The Benefits of Cell Boosters Go Beyond the Obvious

Estimated Reading Time: 3 Minutes

We all need a little boost sometimes. When your cell signal feels out of reach, we’ve got the perfect solution to save the day.

We’re more dependent on mobile phone technology than ever before. At last count, according to Statista, 36.45 million South Africans accessed the Internet via smartphone. That number is expected to grow to 43 million by 2026.

In 2019, there were 53.4 million smartphone subscriptions in South Africa, according to ICASA, and 100.6 million mobile connections made in 2021. Over 62% of the population uses the Internet, while 94.6% of that group access the Internet using their phones.

We rely on our smartphones for everything from calls to video chat, email, banking and search, not to mention streaming music, GPS navigation and scrolling social media. Without our phones, most of us truly feel lost. In fact, when we find ourselves without signal, most of us truly are…

While there are myriad reasons you could be experiencing crummy cell signal – including everything from your distance from a cell tower to cell tower congestion, the types of building materials you’re surrounded by and, yup, the weather, there’s very little your network provider can do to help.

But, here’s the good news: you’re not completely powerless.

Cell Boosters – What Are They, Really?

While they won’t create a cell signal for you, where there is one available, you can rely on a cell booster to amplify it.

Basically, there are three main components to a cell booster – an outside antenna draws the weak signal in, where an internal device cleans and amplifies it (there are no prizes for guessing, it’s called an amplifier) before sending it to an internal antenna for rebroadcasting, with all three elements connected by coaxial cable.

It sounds simple enough, right? But it can be tricky to find the right components that’ll work best for you, not to mention ones that are ICASA-approved and won’t mess up the cell signal for everyone else around you.

Once you do, you’ll be able to enjoy the benefits of a boosted 2G, 3G, 4G LTE and even 5G signal on your connected devices as those bars go up.

A Boost for You

Before you get started on your cell signal booster journey, it’s important to understand what you’re working with in terms of signal strength to begin with.

The cell booster antenna you choose will depend on the signal strength outside your home.

If the signal is strong outside, but for some reason there’s nothing but dead zones everywhere you go inside, you might want to opt for an omni-directional antenna to pull signal from multiple carriers.

If your outdoor signal is weak to begin with, a uni-directional or Yagi antenna is usually your best bet as they’re designed to pull signal from the nearest tower for a more focused signal strength and reach further than an omni-directional antenna.

With a strong, steady cell signal, not only will you be able to enjoy crystal clear call quality with no dropped connections, but you’ll also be able to make the most of your LTE data speeds with lightning fast 3G, 4G and even 5G connections.

A Boost for Business

As mentioned above – we’re all reliant on our phones for pretty much every decision-making process these days and this is especially true when it comes time to make a purchase.

If you’re in retail, it’s worth considering improving the quality of your cell reception for those who wish to Google information about your products as they’re adding them to their shopping trolley.

The more customers you have in store, the more likely you’ll find yourself having to deal with signal congestion and the right cell booster solution could result in making more sales and creating happier customer experience overall.

Somebody Call 911 – an App for the Worst Case Scenario

911 – what’s your emergency?

If you’re lucky, you’ll never have to hear those faithful words. However, based on the fact that in the USA alone, more than 2.7 million calls (or one every 11 seconds) to 911 were made, you can never rule out needing help in an emergency.

The numbers aren’t better closer to home, as any South African (or ex South African posting angry statuses from New Zealand) can attest to. Looking at just Gauteng, the average cases by year are shocking:

  • Shoplifting/Commercial Crime: 593 205
  • Theft/Burglary: 126 844
  • Murder/Assault/Robbery: 177 737
  • Housebreaking: 260 000

We have some of the highest crime rates in the world and, as such, face our own share of risks on the daily. Sadly, many of us have come to accept that calling a hotline may not be the fastest or most effective means of getting help. People in danger often need an immediate response – and taking the time to explain the problem to an operator may cost you precious seconds.

Most of us have been in a situation where that split second could have made all the difference – both during said emergency and afterwards. And, in those precious moments (particularly in an accident), the knowledge that a loved one is on their way makes a world of difference.

Enter Vox 911, an app designed to make the ‘worst-case scenarios’ a tiny bit easier.

