The Real Cost of a Data Breach for Individuals

Another day, another data breach.

It seems like every other week that some big company announces they’ve been hacked (seriously, hospitals – heard of a firewall?). Entire databases of private, confidential information are sent into the digital wild more frequently than Trump changes his mind. And, the sad part is, the individuals who’ve been compromised often suffer as much as the entities who let it happen.

A good PR campaign and said company can get back on their feet. Know who can’t? The affected parties who now must recover financially, emotionally, and socially.

 

Financial Impact: Immediate and Hidden Costs

credit card 1591492 1280 | Vox | The Real Cost of a Data Breach for Individuals

When people think about breaches, the first implication they consider is financial – rightfully so, as the immediate effect is usually on your pocket.

Fraud, loans and damaged credit:

Criminals don’t even need actual money to run wild – just your card details are enough of a launching pad. How so? Here are some ways:

  • They may start fraudulently purchasing gift items, electronics, or crypto before you’re even aware of it.
  • Many criminals take out excessive loans linked to another account using stolen identities. The victim only finds out once collection is due.
  • On a smaller scale, quick cash-outs via e-wallet, ride sharing, and even food delivery accounts are also small ways victims have been hit.

 

Think it’s not relevant? Let’s look at the history:

An Equifax breach exposed the personal information of 147 MILLION people in 2017. Most of these victims later reported fake loan approvals and fraudulent credit card applications within a matter of days. And, even if the matter is eventually resolved, you can’t put a price on the stress, hours lost waiting on hold, or any residual damage to your credit score.

Identity theft — a long‑term risk:

cybersecurity 6949298 1280 | Vox | The Real Cost of a Data Breach for Individuals

Unlike a wallet, you can’t just “get a new” digital identity. Once your data is compromised, criminals can use it for decades. Think credit fraud, tax fraud, or even medical identity theft for prescription drugs.

The knock-on effect of these breaches is immense. They can impact on your ability to rent, apply for loans, and in some cases even find jobs.

The human cost — stress, relationships and reputation:

Everyone talks about Data breaches numerically, but what the victims go through is often overlooked. Many victims have to live with the daunting reality of:

  • Mounting anxiety as they log in and out of their banking app. Repeatedly.
  • The uncertainty of not knowing whether your info has been stolen.
  • The pain of repeatedly explaining your situation to strangers.

 

Think sleepless nights, relationship stress, and a never-ending daunting feeling. Cybercrime steals more than data – it takes away peace of mind.

Privacy harms that money can’t fix:

Many breaches expose extremely sensitive information. Think dating apps, health records, or your browser history (shudder).

And, unlike credit cards, your bank can’t (eventually) undo this one.

  • Ever heard of Ashley Madison? They were Tinder before Tinder. Until, one day, users were blackmailed with threats to expose their private activity. You can imagine how this went down.
  • Or spare a second to think about health-related breaches – and how stigmatised patients can feel when their conditions become public.

 

Some impacts transcend monetary value – they can damage reputations, careers, respect and relationships.

The problem with a breach is often the delayed effect. Cybercrime has a long tail, and slow burning effect. Once your Data is sold on the dark web, it stays there. In fact, it can even be resold, and repeat issues emerge for multiple years.

internet 4894814 1280 | Vox | The Real Cost of a Data Breach for Individuals

 

What to do right now if your data’s been breached

But enough fearmongering, what can we do if we find ourselves compromised? Here’s an easy guide:

  1. Change your passwords. Immediately. ALL of them.
  2. Enable your multifactor authentication (MFA).
  3. Verify whether your email has also been leaked (use sites like “have I been pwnd” – you can even do it now).
  4. Monitor your bank accounts (and notify your bank).
  5. Temporarily freeze your credit file.
  6. Double-check any calls, emails, or texts asking for information.

You can’t simply measure the true cost of a Data breach via a spreadsheet. The price you pay is intangible, and how do you quantify a lifetime of looking over your shoulder?

 

Act now – protect your data

Companies can move on – but victims carry the burden even once the headlines fade. This is why taking your cybersecurity seriously is no longer optional. It’s necessary. Because, in today’s digital world, your bank account isn’t your most valuable asset – your data is.

You can’t undo every breach, but you can limit the damage. Change passwords, enable MFA, keep an eye on your accounts and use reputable security tools. Treat data protection as essential because your information is often more valuable than the cash in your account.

Get immediate protection with Norton from Vox.

 

FAQs

What immediate steps should I take after a breach?
Change passwords, enable MFA, check Have I Been Pwned, notify your bank, and consider freezing your credit.

How long can identity theft affect me?
It can last years. Stolen data can be resold and reused, so ongoing monitoring is essential.

Will my bank always refund fraud losses?
Not always. Many banks will help, but you still face time spent on disputes and potential credit impacts. Report fraud immediately.

Can consumer security software really help?
Yes. Reputable suites (like Norton 360 offered through Vox) reduce your risk of phishing, smishing and device compromise and include privacy tools and 24/7 support.

Protect Your Older Parents Online with Norton from Vox

No, Mom – DON’T click on that link! 

I know an elderly lady who is dignified and respectable, with grown-up children and grandchildren. She is, as they say, a ‘pillar of her community’. She also, rather startlingly, has some, shall we say, unfortunate images on her phone at the moment, involving various anatomical closeups of naked people.

But this is not an article about a seemingly-sweet old lady who is at the helm of a mafia-style criminal empire – no, that’s not it at all, because she actually has NO IDEA that these images are currently on her phone (and her family members haven’t yet had the courage to tell her).

Vox has teamed up with global cybersecurity expert company Norton™ to offer comprehensive protection for your devices and online privacy, for the whole family, all in one solution. Traditionally, people have worried about their own online safety as well as their children’s, but there is no reason why your older parents can’t benefit also.

In this article, we look at how so many older people today have absolutely no idea of the perils that lurk online. We discuss how to protect people of an older generation who didn’t grow up with technology at their fingertips.

And we look at how acquiring the right software can take away the stress of having to keep saying: “NO, Mom – DON’T click on that link!”

Elderly Exploitation | Vox | Protect Your Older Parents Online with Norton from Vox

 

Why Older People Are Especially Vulnerable Online

Criminals have always seen older people as being a soft target, and today’s digital world simply presents long-existing criminal tendencies in a brand-new wrapping. When the goal is to scam older people out of their hard-earned savings, the Internet, online banking and social media all just make it easier for cyber criminals, because many older people are just not that comfortable with today’s technology.

This is largely because, in contrast to younger generations, older citizens had to learn to use information technology when they were already adults. It’s something that was initially entirely new to them.

And so the relationship that today’s senior citizens have with technology can be an uneasy or uncomfortable one, as shown in this clip from the popular and acclaimed Netflix sitcom, ‘Grace and Frankie’.

In the video clip, we see clearly just how some of the older generation think about technology – Frankie is deeply afraid of it at first. (Grace, as a retired former CEO, does at least know how to boot up a new laptop.)

Take a look for a bit of show, not tell!

fc69f28d b309 4d37 9f05 288f37f7e25a screenshot | Vox | Protect Your Older Parents Online with Norton from Vox

The video clip raises another point: if so many of today’s older generation are uncomfortable simply with acquiring new technology, you can imagine that they’re even more vulnerable once they’re finally online.

Senior citizens can be particularly vulnerable to cybercriminals who use social engineering – deception intended to manipulate people into sharing confidential or personal information – to lure their victims into handing over valuable personal details.

 

Why The Older Generation Is Vulnerable Online

Online criminals prey on qualities shared by many older users, including a fear of technology that they don’t fully understand, loneliness as their children grow up and leave home, an ingrained respect for authority and institutions, and an increasing need to feel financially secure as they get older.

