet usage is ‘throttled’, your line speed is slowed down during peak times to give other users fair access to the network. In simple terms, being throttled means that your upload and download speeds will be significantly reduced at certain times, until the new month begins and the ‘reset button’ takes you back to your contractual speeds. If you find that your home’s Internet connection is being regularly throttled, perhaps you need to upgrade to a package with higher speeds.

 

Types of Internet Connections 

You can find out what types of Vox Internet connections are availably simply by going to the Vox home page and typing in your address. All the options available to you in your area will then be shown.

These could include the following: Fibre to the Home, which provides blazing-fast Connectivity by using light pulses to transmit data packets through Fibre Optic cables; LTE and 5G, which work via the same wireless cellular technology that powers your mobile phone network; and Satellite, presenting your eye in the sky when other options aren’t available.

Each type of Internet connectivity for home usage has unique characteristics:

  • Fibre to the Home: Enjoy super-fast, reliable Internet with Vox’s Fibre to the Home packages, with speeds that range from 4Mbps to a whopping 1Gbps.
  • LTE and 5G: Get connected to the Fibre-like speeds of Vox’s LTE and 5G offerings without having to wait for a fixed-line Fibre option to be installed in your neighbourhood.
  • Satellite: When your area’s access to FTTH, LTE and 5G connectivity is limited, Vox offers Satellite Internet, independent of cabling, across the country. It isn’t as fast as the other options, but it’s reliable and available across South Africa.

 

Choose the Right Internet Plan Today 

internet speed for streaming and gaming

Selecting the right Internet plan makes sure that everyone in your home can stay connected and productive, for communication, remote work and online learning, banking, shopping and entertainment.

At Vox, we know that, just like the Three Bears in the age-old fairytale, everyone’s needs are different. Why not contact us today for expert advice on how to choose the right Internet plan for your home and your family? We’ll help you make the right choice: not too big, not too small, but just right.

 

Frequently Asked Questions

Is fibre always better than 5G or satellite?
Fibre typically offers the most reliable speeds and lowest latency. 5G/LTE can deliver fibre-like speeds and fast installation in many areas. Satellite is best where terrestrial services aren’t available.

What does ‘uncapped’ mean and is it worth it?
Uncapped means you don’t have a fixed data limit for normal use; check for any fair-usage policy. Uncapped plans are valuable for heavy households whose members frequently stream, game or work from home.

Why does my internet speed slow down at certain times?
That’s usually due to throttling under a fair-use arrangement or network contention during peak hours. Upgrading to a higher-tier or uncapped plan can help.

Can I mix connections (fibre with LTE backup)?
Yes. Vox and many ISPs offer redundant setups (fibre primary with LTE failover), which is useful for critical remote work or businesses operating from home.

How many Mbps do I need for remote work and video conferencing?
For reliable video calls, aim for at least 10–25Mbps per active remote worker, with good upload speeds to avoid degraded video quality.

How do I check which Vox options are available at my address?
Use the Vox availability checker on vox.co.za and enter your address to view Fibre, LTE/5G and Satellite options and the recommended plans for your area.

 

Vox Hosting with the Mosting

Providing a solution to meet your business requirements

Customer loyalty today demands digital options. If your business doesn’t have an attractive and well-functioning website, your potential customers will shop elsewhere.

South Africa’s online retail sector showed a significant increase in the past few years, growing by almost 30 percent (29 percent) between 2022 and 2023. Having reached the R71 billion mark in 2023, online sales are now anticipated to break the R100 billion barrier by 2026 – which is just around the corner.

And so, with South Africa’s online sales soaring, there’s never been a better time to make sure your business has a functioning website. Even with a bricks-and-mortar operation, it’s essential to back it up with an online option as well.

If you’re keen to upgrade your company’s online presence quickly and effectively – or even kickstart one if you haven’t got a website already – Vox offers several different hosting experiences with solutions to meet your business’s unique requirements, no matter your budget.

 

Domain and Web Hosting: The Right Address and Functioning Operations

street 767772 1920 edited | Vox | Vox Hosting with the Mosting

In the physical world, you need an address so your customers can find you, and you need premises from which to operate. These two terms represent different things in terms of getting your website infrastructure up and running.

  • Start with an address: Domain hosting is a service that allows you to choose and register a unique online name for your website and brand, in other words your web address.
  • Make sure your premises are fit for purpose: Behind the address lies the property from which your business operates. Web hosting is essentially what stores all your site’s information and files. It’s usually a server, or space on a server.
  • Let your customers come inside: When someone uses your domain to access your website, signals are sent to the server, which then opens up your live site for the customer – the online version of ‘going into your shop’.