The app essentially turns your smartphone into a portable, easy to access mobile panic button AND tracking system, meaning not only can you sound the alarm, but the relevant individuals can easily locate you no matter where you are. You can raise the panic system within seconds (it literally takes the touch of a button) and, whether an accident or the sound of an intruder in the house, the relevant authority will be instantly notified.

It’s not a case of your loved ones only finding out later either. You’re able to load multiple family members under a single account, who can then receive SMS notifications the moment an alert is sent out. The 911 member just has to press the speed-dial button to be connected to our Vox911 Call Centre, which then uses caller ID to identify who you are and let your listed recipients know.

Medical, roadside assistance, armed response (yes, we have a team, and they’re pretty capable), it doesn’t matter – they’ll be dispatched and en-route as soon as you need them.

From help at the click of a button to location tracking, voice recording and 24/7 availability, you can rest assured that we’ve got your back should you ever need it. And, let’s face it, any parent with kids can rest easier knowing that should disaster strike, they won’t be left sitting in the dark.

You’re probably wondering which of your cars you’ll need to mortgage to afford this service? Please, this is Vox we’re talking about, and your safety shouldn’t cost an arm and a leg. Users can choose between month-to-month and 24-month users from as little as R118.75pm (including VAT) – a small price to pay for what’s essentially your own personal response team.

Truth be told, nothing will ever prevent the inevitable, but you can be prepared when that worst-case scenario does arise.

Vox Fibre and Cloud Services to Bring More Value for SA Businesses

Having achieved great success in the Fibre to the Home market, integrated ICT and infrastructure provider Vox is looking to build on these strengths by expanding their push into the Fibre to the Business market with bundled offerings that are designed to bring more value and savings to local companies in a tough economic environment.

The Covid pandemic and resulting intermittent lockdowns – together with the looming threat of loadshedding – have resulted in a paradigm shift in business, with many having to adopt remote working policies, which includes adopting solutions to make their onsite data and applications more widely available and finding innovative ways of synchronising their IT support with a remotely connected workforce.

“While they might use multiple methods of connectivity to access their applications and data remotely, having a fibre line as the primary means of connectivity ensures a higher level of reliability.,” says Jacques du Toit, CEO at Vox.

According to Barry Kemp, Head of IaaS at Vox, the levels of efficiency, consistency and ease of access all play a role in determining the overall success of a brand, and Fibre to the Business provides the stability, consistency and low latency required to ensure this. Other noticeable benefits for businesses includes:

  • Enhanced speeds: any efficient organisation thrives of speed – whether it is for accessing data, uploading, downloading, sharing files or exchanging information – and using Fibre to access cloud-based services is the best way of boosting organisational productivity
  • Reliability: in a digital age, your business can’t afford to be disconnected, and a Fibre line ensures less downtime, meaning more consistent delivery.
  • Security: while some organisations are hesitant to shift to the cloud (and remote working) due to security concerns, Cloud in most cases is more secure than on premise and with Vox Fibre you are able to run a secure virtual network between your office and the Vox Cloud.
  • Cost: In the long run, users of a combined cloud and Fibre package have noted more cost-effectiveness, more room for scalability, increased ease of access and general improvement in quality control – in essence letting them do more despite spending less.

“Why would you purchase a premium cloud solution and not supplement it with tools to maximise its performance? Our Fibre Solutions are to Cloud what the perfect engine is to your vehicle. Optimised for efficiency, growth, and flexibility, they’re also systemically designed to enhance your overall experience,” says Kemp.

Co-location as a first step

According to Du Toit, with the increasing preference for work from home – or in some cases a hybrid model that blends remote and office based working – businesses are downscaling their office space and are looking for alternatives to hosting servers on their office premises. For those that have decided not to keep their infrastructure onsite, there are a host of options available, including co-location at a data centre, hosted virtual servers, or increasingly a hybrid of the two.

With Co-location, organisations are provided with rack space within state-of-the-art data centres that adhere to international standards and include redundant connectivity and power supply to ensure that they always remain connected to their business critical IT infrastructure. This is ideal for organisations that need to sweat their existing IT investments, or have policies that require certain types of data to be stored within their own environments.

Making cloud work for business

For those who want to move away from maintaining their own IT infrastructure, the Vox Virtual Data Centre offers a truly elastic virtual data centre that offers organisations a virtualised pool of cloud infrastructure and resources including compute, memory, storage, licensing and networking – helping boost day-to-day productivity, capacity planning and management.