If this is all sounding just a bit too familiar and close to the bone, the good news is that there are ways in which you can help protect your older parent or relative against would-be online scammers.

 

Keep It Simple — Three Rules to Teach Your Parent

Firstly, share the following information with your older parent to try to help them recognise when a criminal is trying to steal their bank account information, passwords or credit card numbers, or otherwise trying to separate them from their money.

  • Trust no one: never click links or open attachments from unexpected senders.
  • Ask first: establish a rule — “Call or text me before you act.”
  • Don’t share security details: never send PINs, passwords or banking details by message or phone.

 

These short, repeatable rules are easier to remember than long lectures. Think of them as being the digital equivalent of “Don’t open the door to strangers.”

In summary: ‘Don’t click on every link that looks like fun or promises you a great bargain.’ It’s the Internet version of ‘If it looks too good to be true, it probably is.’

Things that Make It Difficult for Older Adults to Use Technology 1 | Vox | Protect Your Older Parents Online with Norton from Vox

 

How Norton from Vox helps — Straightforward, Family-Wide Protection

You can try to teach all the rules in the world, but intuitive software makes prevention easier. Stop the malware from getting in by blocking those seductive ‘Click here’ messages before they even reach your parent’s phone, tablet or laptop with their exotic and interesting click-bait messaging.

Norton’s software safeguards your entire family’s PCs, Macs®, tablets and smartphones from viruses, ransomware, phishing and other cyber threats while you bank, shop and browse online.

Norton 360 family protection provides multiple layers of defence against viruses, malware, ransomware and phishing, which are the common tools criminals use to target seniors. Key benefits for elderly parents:

  • Blocks malicious links and phishing attempts before they land.
  • Protects PCs, Macs, Android and iOS devices with one app.
  • Simplifies security for non‑tech users — automatic updates and background protection.
  • Centralised family protection so you can check that your parent’s devices are safe.

 

Buying Norton via Vox gives you a local, reliable channel to purchase and manage the licence, which is one less thing to worry about.

 

Practical steps for immediate protection

  • Install Norton on every device your parent uses and enable automatic updates.
  • Turn on email and web protection to block suspicious links.
  • Set up one shared contact (you) who your parent must call before sharing money or details.
  • Back up important files so ransomware can’t hold photos or documents hostage.

 

Norton from Vox  offers robust, all-in-one protection against viruses, malware, ransomware and online threats – for the whole family, including your elderly parents. It’s Internet safety for the elderly – like the virtual equivalent of a home security guard, refusing to allow the criminal over the threshold while your mom or dad are blissfully unaware and watching their favourite show or match on TV.

And if your elderly family members aren’t downloading dodgy links, you don’t have to spend precious time cleaning up their phones at a later stage.

 

Frequently Asked Questions

How do I start a sensitive conversation with my ageing parent?

  • Choose a calm moment, be honest but respectful, ask open questions and listen to their priorities

 

How can I suggest home-safety changes without upsetting them?

  • Frame changes as ways to keep them independent, offer choices and involve them in decision-making.

Protect Your Kids from Online Predators

Some practical thoughts to guide parents and grandparents

It can’t happen in my home… can it?

Just because your children are playing online games in the safety of your home doesn’t mean that they are safe from perverts.

This is the reality of today’s digital world.

It’s hard to believe, but every parent’s worst worry is now partly digital: how to protect kids from online predators who can reach children through games, apps and social networks in the safety of your own home. This guide discusses online grooming, practical steps you can take at home, and how tools from Vox and Norton™ can help you keep children safer online.

[Editor’s note: This article comes with a sensitivity warning, particularly for parents, grandparents and other concerned family and friends.]

According to the United Nations Children’s Fund (UNICEF), in South Africa, according to its ‘SA Kids Online Study’, one-third of children in the country are at risk of online violence, exploitation and abuse.

  • One-quarter (25%) of those surveyed confirmed that they had added people whom they’d never met face-to-face to their friends or contacts list.
  • Similarly, nearly one-fifth (18%) of those surveyed had sent a photo or video of themselves to someone they had never met in real life.

 

These stats also confirm just how naïve and vulnerable children can be – and why parents and guardians need to protect them.

Protect kids from online grooming_1

And so, when we read about the pervasiveness of online grooming, your first response as a parent might be: ‘It can’t happen in my home – can it?’ but your second response should be: ‘How can I make absolutely sure that it doesn’t?”

With Vox and global cybersecurity expert company Norton™, parents can exert real parental control by setting up tools to help your kids explore the Internet more safely.

 

Unpacking Online Grooming

In decades past, parents and caregivers worried about ‘flashers’ – perverts lurking around schools in long coats, who waited to suddenly give their young victims an eyeful that they weren’t expecting.

Today, the perverts are looking for the reveal to be the other way around – and the effects can be far more lingering and devastating.

Online grooming

Norton™ warns that, as part of the attempted grooming process: ‘…predators may spend months steadily getting to know their potential victims. They might start this process by contacting children as they play popular online games such as Fortnite or Minecraft.

‘…Once predators gain the trust of their victims, they will then steer conversations more often toward sexual topics and will eventually ask children to engage in sexual conversations, send explicit photos, or meet them in real life.’

Reports have also surfaced of cyber predators infiltrating another online game popular with kids, namely Roblox.

But there ARE ways to fight back – and in the Vox family, we’re definitely here to help.

 

The Danger Lurking Behind Everyday Apps

Vox has teamed up with Norton™, which provides industry-leading antivirus and security software for PC, Mac and mobile devices.

According to Norton, children today gravitate toward social media apps that allow them to connect easily with their friends. But these social networking apps and websites are also favoured by predators who use them to communicate with their intended victims.

Norton says that, in addition to online games, some of the apps that predators may use to communicate with children include WhatsApp, Snapchat, TikTok, Kik, Monkey, Whisper and Chat Avenue.

For any parent, it’s frightening to think about the multiple ways that predators can use technology to find and target their victims.

So let the experts take care of it for you.

child 1073638 1920 | Vox | Protect Your Kids from Online Predators

 

What Norton and Vox can do for you 

Vox has partnered with Norton to make industry-standard protections readily available to families with Norton Family and Norton 360 providing one app for many devices.

These tools don’t replace conversations, but they give you clear alerts, activity reports and the ability to set safe boundaries.

Smart monitoring allows parents to monitor search terms, videos and app downloads; receive alerts for unsafe behaviour; and get detailed activity reports.

In addition, options such as location tracking allow you to define safe zones for your children and receive real-time alerts if those boundaries are crossed. Children can share their location through the mobile app.

All of these safety features – and many more – are available from Norton’s comprehensive protection for your devices and online privacy.

 

Protect Kids from Online Predators at Home

UNICEF says that keeping children safe online also relies on parents and caregivers maintaining open communication; using technology to protect children; spending time with them online; and encouraging healthy online habits

  • Talk regularly and openly: Start conversations about online life the same way you’d talk about who your child plays with in the street. Ask gentle questions: who are your friends online? What games do you play? What apps do you use?
  • Agree house rules: Device-free zones (dinner table, bedrooms at night), time limits for play, and rules about sharing photos or personal information.
  • Use parental controls: Industry tools such as Norton Family and Norton 360 offer activity monitoring, content filtering, screen-time limits, location supervision and alerts for risky behaviour. These tools help you set boundaries while still allowing kids to explore.
  • Co-play and co-view: Sit with younger children while they play online and encourage older children to show you new apps and settings. This builds trust and gives you a live view of who they interact with.
  • Check privacy and friend lists: Make sure profiles are set to private, review followers and friends together, and remind children never to share addresses or phone numbers in chats.
  • Watch for signs: Increased secrecy, sudden changes in behaviour, new devices or new online friends that appear overnight are all red flags.