 

With Vox Web Hosting, you rent space on our server and host your website contents through us. We offer multiple platforms to choose from, including WordPress, Linux and Windows. Vox Web Hosting includes a free .co.za domain.

 

Backed by Vox Expertise

difference 7370145 1920 | Vox | Vox Hosting with the Mosting

As well as being able to choose from multiple platforms and have a free domain, Vox Web Hosting also offers the following benefits:

  • Extensive network coverage: Vox Web Hosting has an established national and international backbone with over 13 local PoPs (Point of Purchase outlets) and footprints in all the Teraco Data Centre environments.
  • Security Team: All servers sit behind Vox’s state-of-the-art firewall infrastructure, with virus management and security updates.
  • 24/7 Expert Support: Our servers are locally hosted and managed around the clock by our engineering team for peace of mind.
  • Includes a Free SSL Certificate: If you’re going to run a prosperous website that is secure for your users and browsers, SSL certificates are an essential. Vox SSL Certificates keep your customers’ confidence by ensuring the safety of their data while they visit your website.

 

WordPress, Linux and Windows are some of the world’s most popular website hosting platforms today, and Vox Web Hosting is proud to bring you different options across each brand.

 

Shared Web Hosting: Linux and Windows

Shared hosting makes getting started online simpler and easier, saving you money, as well as taking the headache out of hosting.

With Vox shared Web Hosting, our customers experience a form of web hosting in which more than one website shares the resources of a single virtual or physical server, which means a stable but also low-cost solution.

Choose from Linux options as follows:

  • Linux Basic: 1GB of storage, 25 email addresses;
  • Linux Standard: 4GB of storage, 75 email addresses;
  • Linux Advanced: 20 GB of storage, 200 email addresses; and
  • Linux Ultimate: 30 GB of storage, 250 email addresses.

Alternatively, Vox Web Hosting also offers Windows options, as follows:

  • Windows Standard: 2GB of storage, 100 email addresses;
  • Windows Advanced: 4GB of storage, 200 email addresses; and
  • Windows Ultimate: 20GB of storage, 250 email addresses.

 

Premium WordPress Hosting

If you want to kick your website functionality up a notch, consider WordPress. Over the last two decades, WordPress has grown from being a simple blogging website to one of the world’s most used hosting platforms today.

Our premium WordPress offering delivers performance and scalability to your fingertips. It’s an excellent solution for customers who require better performance, uptime and scalability – although please note: it doesn’t come with email addresses built into the offering.

  • WordPress Starter is ideal for startups that require a professional WordPress website, offering 50GB storage and able to cater to up to 30,000 visitors monthly.
  • WordPress Innovator is perfect for growing businesses that need to scale and require speed and reliability, with 100 GB storage and ideal for up to 120,000 monthly visitors.
  • WordPress Fanatic is excellent for running an e-commerce website, with 150GB storage. It’s capable of catering to an unlimited number of visitors monthly.

 

Which Option to Choose?

Whether your business is already established or a startup about to take off, you need a strong online presence. From your website address to the online ‘premises’ behind it, Vox has the right option to help you with your online sales.

open sign 1309682 1920 | Vox | Vox Hosting with the Mosting

Shared hosting shares a single physical server with hundreds (if not thousands) of other websites, giving you a low-cost service. WordPress hosting is tweaked for high traffic websites, providing excellent performance and faster loading websites.

Contact us for more information and we can assist you with working out the option that’s best for your business. We can help you establish a business identity, give your organisation a professional look and feel, and build credibility on the web.

Join the sales revolution and be part of the drive to reach the one billion Rand online sales mark next year!

Don’t Sleep on Data Backup and Recovery

Even Presidents Can Be Hacked

Data is the life blood of all organisations, and any loss of data can have serious implications for a business. The sudden loss of sensitive financial records or confidential information would be devastating to a company, with potential consequences including operational disruption, financial loss and reputational damage, as well as emotional distress to its customers.

Data loss can occur in many different ways. A hardware failure, a power outage, a natural disaster, or a cyber attack could all result in the loss of critical business data. Without a data backup plan, your organisation could be at risk of losing everything.