Data shows that up to 30% of cloud migrations rolling back, and over 80% resulting in budget overruns largely because they are not scoped correctly, and Kemp adds that Vox has adopted a three-step process – Assess, Migrate, Manage – in order to ensure organisations have the right information, services and skills to make a successful transition into the cloud.

“Vox provides organisations with advice and guidance in order to maximise their IT infrastructure investments. We now offer multiple infrastructure solutions that can be used to mitigate many of the challenges that businesses are facing and to improve their overall IT – allowing them to concentrate on running their business,” says Du Toit.

Home Security Cameras – Your Smart Home Must-Have

Shop Wi-Fi Security Cameras

Your home is your castle, and in the 21st century, the right home security cameras will act as your high-tech moat. It’s a little more subtle, but it works.

Smart home tech is on the rise.

Sure, we’re not quite living in the future the Jetsons had us believing we would be just yet. But we do have fridges that let us know when the milk is about to expire and apps that allow us to control the lighting and temperature in each room of our home.

And that’s just for starters.

According to Statista, spending in the smart home industry will top 170 billion US dollars by 2025, with over 400 million smart homes globally.

If we had to choose the most exciting innovation in smart home tech, it would have to be the home security camera.

Whether you’re a homeowner, renting a place or looking to keep an eye on your holiday home, there’s a security camera solution to suit every need.

The products themselves will only get better. And renting home security cameras is the easiest way take advantage of those tech upgrades. Renting gives you the flexibility to scale your solution up or down without blowing your budget.

Wired vs Wireless Wi-Fi Cameras

When it comes to home security cameras, you have three main types to choose from. Wired cameras connect to the Internet via Ethernet cable, wireless cameras connect directly to your Wi-Fi network, but need to be connected to a power supply. Wire-free cameras don’t need any cabling at all, they rely on batteries for power and connect via Wi-Fi.

Of the three, wired cameras offer the most stable connections, but need professional installation. Wireless and wire-free cameras are a lot more DIY and a great solution if you’re renting or looking to add security somewhere temporarily.

After that, you’ll need to decide if you want indoor or outdoor surveillance or both. Outdoor cameras need to be durable enough to deal with a range of temperatures and weather conditions, and this is where an IP66 rating (or higher) makes all the difference.

Security Cam Essentials

So, you’d like add security cameras to your home. The good news is, as mentioned above, there’s a home security camera to suit every home and need, indoors and out. Not only are they great for acting as a deterrent to potential thieves and intruders, they’re also allow you to keep an eye on your home, inside and out in real-time, at the touch of a button via your smartphone.

There are a few non-negotiables worth keeping in mind, though. The first: image resolution. If you can’t see what’s happening on screen, what’s the point of having a camera? Never settle for anything less than full HD image quality at 1080p – this way, you’ll always have a clear view of what’s going on.

It’s also a good idea to choose a camera with a wide field of vision to give you the big picture and the best idea of what’s happening in your surroundings at all times. Better still, opt for a camera with pan/tilt functionality and zoom capabilities so you never miss a thing.

While we’re on the subject of image quality, placing your cameras in well-lit areas is also key to ensuring you get the clearest view possible. To keep an eye on your home 24/7, infrared lighting and anti-glare are essential to staying in the know and out of the dark.

The Nice-to-Haves

Having a range of storage options to choose from also ensures you’ll have access to the footage you need, when you need it. While some cameras include the option of saving footage to a microSD card or your own network via a Network Video Recorder (NVR), most suppliers will offer encrypted cloud storage on subscription. The best solution? A device that offers all three storage options for the ultimate backup and redundancy.

What if your camera not only allowed you to hear what was happening outside, but talk back too? And it included a booming siren and strobe light as added deterrents? Look no further than our Wi-Fi Cameras.

Our Guardian Eye range of home security cameras check all the boxes and include all the (sometimes literal) bells and whistles but remain accessible via a choice of rental plans to suit almost any budget.

Because there really is no place like home.

Let’s Talk the Future of Fibre to the Home

We’re halfway into the new year, and if there were any doubts as to whether WFH would be a passing phase or permanent part of our working world, we’re pretty sure even the most staunch advocates for keeping things the way they were have accepted it’s permanence.