 

Balancing Safety and Privacy

Monitoring doesn’t mean spying. Explain to your child why you’re using parental controls and that the aim is safety, not punishment. As children grow, shift from more direct monitoring to regular check-ins and shared agreements about responsible online behaviour.

Quick checklist for parents and grandparents (bullet list for snippet targeting)

  • Have an open conversation about online risks this week.
  • Set simple house rules for devices and sharing.
  • Install parental controls and review activity reports weekly.
  • Make social profiles private and review friend lists together.
  • Know how to report abuse to the app/platform and to local authorities.
  • Keep devices in communal spaces for younger children.

 

Before our world became as digital as it is today, parents only had to worry about their children’s safety in the physical environment. Today, we have to be concerned about online predators that can access our homes through our digital devices.

This is all a lot to think about, so why not let Vox and Norton take care of it for you with our comprehensive and proactive suite of solutions?

We’re here to help you keep your children safe in the online world for as long as possible without becoming another statistic.  Please click here for more information.

 

“Making the decision to have a child is momentous. It is to decide forever to have your heart go walking around outside your body.” ~Elizabeth Stone, author

mother 2935723 1280 | Vox | Protect Your Kids from Online Predators

 

Frequently Asked Questions

How can I tell if my child is being groomed online?
Look for signs such as secrecy around devices, sudden new friendships, unexplained gifts, changes in mood or sleep, or attempts to isolate the child from family. If a child is using private messaging apps or deleting chat histories, take note and ask open, non-judgemental questions.

What do Norton parental controls actually do?
Norton Family and Norton 360 provide content filtering, web and search supervision, screen-time controls, social media monitoring, location supervision and alerts for unsafe behaviour. They produce activity reports so you can spot potential problems early.

Will parental controls invade my child’s privacy?
Used thoughtfully, parental controls are a safety tool. Be transparent: explain why you’re using them, involve your child in setting the rules, and gradually reduce monitoring as your child demonstrates responsible behaviour.

At what age should I set up parental controls?
Start young, because even pre-schoolers benefit from basic content filtering and supervised access. For older children, combine tools with conversation and digital literacy lessons so they understand safe behaviour.

What should I do immediately if I suspect grooming?
Stay calm, listen to the child, preserve any evidence (screenshots, chat logs), report the account to the platform, and contact local authorities or child-protection organisations for guidance.

Where can I get help in South Africa if I need to report abuse?
Report serious threats to the police (SAPS) and the platform where it occurred. Seek support from child-protection organisations and trusted local counselling services.

 

 

How To Manage Your Digital Footprint

Protect your personal data – how much key information are you really exposing?

Wherever there are people, there are those who decide to prey on them – this is true for the digital world just as much as the physical. And so, before you take the fun-looking quiz that popped up in your social media feed, think twice – and learn how to manage your digital footprint!

Do you really need to know what your ‘spooky Halloween’, ‘Harry Potter alter ego’ or ‘professional wrestler’ names are, based on a combination of – let’s say – your birth month, the first letter of your name, your street address details and the name of your pets / children?

It’s clear how easy it is to start building up personal information about you based on some of those details.

Most of us have had these seemingly innocent quizzes popping up on our social media feeds at some point. But the software program that’s going to send back the amusing ‘answer’ based on the personal information you shared… might just be a hacker.

Individual pieces of data may seem harmless, but when collected, they can tell a detailed story about your habits, preferences and even personal details like your birthday or location, which allows cybercriminals to go deeper into your online profile for their own personal gain.

Let’s look at ‘digital footprints’ and how much personal information you are actually exposing to the underworld.

 

Footprints Across the World Wide Web

Manage your digital footprint
Learn how to manage your digital footprint!

 A digital footprint means the trail of data you leave when using the Internet, and it can be used to track a person’s online activities and devices. Internet users create their digital footprint either actively or passively, through everyday activities that create it such as social media, browsing, shopping, apps and location services.

The types of data being exposed includes personally identifiable information (PII) such as a phone number or ID number, your financial data, browsing and shopping habits, location tracking, and metadata, including information about your device, your IP address and cookies. Your digital footprint can be used legitimately enough for targeted advertising, when companies use your data to categorise you and show you personalised ads; as well as for data analysis, when companies use technology to collect and analyse this data to build profiles about you – let’s say to offer you better service as a customer.

More sinisterly, though, a comprehensive footprint makes you an attractive target for hackers and scammers and puts you at risk of identity theft and scams. And everyone should be aware that your reputation and potential employment can also be affected, because your online activity can be seen by potential employers.

We look at how to reduce your online footprint.

 

Active Versus Passive

laptop 614213 1280 | Vox | How To Manage Your Digital Footprint

Active digital footprints take place when the Internet user has deliberately shared information about themselves. They include:

    • Social media posts, comments and messages;
    • Emails and newsletters you send and receive;
    • Online purchases and shopping history; and
    • Website content you upload or download.

 

Passive digital footprints are created when information is collected about the user without them being aware that this is happening. They include:

    • Internet browsing and search history;
    • Location data from your phone or devices;
    • Data collected by cookies on websites; and
    • Information from apps and wearable devices.

 

Online Privacy Tips to Protect Your Personal Data and Reduce Your Online Footprint

shield 9553555 1280 | Vox | How To Manage Your Digital Footprint

Here are some tips for protecting your personal data and help you to manage your digital footprint.

  • Double-check your privacy settings on social media to control who sees your posts.
  • Use search engines to check your digital footprint: You could contact the site administrator to see if information about you that you find can be removed. You could also set up Google alerts to keep an eye on your name.
  • Avoid oversharing on social media: Think twice before revealing your location or travel plans, or other personal information like your phone number or email address.
  • Avoid unsafe websites: Make sure you’re transacting with a secure website – the URL should start with https:// rather than http:// – the ‘s’ stands for ‘secure’ and indicates that the site has a security certificate. There should also be a padlock icon to the left of the address bar.
  • Don’t send personal information on public Wi-Fi: A public Wi-Fi network is less secure than your personal one.
  • Delete old accounts: This reduces your exposure to potential data breaches.
  • Create strong passwords and use a password manager: Using a password manager will help generate, store and manage all your passwords in one secure online account.
  • Don’t log in with Facebook: Every time you sign into a third-party website using your Facebook credentials, you give that company permission to mine your Facebook user data.
  • Keep software up to date: Cybercriminals can access a victim’s devices and data by exploiting vulnerabilities in software. You can help prevent this by keeping your software up to date.
  • Review your mobile use: Set a passcode for your mobile device, and when installing an app, read the user agreement. Is the app possibly going to mine personal data like your email, location and online activities?
  • Act fast after a breach: If a financial loss is involved, contact your bank or credit card provider. Change passwords that might have been exposed.
  • Use a VPN: Using a virtual private network, or VPN, can help safeguard your digital footprint. This is because VPNs mask your IP address which makes your online actions virtually untraceable.

 

Digital footprints matter because cybercriminals can exploit your digital footprint, for example using it for phishing for account access, or creating false identities based on your data. You can’t erase your digital footprint entirely, but you can control its visibility.

Why not use the steps outlined here to look at your online presence today and see how you can make your digital footprint more manageable, to better protect your online privacy and yourself?

Keeping your digital privacy in South Africa (and around the globe) safer and more secure will help to keep your banking and other details private and therefore safer, in turn bringing you increased peace of mind.

The message is clear: no more funny quizzes to find out your Harry Potter alter ego, because there’s nothing at all magical about being hacked.

Vox has teamed up with Norton to help individuals and also families to stay safe online – you can block hackers from accessing your devices, keep your online activity private and better protect your identity.