This means it’s essential to have proactive cybersecurity in place, as well as steps to control data backup and recovery, to protect an organisation’s digital assets. Having a reliable and redundant backup solution can assist companies to recover from incidents such as ransomware or hardware failure.

cyber 1654709 1920 | Vox | Don’t Sleep on Data Backup and Recovery

 

Three, Two, One: Go! For Data Backup

Data backup is a proactive measure that involves creating duplicate copies of critical data to guard against potential loss. These copies act as insurance against unforeseen events like hardware failures, accidental deletions and even cyberattacks.

Establishing a reliable backup strategy is like giving yourself a digital safety net to protect against risks – or an insurance policy, to put it another way.

Effectively implementing data backup and cybersecurity requires a strategic approach. Establishing a solid data backup plan involves adhering to the 3-2-1 backup rule, which has been used for many years and is supported by solution providers, businesses and even governments.

The 3-2-1 backup rule outlines that three backups must be kept, two of which should be on two different media (usually disk and tape), while one copy must be outside the primary data centre. This approach ensures protection against various scenarios, from hardware failures to natural disasters.

SA President Not Immune from Ransomware Attacks

South African government institutions have been battered by ransomware gangs over the last year.

The Development Bank of Southern Africa was targeted by a ransomware attack in June 2024, with servers, logfiles and documents stolen. In September this year, South Africa’s defence department was hacked by a gang that also allegedly leaked the personal phone number and email of President Cyril Ramaphosa, as well as a portion of the 1.6 terabytes of data stolen from the country’s defence systems.

The country’s International Trade Administration Commission also said it was hit with ransomware in early 2024. More recently, in June, the National Health Laboratory Service (NHLS) was targeted by a ransomware attack in which hackers deleted sections of their system, including backup servers, which meant that they were required to rebuild many of the affected parts. The attack took place at a time when Mpox outbreaks in the country were of concern.

These statistics show that data loss is a severe problem that can have a significant impact on an organisation, causing financial and reputational damage.

cyber 4444450 1920 | Vox | Don’t Sleep on Data Backup and Recovery 

Protect Your Data with Vox

At Vox, we understand the critical importance of keeping your data safe with a backup and recovery plan. As a Veeam Gold Partner, we offer your business the opportunity to create a copy of your data through our Backup as a Service, which uses the 3-2-1 rule.

As a trusted leader in the data protection space, Veeam provides backup, recovery and replication for critical workloads, like VMware, AWS, Microsoft Azure, SQL Server, Oracle, Windows, Linux and NAS, across physical, virtual and cloud platforms, in a single offering.

With the Vox 3-2-1 Backup solution, we provide an onsite data store for fast local restores, and replicates the data to our Cloud repository in case of major onsite disaster. It supports onsite virtual or physical servers as well as Windows and Linux desktops.

 

AdobeStock 572971403 | Vox | Don’t Sleep on Data Backup and Recovery

We offer a number of benefits:

  • A fully managed solution with proactive monitoring to ensure data isn’t lost
  • Ongoing integrity testing ensures that data is not corrupt and that backups can be recovered
  • The option to quickly restore to Vox Cloud so that users can continue to work.

Companies implementing a backup strategy often only keep data on-site, believing this to be infallible. However, a ransomware attack or critical hardware failure, in most instances, renders the data unrecoverable. With our Vox solution, you can protect against this risk by adding an additional layer of redundancy, as follows:

  • 3 copies of your data: This is the primary copy of the data you are using as well as two backups.
  • Saved on 2 different mediums: In addition to your primary copy, an onsite NAS device stores your backups, enabling quick restore functionality to reduce downtime.
  • 1 copy offsite in the Vox Cloud: Using Veeam’s Cloud connect, a backup copy is stored and maintained in the Vox Cloud.

 

The urgency to backup data lies in the potential devastation that is caused by data loss. You don’t want your organisation to become another statistic – or another bad news story in the headlines.

 

Has Modern Internet Usage Made Us More Vulnerable?

Imagine a world in which people are completely reliant on a Super-Machine for all their needs…

 

Living in self-contained areas, they have little social contact, but are content because they’re sheltered and warm, with access to food, communication and entertainment – all enabled by the Machine. But one day the Machine goes down, and society crashes into a new reality. Does it sound… plausible? This is actually the plot of a science-fiction book written by EM Forster, called ‘The Machine Stops’.

In the real world, when people ‘sheltered in place’ during the Covid-19 pandemic, South Africans embraced online communication, shopping, banking, remote working and entertainment like never before – and when the pandemic eased, many people didn’t particularly want to go back ‘outside’ in quite the same way.

christin hume hBuwVLcYTnA unsplash | Vox | Has Modern Internet Usage Made Us More Vulnerable?