In fact, if this pandemic has taught us anything, it’s that not only is Home Fibre resilient enough to handle unforeseen demands on its potential, but connectivity has also gone from being a luxury to a necessity. Between remote work, learning, education and entertainment, the increased emphasis on staying-at-home has meant employees and employers alike can’t afford to be disconnected.

Key to that connectivity is, naturally, a Fibre-Based symmetrical connection. Your home network can’t be relying on outdated connectivity methods, and we’ve learned to embrace the security, speed and convenience of said Fibre so much, it’s actually become an economic development tool essential to business success.

But what comes next in the world of FTTH? What can we expect, what do we foresee and what does tomorrow hold?

We’ll attempt to unpack that (and more) below – so let’s get going.

Well, since the onset of Covid-19, almost every single FNO has provided additional value to the customer at little to no extra cost. Not only have line speeds doubled (mostly at entry level), we’ve also seen a wealth of ISP’s completely doing away with lower-end products. The starting point from an entry level perspective for many standard FTTH packages is now 20mg and up. Why, you ask? It’s because of supply and demand – as demand has gone up, so too have the packages offered.

This increased demand for Fibre to the Home has also seen the introduction of higher product packages (from 500mg to even 1 gig lines). Essentially, the pandemic has taken everything we thought we knew about Home Fibre and turned it on its head. Whereas before stay-at-home would have been boredom, a hike in library fines and flat out console wars, 2020 was the age of Netflix, remote businesses, and streaming. No other time in human history could have ushered in an almost universal need for better home connectivity – meaning even the most optimistic wouldn’t have predicted the post-Covid-19 demand for FTTH solutions.

But forget the past – what comes next?

Well, the industry is starting to learn that despite people working from home, they still need business like Fibre services with similar speeds, resiliency, and security. We’re beginning to see the first strains of Fibre to the Home and Business crossovers with the introduction of SSME products, and all signs point to an opportunity for the consolidation of these two resources in times to come.

Also in the pipeline are plans to make Fibre more accessible to lower LSM markets. While this doesn’t mean installing lines in areas where users don’t even have smart devices, it does involve the incorporation of concepts such as pre-paid Fibre (rather than monthly retainers) which allow for more downloads, streaming and Internet for the casual yet lower income user.

The reality is that the adoption of any new technology always comes with a risk. Aside from doubts about long term effectiveness, the shelf-life of any technological innovation is generally relatively short (just ask Apple). The thought of an expensive outlay on something new only to have to upgrade again in a few years is enough to put anyone off making a shift – but this doesn’t apply to Fibre.

In fact, few things offer up the certainty of Fibre-based Internet systems. On the contrary, we believe that these systems are still a long way from reaching their full potential. Not only is Fibre to the Home a sure-fire future-proof solution, it’s the today and tomorrow of private and business connectivity.

We’ve learned that Fibre lines can handle insane demands without having their speeds affected by line capacity. In fact, ISP’s have been ramping up their offerings to step up and meet demand accordingly. To this day, nobody has ever managed to push a Fibre line to its limit – it’s only restricted by your package and bandwidth, but the potential for growth is pretty limitless. The gigabit speeds offered by Fibre are not limited by the line’s capacity. As these devices continue to evolve and speeds inevitably get faster, you’ll see things will ramp up to meet the new demand.

The technology is not going to suddenly become outdated – especially within the next decade (at last). Your speed and experience is really only restricted by the equipment driving it, but whereas conventional forms of connectivity (such as copper) was never designed to transmit large amounts of Data and tend to degrade over longer distances, the low latency features of FTTH means less delays during transfers – making it a perfect tool for communication, distance learning and live collaboration (as well as accessing the Cloud).

While the concept of FTTH is still in its early stages, the technology has been around far longer – and there’s a reason this has been the backbone of communication across the world since its inception. Furthermore, it’s almost impossible to be tampered with by thieves or criminals, meaning Fibre remains the fastest and safest way to transmit Data.

As far as we’re concerned, the future of FTTH started yesterday, and with the digital online revolution we predict only good things to come. Be it the introduction of new, value-added service offerings or improved speeds, packages and bundles, your home or brand is guaranteed to be propelled into tomorrow with ease.

All you need to do is ensure your package measures up.

Back Up or Back Out: How Data Storage can Save your Business

Lately, it seems like everyone from T-Mobile to Uncle Cyril is learning about external business threats the hard way.