 

Frequently Asked Questions

What is a digital footprint?
A digital footprint is the trail of information you leave online from actions like social posts, searches, purchases and app use. It includes active data you deliberately share and passive data collected about your device, location and browsing habits.

Why does my digital footprint matter?
Your digital footprint can be used for personalised services and ads, but it also makes you a target for scams, identity theft and reputation risks — for example, employers or fraudsters may view or use that information.

How can I check what’s in my digital footprint?
Start by Googling your name, checking social profiles, and using Google Alerts for your name. Review privacy settings on social sites and request removal from sites or directories that publish your personal details.

What simple steps help manage your digital footprint?
Limit what you share on social media, tighten privacy settings, delete old accounts, use strong unique passwords with a password manager, and avoid logging into third‑party sites with Facebook or Google where possible.

Are online quizzes and personality apps safe?
Many quizzes ask for pieces of personal data that, when combined, can be exploited. Treat them sceptically — don’t give out real birthdates, ID numbers, addresses or your mother’s maiden name for a bit of fun.

How can I protect personal data on my mobile device and apps?
Set a passcode or biometric lock, check app permissions before installing (location, contacts, microphone), update apps and the OS regularly, and avoid using public Wi‑Fi for sensitive transactions unless you use a trusted VPN.

What should I do if my personal data is exposed in a breach?
Act quickly: change passwords, notify your bank or card provider if financial details were involved, enable two‑factor authentication, and monitor accounts for unauthorised activity or identity fraud.

Will a VPN and password manager improve my digital privacy?
Yes. A reputable VPN masks your IP and helps protect activity on public networks, while a password manager generates and stores strong unique passwords — together they significantly reduce your exposure when managing your digital footprint.

 

Costs of a Data Breach to Your South African Business

Money, reputation, customers: A cyberattack is costly in multiple ways

It’s estimated that cyberattacks will cost the South African economy R2.2 billion in 2025. That’s according to a recent Vodacom Business report, which revealed that 80% percent of South African businesses had experienced a cyberattack during 2024.

These are incredibly high numbers.

Firstly, the fact that 8 out of every 10 local businesses was attacked last year underscores the persistence and determination of cybercriminals as they attempt data breaches.

As for the resultant costs of a data breach – R2.2 billion – these add up in a number of different ways, both directly and indirectly.

 

cost 1174936 1280 | Vox | Costs of a Data Breach to Your South African Business

Firstly, there’s the ransomware that must be paid if the cybercriminals succeed in breaching an organisation and encrypting its data. The attackers then demand a ransom to provide the decryption key and restore access, sometimes threatening to leak stolen data if the payment isn’t made.

Even if the organisation pays the ransom, this is not always a guarantee that the decryption key will be handed over. It seems that there isn’t always ‘honour among thieves’.

In addition, there will be incident response and recovery costs to pay, with significant expenses for hiring in consultants to carry out recovery efforts, forensic investigations and system restoration.

But these direct costs aren’t the end of the story – indirect costs are also incurred as a result of a successful cyberattack.

This includes through operational downtime, leading to lost productivity and revenue; reputational damage, causing potential new customers choosing to go elsewhere; and legal and regulatory costs, with companies facing possible fines from regulatory agencies for failing to protect sensitive data (and there may even be lawsuits from affected parties).

 

Costs of a Data Breach in South Africa

cyber 3324202 640 | Vox | Costs of a Data Breach to Your South African Business 

Over the past two years, advancements in artificial intelligence and machine learning have equipped cybercriminals to orchestrate and successfully execute sophisticated cyberattacks. From phishing, malware, ransomware, identity theft, hacking, social media fraud to social engineering, cyber threats are no longer simply a technology problem but a business problem.

South Africa is no exception – we were recently ranked as being the number 1 target for cyberattacks in Africa. No matter its size, every business is a possible target for cyberattackers[1].

Other frightening statistics include the following:

  • 40% of ransomware attacks in Africa recently occurred in SA; and
  • We also claimed 35% of infostealer incidents across the continent.

 

Factors contributing to SA’s #1 position as most attacked country in Africa include:

  • A lack of cybercrime investment;
  • Ineffective law enforcement prosecution; and
  • Lack of awareness.

 

Cybersecurity incidents on government bodies, such as the South African Weather Service and the National Health Laboratory Service, and well-established brands like Dis-Chem, show how vulnerable local organisations can be in the face of these rising threat levels.

 

How to Reduce the Expected Cost of a Data Breach

Organisations that proactively reduce their attack surface and improve recovery capability materially lower the potential cost of a breach. Focus on four priority areas:

Prevent

  • Deploy layered defences (endpoint protection, firewall, email security and web filtering).
  • Train staff regularly on phishing, social engineering and secure practices.
  • Apply strong access controls and multi-factor authentication.

 

Detect

  • Implement continuous monitoring and logging to identify anomalous behaviour quickly.
  • Use managed threat detection services where in-house capability is limited.

 

Respond

  • Maintain a tested incident response plan with defined roles, communication templates and escalation paths.
  • Engage forensic and legal partners on retainer to reduce response time.

 

Recover

  • Ensure immutable, tested backups and documented recovery runbooks.
  • Use segmented network design and least-privilege policies to limit lateral movement.

 

Protecting Your Organisation from Cyberattacks

cyber security 1784985 1280 | Vox | Costs of a Data Breach to Your South African Business

firewall is your network’s first line of defence against the cybersecurity threats of the public internet. You could think of firewalls as the gatekeepers to the public internet for your network users, filtering out threats and enabling them to connect safely to the sites and applications where they need access to do their work.

Existing as both hardware and software, firewalls are designed to restrict access to your organisation’s sensitive data while helping you monitor your network for suspicious activity.

Too many organisations still see cyberattacks as an irrelevant global problem, not a high-risk local threat. It’s imperative to make sure that your company has the necessary defence mechanisms in place, starting with identifying the risks and implementing an incident response plan.

Contact Vox and Sophos to find out more about how we can assist you.

 

Frequently Asked Questions

What is the typical data breach cost for South African businesses?
Data breach cost varies widely, but South African firms face direct and indirect losses including ransom payments, recovery, legal fees and reputational damage, often totalling tens of thousands to millions of rand.

How does ransomware affect data breach cost?
Ransomware dramatically increases data breach cost through demanded payments, extended downtime, forensic investigations and possible double extortion, as well as the risk that paid ransoms do not yield reliable decryption.

Are small businesses in South Africa at risk of cyberattacks?
Yes, small businesses are frequent targets. This is because limited budgets, weak defences and lack of awareness make them vulnerable, increasing the likelihood of high data breach cost and reputational harm.

What are the most common cyber threats facing South African businesses?
Phishing, malware, ransomware, identity theft and social engineering are most common, driven by AI‑enhanced tactics and posing major challenges for cybersecurity South Africa across sectors.

How much does operational downtime add to the overall data breach cost?
Operational downtime can multiply losses through lost revenue, reduced productivity and contractual penalties, often matching or exceeding direct remediation costs in severe incidents.

Is paying a ransom a reliable way to restore data?
No. Paying a ransom is risky, because attackers may not provide decryption or may demand more, and paying can increase overall data breach cost and legal or ethical complications.

What indirect costs should businesses anticipate after a cyberattack?
Anticipate indirect costs like reputational damage, customer churn, regulatory fines, legal claims, increased insurance premiums and long‑term loss of market trust, all contributing substantially to data breach cost.

What practical steps reduce data breach cost and improve cybersecurity in South Africa?
Implement firewalls, regular backups, employee training, incident response plans and patch management; invest in monitoring and third‑party partnerships to lower data breach cost and strengthen cybersecurity South Africa defences.