 

So even though we aren’t living in the sci-fi world of ‘the Machine’, the question is: How reliant are people today on the Internet? And has modern Internet usage made us more vulnerable to previously unimagined threats? The answers might be a bit shocking.

 

The Power’s Out

Let’s start with one of the basics: electricity. In South Africa, we’re used to power outages. Over time, we’ve come up with multiple solutions to deal with challenges like no heating or lights, cooking on gas instead of electricity, and having the Wi-Fi go down. But that was all because of Eskom’s troubles, which (whisper so as not to jinx things) might be on the mend at last?

Much more alarmingly, there are places in the world where the power can be taken out by acts of war, because the rise of technology means infrastructure is now linked to the online world. This brings improved functionality to critical national infrastructure sites around the world, but also new vulnerabilities – including electricity grids.

digital 4683519 1920 Infrastructure threat | Vox | Has Modern Internet Usage Made Us More Vulnerable?

For example, Ukraine has experienced documented cases of cyber attacks on its power grid that have been attributed to its Russian enemies, in addition to actual physical attacks via traditional weapons of war.

The reality is that the Internet is now so intricately involved with our critical infrastructure that power outages – which can be life threatening in some situations – can be caused by online activity as well as physical damage. So yes – modern Internet usage has definitely made us more valuable to this particular threat.

 

The Internet of Threats

On a smaller scale than targeting national infrastructure, there are other ways in which the Internet can cause us to be vulnerable in our daily lives.

We’re used to connecting different devices to the Internet, including industrial sensors and CCTV cameras, as well as home devices such as security cameras (again), Internet routers, smart utility meters, connected TVs, and monitors for our small children’s bedrooms. Together, they form part of the Internet of Things (IoT), geared to make life easier.

network 782707 1920 | Vox | Has Modern Internet Usage Made Us More Vulnerable?

However, many of these devices are set up with a default password already installed -that is something as basic as ‘Password’ – with the onus on the owner or installer of the IoT device to change it once in use. But frequently, the password isn’t changed – and in addition, there are lists of widely available (if you know where to look) IoT device passwords available on the Internet for threat actors to access quite easily.

The danger of IoT devices being hacked includes strangers spying on your home and frightening your kids through the baby monitor (yes, this really has been done), as well as, at a more industrial level, being turned into ‘zombie bots’. The so-called zombies become part of a botnet – a network of private computers or IoT devices infected with malicious software, and controlled as a group (without the individual owners’ knowledge) to carry out cyber crimes.

In late May 2024, the US Federal Bureau of Investigation (FBI) carried out an operation to take down what was thought to have been the world’s biggest-ever botnet, made up of millions of computers, in nearly 200 countries, that had been infected with malware. Selling access to this network enabled serious crimes around the globe, including financial fraud, identity theft and bomb threats.

ai generated 8362805 1920 Pete Linforth | Vox | Has Modern Internet Usage Made Us More Vulnerable?

It sounds like something from the movies, but unfortunately it’s not – it’s a reality today of modern Internet usage. So how do people and countries protect themselves from such possible cyber threats?

 

Protecting Your Data and Yourself

There’s obviously not a great deal that individuals can do to protect national infrastructure – that’s up to the sovereign nations concerned. As far as IoT devices are concerned, hopefully manufacturers, service providers and security experts are becoming more invested in developing effective strategies to improve their security – but it’s imperative that the consumer also shares the responsibility.

Here are some tips to make yourself less vulnerable to Internet threats:

  • For any device in your home: change the default password to something stronger.
  • Ensure that you have a strong Wi-Fi password for your home network.
  • Install all updates from the manufacturer to ensure you have the latest security patches.
  • Install, and then continue to update, anti-virus and malware software on your computers.

We are definitely more connected today than ever before – even if not actually within an all-powerful Machine – but at the same time, we have also become more vulnerable to threats from the Internet. Terrorists and criminals have shown their ability – and unfortunately their willingness – to use technology to harm countries, organisations and individuals. The reality is that no one is immune.

Here at Vox, we understand the vulnerability that comes with modern Internet usage. The only way to stop cyber criminals from making use of ‘the Machine’ in ways that unleash harm is to be constantly more aware and proactive.

 

android 7711290 1920 | Vox | Has Modern Internet Usage Made Us More Vulnerable?