Seriously, with Virgin Active being hit, we normal folk need to be on high alert. If it were us, we’d hack something a bit less dangerous like the National Chess Association, but messing with the gym queuing system at 5am just shows that cyber criminals are not playing around.

The scary part, however, is that it’s not only distant businesses from faraway lands which are being targeted.

Here are some of the biggest (and most notorious) hacking scandals of the last year alone.

  • In Jan 2020, Travelex needed to be pulled offline due to Malware attacks.
  • Estee Lauder: 440 million (think of how many that is) individual records were released.
  • Mitsubishi: their May 2020 Data breach led to their missile designs (we know!) being stolen.
  • Google: They mitigated the largest attack in history, a 2.54 Tbps DDos.
  • Home Depot: this US Retailer had to pay a $17.5 million settlement to release their Data.
  • ABSA: A rogue employee led to personally identifiable customer information being leaked.

But our personal favourite? The revelation that 10 000 South African Android Users were identified as being compromised just last month. We know, it may sound like doom and gloom, but we’re not one for the ostrich method of burying our heads in the sand – Data theft is real, and unless your business has about $17.5 million to pay on ransom fees (in which case, look us up), a breach in safety could also be the endgame. And we don’t mean the cool Avengers vs Thanos type either.

Okay, cool – but that’s just digital, and I have a Firewall. So what must happen?

Well, the last few years have been challenging, with many organisations struggling to stay afloat even prior to the pandemic. Enter the incredibly disruptive socio-economic climate we still find ourselves battling today, and pretty much everyone has had to rethink their business models.

Covid-19 happened. Level 5 happened. Eskom happened. Things stabilised, then came back in December. They went away. They came back. As if that weren’t enough, the third wave made an appearance in July, along with some new restrictions from Uncle Cyril. Well, it can’t get worse, right? Wrong. Enter looting and riots, which had a devastating impact on KZN and a knock-on effect on other provinces, almost bringing the country to its knees. It felt like the end times, but thankfully we survived – yet that week alone cost an estimated 0.7% of our National GDP in damages.

Be it strategy, operations, the supply chain or ground staff, everything changed, yet as South Africans we have this inherent ability to rebuild, work smarter and establish a way to persevere. In fact, we thrive on competitiveness and an opportunity to be resilient, so on we push.

But what does any of this have to do with Data Storage?

Well, all these events have served only as a reminder of the fragility of running a business. In a second, things can change. Be it the Macro-environment, political landscape or a hacker behind a keyboard, our business world is vulnerable and faces ever-looming threats on all sides.

With this in mind, it is paramount that organisations operate with the mindset of intelligent solutions which can withstand said external circumstances.

It’s one thing to rebuild, but how can we do it smarter?

This is not for the sake of making more money, but rather to lay a foundation capable of handling any future turmoil.

Consider, for example, the damage caused by looting. These events have shown us that the old ways are completely perishable, and as such we should now strive for the ability to connect from anywhere, anytime and pick up where you left off – or, better yet, being able to instantly recover your business information in the event of disruption (with minimal interference). The goal of any brand should be resilience and non-dependence on external circumstances.

How many times have we as a nation heard the words “my fellow South Africans”, and had our entire economic landscape turned on its head (literally overnight)? It’s been long enough and frequent enough that the ability to continue working on short notice and allowing normal service to resume should be a natural part of the process.

In fact, an informed organisation is one which looks at current events and asks itself how technology, software and intelligence can play a role in protecting itself moving forward.

The answer, of course, lies in the Cloud (and no, we don’t mean going to heaven)

Designing an effective Cloud strategy not only reduces your costs and allows for accessibility, flexibility and scalability, but also incorporates the principles of backup and recovery as part and parcel of its foundations. You as a business can access your info whenever, wherever, which has become the most fundamental component of ensuring that today’s business even has a tomorrow.

If anything, the recent disruption has forced us all to introspect while propelling our humble nation on a similar trajectory as its first world counterparts (when it comes to Cloud, at least). One of the most remarkable things about this entire pandemic was that it created an almost level playing field – changing mindsets, circumstances, ushering in a universal era of adaptation.

We’ve written a million words about Cloud (which you can find here), but an empowered modern business cannot afford to overlook the most modern solution available.