 

 

 

[1] Source: Newzroom Afrika

Enabling People Through Technology

People of Vox: Spotlight on Natalie van der Merwe

“Technology is best when it brings people together.” ~ Matt Mullenweg

As the Vox Head of Products: Telephony, Natalie van der Merwe is another long-serving Vox employee who embodies so much about what makes the company great. She’s smart as a whip, innovative in her thinking, excited about technology and how it can empower people’s lives, and an all-round ‘Just Plain Nice Person’ who is loyal to the core. As such, she embodies many of Vox’s values and is a great fit within our ‘work family’.

Natalie also played a significant role in facilitating remote and hybrid working arrangements for so many Vox customers when Covid struck the world in 2020 – more on this later!

Having joined in July 2008, she’s now clocked up 17 years at Vox and is surprised to find that the next big milestone – 20 years – isn’t that far off. Let’s dive into Natalie’s pathway at Vox.

 

The Journey to Date

“The great growling engine of change – technology.” ~ Alvin Toffler

“I feel like I’m part of the furniture at Vox now,” says Natalie with a smile when we talk about her recent 17-year work anniversary. “Actually, no – not part of the furniture, because the furniture’s come and gone more than I have!”

Natalie cropped2 | Vox | Enabling People Through Technology

She explains that “Telephony is just another word for PBX, really. So it’s always been PBXs since I started with Vox, with my role and the parameters changing over time.”

Natalie started at Orion Telecom, in 2008, which was then bought by Vox. Before that, she’d been in the PBX industry since 2000. “When I joined, I discovered that, while Orion was trying to get into the PBX industry, they were still very newly in this space, so I was able to put my experience to good use in helping to build up this new side of the business.”

Since then, says Natalie, Vox has probably offered its customers over 10 different types of PBX solutions while she’s been on board. Her passion and talent meant that she moved swiftly from starting out as a PBX Product Manager to becoming a Senior Product Manager, and then promoted to Head of Products: Telephony.

 

From Hardware to the Cloud

“Our business is about technology, yes. But it’s also about operations and customer relationships.” ~ Michael Dell

62bad55ed7d2e1904f805d38 phone | Vox | Enabling People Through Technology

“When I first started in this industry, even before my Vox days, telephony was very much a hardware business,” says Natalie. “A PBX was something that you sold – it got installed at the customer’s office and everybody could see, touch and feel it. And then we had an evolution!

“I remember that I was about two or three years in at Vox – around 2010 / 2011 – when we launched our first cloud PBX, which was challenging for me at the time – and no doubt for most of my industry peers – because I’d never been involved with cloud PBXs previously But, as technology marches continually forward, we made the shift.”

Natalie clarifies that from Vox first starting to sell cloud PBX systems, up until early 2020, there was still a significant amount of hardware being sold. “However,” she notes, “at the same time, there was also a serous chip shortage globally, which was a really big issue, because many of the components of the products that I sold needed these chips to function.

“Simultaneously, the word was starting to spread about the advantages of cloud telephony options, with its features that included video calls, remote working and mobility. And then, of course, Covid arrived, with the result that everything just speeded up – significantly!”

Before the first whispers of a frightening new global pandemic started doing the rounds in early 2020, Natalie and her team had already been looking into cloud PBX options, which was to prove highly fortuitous.

 

The Covid Pandemic Kicks Cloud PBX into Play…

“What new technology does is create new opportunities to do a job that customers want done.” ~ Tim O’Reilly

remotwork Covid 5071617 1280 | Vox | Enabling People Through Technology

“I’d started looking at a couple of cloud PBX competitors, and we’d done some testing. I’d even started out some research and development (R&D) projects before Covid loomed. And so, when it did arrive, we were able to move very quickly, launching around July / August 2020.

“When you think that we went into lockdown at the end of March that year, it was just four months later that we were able to launch and offer our customers fully tested and researched cloud PBX solutions to help South Africans continue working remotely, as efficiently as possible.”

Four months is an astonishingly short timeframe in which to launch a new product!

Natalie continues: “We sold our first PBX solutions as semi-cloud. After that, in just under a year, we went completely cloud-based, and we haven’t looked back! It provides all the functionality to facilitate ease of remote working, and everything a business needs for unified communications, with its core components of voice calling, messaging and video conferencing.

“Those phrases were such buzzwords just 10 years ago, but they really started coming into play in South Africa for us during Covid. At Vox, we were very proud to be able to help South African businesses and individuals carry on thriving during Covid and beyond. Having the right technology and tools really can make life better.”

 

On the Home Front

“Innovation is the outcome of a habit, not a random act.” ~ Sukant Ratnakar

Moving away from Natalie’s work persona, we find that she has an interesting heritage, with her father being South African ‘to the core’, and her mother born in Italy. Natalie herself was born in the small Karoo town of Beaufort West, where she lived with her parents for the first year of her life.

“My mom came over with her parents on a ship from Italy – as you did in those days – when she was about four or five. I’ve gone over to see where she originally came from, and where my grandparents lived, which was very special. “I’m also married – to my high school sweetheart – and we have a beautiful 15-year-old daughter who keeps us very busy, as all teenagers do.”

Besides doing some very worthy charity work in her spare time, Natalie relaxes and unwinds with a group of friends who all like to craft. “We get together every couple of months to do something creative. So far it’s involved a lot of painting, for example we’ve painted welcome mats, canvases, bags… We’ve also tried out lipstick making, a macrame class, making chocolate truffles and doing ‘zentangling’… It’s nice to just de-stress and have a good laugh with your friends.

20250826 174138 resized | Vox | Enabling People Through Technology

“I still do ‘zentangling’ in my spare time, which is so much fun! It’s actually just scribbling, but you get patterns and you create… Instead of scrolling on my phone at night, I grab a book and the zentangling is a great way to clear my mind a little bit.”

IMG 20250215 WA0009 resized | Vox | Enabling People Through Technology

Natalie works from home three days a week and is at Vox’s Johannesburg head office for the other two, an arrangement that suits her. “It’s great to have the option of really getting through my work while I’m at home,” she clarifies, “but those couple of days in the office also serve to re-connect with my colleagues, and experience the company’s energy and friendly vibe. I’m very fortunate to work with team members who are very hands-on and helpful, and always happy to learn new things.

“I think that Vox’s employees are one of the company’s greatest strengths – our culture is one of hard work, but also being prepared, always, to reach out a helping hand whenever anyone has a need.”

And of course, it’s partly thanks to Natalie and her team that Vox employees – and customers – have the option of being able to work from home in the first place, using Vox’s cloud-based telephony and unified communications solutions!

 

A Constantly Evolving Journey

“It’s not that we use technology, we live technology.” – Godfrey Reggio

As well as Vox’s friendliness and family vibe, Natalie appreciates the company’s culture of innovation, its agility and senior management’s open-door policies.

“In a way it never actually feels like I’ve worked for the same company all this time, because there have been mergers and acquisitions, new CRM systems, and of course an ever-evolving succession of new product offerings. Within our industry, technology changes so quickly that sometimes it’s challenging to keep up.

“It means that yes, you’re on your toes, but it also means that you’re always offering, or preparing to offer, something relevant. The next thing is always coming along, which is fun and enjoyable. And so that’s a great thing about my job – there’s never a dull moment, and my work is always interesting!”

Natalie believes that the world is at the next phase of a massive change with the advent of artificial intelligence (AI).

“This will affect the work of anybody who’s selling tech and services – it’s the next evolution! And in the technology world, if you’re not on the bandwagon with what’s happening, you’ll be left behind. If Vox had never launched that first cloud PBX, where would our telephony division be today?”

“Technology like art is a soaring exercise of the human imagination.” – Daniel Bell

 

Natalie art 1 | Vox | Enabling People Through Technology

Your Company’s Telephony Needs: the Right Choice

Considering the differences between traditional and hosted PBX

Even in today’s digital business world, Voice remains a key element in the overall communications offering, and so it’s important to make the right choice for your company’s telephony requirements. This includes whether to choose traditional on-premises PBX or hosted PBX (in other words, cloud solutions).