Whereas the brands of yesteryear needed a strong physical presence to survive, today’s organisations require the ability to flip the switch and keep moving forward. It’s tough enough running a business without the added damage of Data Theft, breaches or damage.

We’ve all learned some hard lessons these last few years but, for us, the one that stands out most is that information is priceless – and so too is the need to protect it.

Vox Security: Level Four

Kia Motors. CD Projekt Red. CNA. Virgin Active.

It may sound like a list of our favourite brands, but these are just a few household names who’ve been hit by cyber-attacks in 2021 alone. With one occurring every 11 seconds and damages estimated to hit $6 trillion this year alone, the recent barrage of Ransomware attacks is enough to keep anyone awake at night.

The reality is that every industry faces its share of challenges – particularly when it comes to crime.

In retail it would be theft, hijacking, looting and so forth. These have been around for generations and, while nothing new, there are ample safety measures and protocols in place to not just avoid them, but minimise damage incurred should they happen.

However, the digital world is different in that threats are varied and ever evolving.

The reality of this has come to the forefront of conversation as a result of Cyber Attacks on some of the world’s biggest brands. From the Irish Health Service to Virgin Active SA and beyond, these industry titans were guaranteed to have some of the best defensive software, yet even they found their walls breached. It’s a scary reality and, with both Internet usage and Ransomware Attacks at an all-time high, many a brand finds itself at a crossroads.

The key issue is that these are far less in-your-face than dangerous hotspots or screaming attackers. Perpetrators are calculated, skilled and experts in circumventing many a previously impenetrable defense. Day-by-day, their craft evolves, and security specialists the world over are forced to deal with previously unseen challenges.

Enter Security Level 4, which is designed to not only counter security threats, but detect them before they even occur.

Top of our list are threat feeds, which work with a concept called Zero Day. Think of the Delta Variant of Covid-19 – a new, previously unseen virus with seemingly no cure. When coming out the blue with no warning, it can be impossible to diagnose or get rid of, but Zero Day technology is the digital equivalent of a clairvoyant vaccine. Zero Day feeds systemically work to detect brand new viruses, malware or phishing threats that haven’t been seen before. Rather than wait until these have breached your security and leave everyone scrambling for a solution, this ability to pre-emptively detect and deflect these threats means you don’t have to end up a victim of cyber crime to avoid its effects moving forward.

This isn’t some pie-in-the-sky theory either, as some of the biggest Zero-Day threats in the last few years have occurred to some pretty surprising organisations:

  • In 2021, Google Chrome suffered a series of breaches which caused the platform to issue malicious “updates”. This was made possible by a bug in their V8 JavaScript engine, which was first identified, then exploited.
  • In 2020 (as if we weren’t going through enough) a vulnerability in Zoom allowed hackers to remotely access user’s PC’s if they were running an older version of Windows. These hackers could then access files and Data or just take over the PC completely if they desired.
  • Similarly, Apple iOS (which was considered impenetrable by many) fell victim to at least two sets of vulnerability exploitation, including a bug which allowed iPhones to be compromised remotely.

In fact, as little as a week ago, our own President Cyril Ramaphosa discovered spyware on his personal cellphone which allowed him to be spied on (in addition to about 34 other world leaders). So, if you think you or your brand couldn’t be a target, the reality is quite the contrary – but these issues can be avoided with relative ease.

The solution, of course, lies in the correct software.

At Vox, we also advocate for a platform called Kiuwan, which analyses your code and diagnoses what’s wrong with it. Not only this, it detects bugs, increases efficiency and allows you as a user to regulate specific standards in adherence to protocol.

This rolls over into Digital Security, with specific emphasis on IOT and Mobile Devices. Level 4 of our Security not only protects your devices (be it mobile or PC), firewalls and information, it expands into the territory of security, monitoring and web applications. When accounting for operational technology (such as Guardian Eye or Webcams), this software ensures that your devices can’t be breached. We’ve all heard horror stories of webcams being hacked into and innocent people spied upon (no, it’s not a myth, it even happens with phones), but Level 4 is capable of securing your security measures.

Furthermore, the technology also delves into Web Application Firewalls, which in turn protect your websites from being hit (this is done through Fortinet). Combine this with our Penetration Testing, which lets you scan websites, detect issues and safeguard vulnerable areas, and you can tighten up both your brand and personal security in the blink of a (Guardian) eye.