Being able to speak to a person – rather than engaging with a chatbot or following text-based or voice-activated instructions – allows both a customer and the organisation’s representative the chance to convey the right tone of voice, which sometimes means the difference between a successful sale or retained customer, or lost possibilities. Talking over the phone can also help to build good customer relationships.

In this article, we consider the differences between traditional PBX and hosted Voice. Both options can provide effective and reliable company phone systems that offer different benefits, and each have pros and cons for different business scenarios.

Before we go into more detail on the different telephony systems, let’s look at different factors to take into consideration.

 

Questions to Consider for your Business

Phone with hand resized | Vox | Your Company’s Telephony Needs: the Right Choice

When it comes to choosing your Voice communications platform, there are many things to factor in, such as the size of your business, existing infrastructure, budget constraints, the number of remote offices, the level of your technical expertise, your tolerance for being dependent on service providers, and more.

And so, when trying to decide between traditional PBX or hosted Voice, you could ask yourself the following questions:

  • Budget: How much money is available and what’s your preferred purchasing model?
  • Maintenance and upgrades: Does your business require full control of your business phone system or will a managed service model be workable?
  • Scalability: Do you foresee significant changes in your number of employees in the future?
  • Security and compliance: Are your IT staff capable of maintaining the system?
  • Features and futureproofing: Does the system of choice offer modern features, or can it adapt to emerging technologies to ensure long-term relevance?

 

Bearing these issues in mind, we next discuss on-site (traditional) PBX versus hosted PBX options.

 

On-site PBX: Where It All Began

Alcatel Lucent | Vox | Your Company’s Telephony Needs: the Right Choice

Private Branch Exchange (PBX) has been used for decades between employees and customers, with the PBX hardware installed on-site. The business purchases and owns the phone system hardware, networking and server equipment, and your IT staff take care of all the updates and maintenance regarding the system. The calls are routed through traditional phone lines as well as SIP trunking[1].

  • Budget: On-premises PBX systems usually require a higher initial investment in equipment and installation costs, and maintenance and upgrades will also need to have costs factored in.
  • Maintenance and upgrades: On-premises PBX systems require on-site technical support. This can lead to operational disruptions and additional labour and parts fees.
  • Scalability: Expanding an on-premises PBX can often require physical hardware or licensing additions, which could lead to incompatibility issues between the current PBX version and the latest software updates, resulting in costly, unplanned upgrades or system downtime.
  • Security and compliance: On-premises PBX systems allow companies to directly manage the security policies of their hardware but are more susceptible to data breaches if these policies are not managed correctly. This includes risks from outdated software and weak passwords. On-premises PBXs also require physical security measures to protect them from unauthorised access. This would include secure rooms, surveillance and restricted access, which in turn could be more costly and complex to manage.

 

Key takeaways: On-premises PBX systems can be more suitable for larger corporations with big budgets and space to host the physical hardware, as well as having the resources to manage and maintain the system. Housing the PBX system on-site brings an organisation maximum control over business communications, which might be a better fit for companies with complex and / or secure communication needs.

 

Hosted PBX

PBX Featured resized | Vox | Your Company’s Telephony Needs: the Right Choice

A Hosted PBX solution is a telephony solution where the PBX infrastructure is hosted in the service provider’s Cloud or network. Instead of using traditional phone lines, it relies on internet connectivity, more commonly known as VoIP (Voice Over Internet Protocol).

  • Budget: Cloud PBX generally involves a lower initial setup cost because it needs minimal physical infrastructure. Due to economies of scale, providers can offer Cloud PBX services at a nominal monthly fee, making it cost-effective for businesses with limited capital, and easy to budget for with a predictable monthly fee. A reliable Internet connection is a critical core cost factor.
  • Maintenance and upgrades: A cloud-based PBX system is maintained and upgraded by the service provider, and this remote management makes sure your cloud solution is always up to date with the latest features and security patches, with minimal downtime for the business.
  • Scalability: A hosted PBX solution allows businesses to add or remove services as needed, providing greater flexibility and cost savings without software compatibility issues or platform limitations.
  • Security and compliance: With cloud PBX solutions, it’s the responsibility of the vendor to ensure that the systems adhere to the latest security standards and compliance regulations, including the Protection of Personal Information (POPI) Act. Most cloud PBX providers implement advanced security measures to protect the data and prevent intrusions.
  • Redundancy: With the PBX in the cloud, a reputable vendor will implement multiple layers of redundancy, which are not available with on-site PBX systems. These include platform replication across geographically distributed data centres, redundant network paths between data centres, automatic failover mechanisms, and continuous system monitoring to aid in ensuring high availability and minimising the risk of service disruption.

 

Key takeaways: Due to ongoing advancements in Cloud technology, Cloud PBXs offer more advanced features than traditional PBXs, without the complexity of on-site installation and maintenance. They provide higher cost savings, minimal hardware requirements, and a wide range of useful functionalities. Cloud phone systems also allow your employees to work remotely, enabling employees to stay connected from anywhere they have internet access.

 

Your Business Communications and Vox

When it comes to the choice between traditional on-premises versus cloud PBX systems, there are many things to factor in, such as the size of your business, your organisation’s technical expertise levels, the number of remote offices, your preference for in-house or managed service providers, and more.

Whatever your preferences and requirements, Vox has a solution geared to assist your company, and its present and future needs. We look forward to hearing from you for more information on choosing the best PBX offering for your organisation.

[1] Session Initiation Protocol (SIP) trunking is a digital method of making and receiving phone calls and other digital communication over an Internet connection.

Heading Up the PMO with Leadership, Presence and Empathy

Meet our Experts: Spotlight on Nathaniel Govender

At Vox, we value, support and actively engage people with the levels of expertise that we require to keep us moving forward as a company. In this edition of ‘Meet our Experts’, we find out more about Nathaniel Govender, who is the Executive Head of the Vox Project Office (PMO). Known to friends and colleagues alike as ‘Nate’, he is softly spoken and gentle of manner, but always driven to achieve.

Perseverance, persistence and overcoming personal challenges are all part of the journey for Nathaniel. From starting out as a call centre agent in Vox to achieving the level of one of the company’s directors, he is proof that at Vox, talent is always empowered to rise to the top.

Despite some significant difficulties along the way, Nathaniel has never allowed obstacles to suppress his optimistic outlook on life, or dampen his determination for too long.

We take a look at his story and unpack what drives him.

 

Ensuring a Strong Career Foundation

Nathaniel is another of Vox’s longstanding employees, having joined the company in 2005 and then going on to clock up 20 years of loyal and innovative service. Today, he says, his role centres on providing strategic leadership and operational oversight for all customer orders in progress – in other words, the ‘projects’ that give the PMO its name – which are sold across the company.

“I’m responsible for defining the vision, structure and governance of the Project Management Office, while also leading its execution. Ultimately, I hold full commercial accountability for the financial performance of all active orders within Vox,” he explains.

Before joining Vox, Nathaniel’s career evolved through a range of operational and leadership roles that gave him a strong foundation in customer service, technology and project delivery.

He clarifies: “While based at a previous company, I started out as a Call Centre Agent, where I developed a deep understanding of customer needs and frontline operations. I was later promoted to Call Centre Manager, taking on team leadership, performance management and process improvement responsibilities, and from there, I transitioned into the role of IT Manager.”

As IT manager at this organisation, Nathaniel led the implementation and support of critical systems, aligning technology with business objectives. These experiences, which included customer service, operational leadership and IT, equipped him with a holistic understanding of business operations, which he was later to carry forward into more strategic roles, culminating in the founding of the Projects Office at Vox.