Gone are the days where the biggest threat to our devices was a misplaced laptop bag or a cell phone snatcher at a restaurant. As technology and education has evolved, so too have the propensities of those seeking to exploit them. Thankfully, however, there are still heroes who are willing to face these threats head-on, in doing so providing the man or business in the street with the equipment required to do the same.

Security Level 4 is all about Device Security, protecting your Websites, Code and Threat Feeds. Whether a large corporate or company focused on user awareness training or just an average Joe who fears the worst, there’s a solution within our solutions that can make your Online Security impenetrable.

It’s Time to Get Proactive About Data Protection

Knowing where your data is stored and who has access to it is absolutely crucial for doing business in the age of data privacy regulation. Welcome to Vox Security Level 3.

These days, Cyber Security is about more than just making sure your data is safe from encryption and Ransomware demands – that said, as cyber-attacks continue to take down everyone from international cloud service providers to Northern Ireland’s entire healthcare system and everyone in between, those are definitely still a concern – it’s also very much about maintaining the integrity of the sensitive, private or personal information you rely on for day-to-day business operations.

With the PoPI (Protection of Personal Information) Act now in effect in South Africa, a data breach that threatens to make public the private, personal information of your customers and clients won’t just result in embarrassing headlines and reputational damage for your company, but also a hefty fine or possible jail time or both – for you.

As we continue to transition to hybrid work solutions and conduct most of our lives via apps and cloud computing, putting proactive procedures in place to know exactly where your most valuable data is stored and who has access to it should be a vital component of your Cyber Security plan.

It All Begins with Data Discovery

Modern work environments need to remain flexible to survive whatever the world may throw at them next – but this means Cyber Security teams need to worry about an exponential number of endpoints (from company laptops, to employees’ personal smartphones and tablets), external servers, databases and shared files when attempting to protect the integrity of sensitive or regulatory data and remain compliant with government regulations.

Most often used for data analytics, data discovery involves collecting and connecting structured and unstructured data from multiple sources (individual PCs and laptops, shared drives, social media), assessing it’s importance to the company as a whole, categorising it and placing it into context both manually and via business analytics tools.

All data is not created equally.

Once you’re able to place your most sensitive business data into context via Information Rights Management, you can begin to implement a successful Data Loss Prevention strategy that won’t bring your business to a standstill with time-consuming privacy policies and permissions put in place for every user.

Locking That Data Down

With a data loss prevention strategy in place, your security experts will be able to monitor the protection of everything from personal information to intellectual property and financial records whether it’s in use (via the endpoint), in motion (travelling via your network) or at rest (stored in the cloud).

To ensure your data loss prevention strategy is effective, protocols should be put in place to monitor and prevent the loss of sensitive data leaving your network across everything from downloads to external hard drives, email attachments and cloud storage.

Knowing what type of information you have, where it’s stored and how it’s being used will strengthen your ability to protect it and the integrity of your company by helping to prevent data leaks from happening intentionally, or, more often than not, accidentally, and having devastating consequences for you and the future of your business.

Taking your Security to Level Two

Access control. Vulnerability scanning. Firewall assessment.

You may be wondering what’s the need for such a drastic topic? We can almost hear you thinking “I’m just a casual Internet user, not the Pentagon, why are you wasting my time preaching about IT, System and Network Access protection?”

But, we ask, just hear us out – because things can get pretty serious if these are neglected.

The term “catfishing” may have gained pop culture status due to the rapid rise of social media and popularity of the MTV show. However, this runs the risk of undermining the severity of online identity theft – especially when it comes to business. Sure, pretending to be someone else can be dangerous for a variety of reasons, but the use of the term in often casual settings goes a long way towards devaluing its implications.

As any fan of The Office could tell you, Identity Theft is not a joke. Millions of people are affected every year. But how serious is it really?

Well, here’s some food for thought…

  • Identity theft really does affect millions:

In 2019 alone, 14.4 million (or 1 in 15) were victims of some form of ID Fraud. These occurred at a rate of 1 every 2 seconds due to an ease of availability when it comes to personal information.

  • Most incidents are a result of Data Breaches or inadequate digital security.

Even a single, fleeting breach of a company firewall could expose enough employee information to make each individual a potential target. What’s the point of stealing our details, you ask? Well…

  • This information is used for a variety of fraudulent activities.