However, the trajectory of Nathaniel’s relatively smooth career path was to hit a significant bump when, in late 2004, he experienced a cruel setback in his professional life.

 

Never Give Up…

“I’d love to say that my journey into Vox was a carefully planned progression driven by a passion for operational excellence, customer delivery and technology,” notes Nathaniel wryly, “but the truth is a bit more unexpected. While serving as an IT Manager, I arrived at work one morning to find the office locked and the business liquidated – and just like that, I was out of a job!”

Determined to continue moving forward despite this blow, Nathaniel searched online for the top IT companies in the country, and DataPro (later to become part of Vox) stood out for him.

“I took a chance and sent my CV to the generic info email address,” he outlines, “and to my surprise, I received a reply from the CEO the very next day, referring me to their Helpdesk Manager. That’s how my journey with Vox began: starting over as a Call Centre/Helpdesk Agent. Since then, I’ve grown through the business, eventually founding and leading the Project Management Office in 2016, where I was able to combine everything I’ve learned along the way.”

Nathaniel clarifies that one of his main challenges with the PMO is managing complexity at scale. “Each project involves multiple stakeholders, tight deadlines, shifting priorities and technical variables, often all at once,” he says.

“No two days are ever quite the same, but a typical week for me includes maintaining visibility across multiple active orders while simultaneously keeping teams aligned and customers satisfied.”

Nonetheless, he faces and deals with any challenges in a balanced manner and is highly skilled at staying on top of things while presenting a calm and reassuring manner.

 

Overcoming Obstacles  

And staying with the topic of challenges, Nathaniel is open about having to overcome some personal obstacles along the way in achieving his current position at Vox.

“One of the biggest was obviously starting over from the bottom, after previously holding a senior role, when I re-entered the workforce as a Call Centre/Helpdesk Agent at Vox. It was a humbling experience, both professionally and personally, but it taught me resilience, adaptability and the value of perseverance. Another challenge was proving myself in a new environment without relying on titles or past roles. I had to rebuild professional trust, credibility and influence from scratch.”

To rebuild his credibility within a new organisation, Nathaniel focused on consistently delivering results, being solution-oriented, and never losing sight of long-term growth: “Even when the day-to-day challenges felt like a step backward! However, when I look back, I see that these experiences built the foundation for my leadership today. They made me more empathetic, grounded and driven to create opportunities for others to grow, no matter where they start.”

When we delve deeper into Nathaniel’s personal history, his ability to rise up from challenges makes sense.

He explains: “I grew up in the small, lively town of Tongaat on Durban’s north coast, proudly South African through and through! My heritage is a colourful mix of Indian and Cape Coloured roots, and I was lucky to be raised in a warm, tight-knit community where family came first, hard work was second nature, and there was always a plan B (and sometimes a plan C) thanks to plenty of resilience and resourcefulness.

“That upbringing shaped my character and taught me to never take opportunities for granted. It instilled in me a deep commitment to leading and serving with empathy, staying grounded, and embracing continuous learning and adaptation: qualities that have guided my career and continue to define my leadership journey today.”

Outside work, Nathaniel has always had a passion for the outdoors and sport.
“Growing up, I spent countless hours playing with friends, and that love for activity has stayed with me. These days, I’m an avid padel enthusiast and currently on track to qualify with my Padel MBA, something I’m incredibly excited about!”

(Editor’s note: We mentioned at the beginning of this article that Nathaniel has a gentle manner, but perhaps the one exception is on the padel court, where he is known to take no prisoners! He remains softly spoken though – a gentleman always… )

Nate on padel court | Vox | Heading Up the PMO with Leadership, Presence and Empathy

Moving Forward

There’s an old saying that goes: ‘Every cloud has a silver lining’, and perhaps it’s not too fanciful to imagine this silver lining shining quietly over Nathaniel on that long-ago day when he arrived at his place of work, only to find the doors shut and barred. After all, if not for that rudest of terminations, he might never have landed up working for Vox, which, he says, has been a uniquely rewarding experience.

“What truly sets Vox apart from other ISPs in South Africa is its entrepreneurial spirit, agility and hunger to challenge the status quo,” notes Nathaniel. “We’re not weighed down by too much red tape or legacy thinking. Instead, Vox is constantly looking for ways to disrupt traditional models, whether it’s through bundling services in new ways, leveraging emerging tech, or delivering faster, more responsive support.”

Nathaniel is part of this innovative thinking within the company, and he really enjoys helping others in the workplace to also achieve their true potential.

He explains: “I take immense pride in mentoring and growing people, helping others step into leadership and taking ownership of their work. I’m passionate about building leadership capacity and empowering the next generation of leaders.

“Creating a culture where people can grow, take ownership, and innovate with confidence is important to me – I really enjoy seeing ideas and people transformation come to life. There’s real satisfaction in building something sustainable, not just in terms of projects, but in terms of culture, capability and customer trust,” he concludes.

Vox Fibre Frenzy!

The Fibre deal that actually makes sense

William Shakespeare once said, “what’s in a Frenzy?”

(Spoiler – he didn’t. But, then again, we hardly know what he’s saying most of the time anyway.)

shakespeare 6102162 1280 | Vox | Vox Fibre Frenzy!

 

Question, though – what IS in a frenzy?

Is it the frenzied breakdown when you told your boss you completed a presentation (you didn’t) and they ask for a copy (which you don’t have) and you’re trying to ChatGPT your way to success? Or is it that random Teams request from the CEO with no context (and the three days of nail biting preceding it)? Or is it being late, not connecting to a meeting, rushing for a deadline or just streaming your favourite season finale when, BOOM, Murphy invokes his Law and you meet the dreaded cry of dead Wi-Fi?

Actually; it’s none of the above. At least not today. So let’s step back from the fearmongering for a second.

You see, at Vox, Fibre Frenzy isn’t Fibre Inducing Frenzy situations – but rather getting caught up in a promo so crazy, it can’t be anything BUT a Frenzy.

frenzy resized ai generated 8528080 1920 | Vox | Vox Fibre Frenzy!

What You Get with Vox Fibre Frenzy

Let’s break it down:

With the Vox Fibre Frenzy, you enjoy:

  • High-Speed, Uncapped Fibre (because who has time for loading screens?
  • Prices dropped to as little as R400pm* (previously? It was R490)
  • Free installation? You got it (another saving. May as well be a superhero).
  • Month-to-month options available.
  • Smart support – so you’re never left wanting when your router gives you the stink eye.

 

How it Works (Three Easy Steps)

  1. Pick your FNO (Fibre Network Operator) — check which networks cover your area.
  2. Choose your line speed — from everyday browsing to heavy streaming and gaming.
  3. Sign up, wait for installation, and get connected.

The catch? There is none – just solid internet and a good deal.

What hiccoughs can I expect?

Other than the risk of struggling to keep up with your line speed (it can be THAT fast if you want it to), the promo is FNO/Line Speed Dependent (in non-tech terms: depends on which Fibre Network Operator is available in your area). Oh, and of course, Ts & Cs Apply (don’t they always?).

Naturally, it’s a limited time offer – so make fast (unlike your old ADSL line). That being said, if your area is covered and you’ve even given a spare thought to upgrading your line, now’s your time to shine.

Who Is This For?

If you work from home, binge-watch without shame, run a small business, game competitively, or simply refuse to watch a single spinning wheel, then this is for you. Vox Fibre Frenzy fits households and businesses wanting fast, flexible Fibre internet that South Africa trusts.

The long and short…

We live in a world where even buffering can feel like a personal attack. Whether working, playing, gaming, binge-watching, side hustling or juggling a house full of Internet demon-kids, you never DON’T need fast and stable Internet.

Gamer resized | Vox | Vox Fibre Frenzy!

And with the price of everything (except, strangely, the Rand) going up lately, these huge savings aren’t just nice – they’re necessary.

And did we mention free installation? We meant it.

So, why sign with Vox?

Every ISP promises you Fibre. One step further – they all promise the same keywords (super-fast, reliable, uncapped, blah blah blah). Vox, however, actually delivers it (plus adds world class support and a multitude of option add-ons – think failovers, voice, and more). Plus, our team won’t ghost you once your Router is plugged in.

One could even say that the Frenzy isn’t just about the price – but rather about finally having Internet that’s *worth it*.

Call us Greta Thunberg, because we’re right royal philanthropists.

Our Fibre Frenzy Promo is one of those sweet, unscripted moments where everything just feels right. It’s cheaper. It’s faster. It has all the support you could need. And it’s just so worth it. Remember, though, this deal isn’t here forever. It’s a promo. And, as promos do, it will end. Probably right as you decide to sign up – so maybe try not losing out instead?

Check availability and sign up at vox.co.za — or call our Fibre Specialists on 087 805 5050 for personalised help.

Peace.

 

Quick FAQ
Is the R400pm price available everywhere?
No, the offer hinges on FNO-dependent availability, meaning that pricing and package options depend on FNO coverage in your area. Use our availability check.

Can I add failover or voice later?
Yes, failover and voice add‑ons are available so you can scale your service as needed.

Are there contracts?
We offer month‑to‑month options. Specific terms vary by package, so please read the Ts & Cs.

Our Queen of Customer Service and Caring

People of Vox: Spotlight on Bandi Maduna

At Vox, we believe our employees are the beating heart of our company, with merit and value built into all our available positions. In this edition of People of Vox, we meet Bandile (Bandi) Maduna, who works in the Johannesburg Head Office premises as a Receptionist. Bandi doesn’t just get compliments from satisfied customers – sometimes they go out of their way to bring her coffee and muffins, and even flowers! Now that really says something.

There’s something special about amazing customer service, especially when you’re on the receiving end of it. As the world saves time by moving towards service via chatbots, smart apps or telephonic voice prompts, there are still times when talking to a person is the ultimate end-goal.

Here at Vox, our Johannesburg Head Office Receptionist Bandi (Bandile) Maduna is famous for her warm and wonderful way with people.

In this edition of ‘People of Vox’, we shine the spotlight on Bandi and how she has perfected customer service into an art form.

Bandi office view | Vox | Our Queen of Customer Service and Caring

 

When the Warm Words Keep on Coming

The secret to Bandi’s successful ways with people isn’t a secret at all.

In fact, it’s very simple: she just really likes dealing with people and is always inclined to give them her very best efforts. In turn, she seems to bring out the best in the people she’s dealing with.

Bandi explains: “I deal with phone calls that come in, as well as walk-in queries and deliveries. I could find myself assisting on insurance and payment issues, as well as follow-ups on the status of a technician call-out. I’m always happy to help by trying to move a customer’s challenge along.

“This could include helping the customer to pay on the Vox portal, or following up to find out if a technician is en route. I really enjoy dealing with our customers and trying to help them with their queries or challenges, to move towards an outcome.”

In essence, one of Bandi’s strengths is making people feel that they are being heard. Perhaps this is why she gets the compliments that she does.

smiley 2979107 1280 | Vox | Our Queen of Customer Service and Caring

Here are just two of the warm words that customers went out of their way to pass on via email:

I must compliment your lady at the front desk, Bandi. She was most friendly, calm, efficient and immediately put me in touch with the person I needed to speak to. In my opinion, Bandi is an amazing ‘first face’ to engage with when arriving at your office. I thanked her on my way out, and I hope you pass this message on to her.

AND

I was welcomed by the switchboard operator, Bandi, in the most professional, warm, welcoming, efficient manner. Bandi was extremely polite and assisting. I give lots of praise to this wonderful employee of yours.   

And then there was the time when a satisfied customer dropped in to bring Bandi coffee and a muffin – topped only by the person who once brought Bandi flowers!

When people in today’s busy world go out of their way to say ‘thank you’ like this, taking time and effort, you know that the service must be well deserved.

Bandi behind desk 2 | Vox | Our Queen of Customer Service and Caring

 

A True People Person and Life-Long Learner

Perhaps Bandi’s skills are also rooted in her deep understanding of ‘Ubuntu’ – the belief that ‘a person is a person through other people’ – with its underlying principles of interconnectedness, kindness, and the importance of community and relationship.

Heritage | Vox | Our Queen of Customer Service and Caring

“I regard myself as being a typical Zulu,” she says. “I was born in Ladysmith in Kwazulu-Natal, and I grew up with a deep respect for Ubuntu – for giving back and being part of your community. When I joined Vox, in 2009, I think this came through in my first job, where I was a tea lady. I spent my days going from desk to desk at set times with a trolley so that I could bring some of the Vox office workers beverages at regular intervals – tea, coffee, water – and in that way allow them to concentrate on their jobs.”

It would not be too long before Bandi, who is versatile and always open to new challenges and responsibilities, was able to start moving into different positions within the company. She completed a course in facilities management, and became a facilities team leader in 2014 and was able to showcase her leadership skills in this role.

Bandi’s people skills began truly coming to the fore in 2016, when she spent time at the front desk as a reliever for the then-receptionist – proving to be so good at this that she was able to begin working in a full-time position in reception the following year. Another highlight was when Bandi became the personal assistant to the chief financial director, which again spoke to her skills with people as well as her organisational abilities. Today, she still assists the current Vox CFO, Gert Koen, by doing various insurance claims for him as part of her duties.

Bandi adds: “I’m always eager to gain knowledge and learn new things. I am open to new challenges, and I like being versatile. I’m very grateful to Vox for giving me opportunities to use my skills in different ways. Vox has also paid for me to do two different one-year courses, to help me with my learning aspirations and my workplace skills. I have completed an administration course through Damelin, as well as a project management course through Boston City Campus.”

While she regards herself being as a lifelong learner, Bandi also notes that it hasn’t always been easy. “You could say that I am a BBT – ‘born before technology’ – and I did find parts of my project management course very challenging, when it was online during Covid,” she explains.

“I was ready to give up, actually, and here I am so grateful to our HR Director, Pam McLeod, who supported and encouraged me to keep going. I am also very grateful to Trudy Truscott for believing in me; she took me from being a tea lady to a facilities manager and receptionist, and she is still my line manager today. She has been very supportive at all times.”

Creative with Her Hands

Away from work, Bandi remains busy in her spare time with her hobbies, which include cooking, crocheting, knitting and making soap.

Bandi kitchen | Vox | Our Queen of Customer Service and Caring

“I like using my hands,” she says. “Recently, I began taking some of my unused plastic bags to make them into a crocheted welcome mat for the entrance to my home. And I enjoy making soap from scratch, which I often scent with ingredients such as cinnamon and lemon juice, and give to my friends and family as gifts from time to time.

“I also like taking part in ‘isipheko’, which is a traditional custom of bringing food or other provisions to a family or community during celebrations or periods of mourning, and which is also part of the spirit of Ubuntu.”

Bandi says she has experienced this same spirit of warmth and community working at Vox, which is another reason why she has been with the company now for 16 years.

“I am grateful to be part of an organisation that takes care of its clients as well as its employees. I find Vox as a company to be very reliable, with a strong ethos of caring and humanity. I think this is very much a distinguishing feature of Vox, and I’m proud to be associated with this constant theme of caring, mixed in with humour and humanity.

“I love working for Vox – I always like to say that ‘My blood is green!’ and am very grateful for all the opportunities that the company has given me,” she concludes.