These include tax theft (using your information to get illegitimate tax rebates/returns), taking over bank and retirement accounts to drain your savings or selling your information to other interested parties.

Studies indicate that the average person is more likely to have their identity stolen than their car (yes, even in SA – cyber criminals have no jurisdiction) and, worst of all, victims often don’t even know they’re being hit. These criminals have the tools and the means to access pretty much anyone off guard, thriving on public Wi-Fi (even if it’s password protected), phishing scams and even the tiniest chink in a company’s armour.

This is where Level 2 of our Security Spectrum comes in, which is systemically designed to facilitate the correct protocol around Access Control and Vulnerability Scanning.

So, what is Level 2?

Simply put, it revolves around ID and Access Management to ensure that complete verification of its users is always ensured. The concept places major emphasis on a Zero Trust basis, which essentially deems it necessary for users to identify themselves as who they say there are before either company or general resources can be accessed.

The concept is designed to reduce identity theft and, in doing so, prevent unwanted parties from attaining valuable (and often confidential) information that can put either your organisation or other employees at risk. Not only does it prevent catfishing (so that entry level workers can’t imitate the CEO), it relies on numerous verification steps to maintain ultimate privacy – even going so far as to block access from websites until said verification is completed.

This occurs through the use of multi-factor authentication (so no more Password123 and you’re in), which amalgamates any combo of username, encrypted passwords and SMS/Email verification. It also ties in with Cloud Access Brokers (CASB), which protect both Data within and access to The Cloud. Furthermore, the software can monitor traffic to and from the Cloud to restrict access, protect the information stored within and regulate both incoming and outgoing activity. It also boasts and additional vulnerability scanning software (in the form of Qualys) which establishes weak points in PCs, servers and what can be exploited by hackers before it’s too late.

Any company with a Firewall can benefit from our Security Level 2 offerings. As we’ve established, not only does online identity theft occur by the second, but the information gained by such perpetrators has the potential to derail both individual lives and an organisation as a whole.

Your brand (and employees) can’t afford to be compromised, meaning anything that ensures your information is only accessed by those who are meant to can go a long way.

Every Company’s Cyber Security Must-Haves

These four elements are non-negotiable when it comes to keeping your business safe from cyber harm. We’ve optimised them even further with our Level 1 Security offering.

If you’re just getting in on the ground floor of Cyber Security for your business, or if you’re looking to reinforce that foundation, look no further than Vox’s Level 1 Security offering. Each element has been carefully chosen to provide the ultimate defence against Ransomware – the bane of businesses everywhere, but statistically speaking, small to medium enterprises most of all.

Having a dedicated team of security experts and world-class tech to watch your back might seem out of reach, but by outsourcing this critical component, companies of all sizes can rest easy in the knowledge that their most valuable assets are secure and proactively protected at all times.

How to defend against Ransomware diagram with Vox's Level 1 Security offering | Vox Cyber Security | png

Email Security

Over 306 billion emails were sent and received in 2020, and that number is expected to grow to 376 billion by 2025. It’s no wonder email phishing attacks are on the rise – and becoming more sophisticated by the day. Thanks to its ability to bypass Firewalls, a company’s email acts as the main portal for malware, accounting for 95% of all infections, which means email security should be a top priority when it comes to preventing costly Ransomware attacks.

A dedicated email security solution safeguards against the risk of everything from malware to inbox-clogging spam, phishing emails, DHA (Directory Harvest Attack) and DDoS (Distributed Denial of Service) attacks as accidental data leaks. All of which can bring your business to a grinding halt as your essential data is literally taken hostage/encrypted and held for ransom.

Endpoint Security

This is not your grandmother’s Anti-virus solution. Not only do we offer Endpoint protection across all devices connected to your business, our top level offering, EDR (Endpoint Detection and Response), incorporates AI (Artificial Intelligence) to understand an application’s behaviour, and isolates infected machines while attempting to roll back the attack to discover its point of entry, without having to wait for any software updates.

Where EDR really shines is in the prevention of Zero Day Attacks – where hackers waste no time in finding any unknown software weakness or flaw ripe for exploitation before a patch can be made.

Network Security

Firewalls are your first line of defence when it comes to protecting your network from any unauthorised access and, like Endpoint Security, they’ve evolved to meet the demands made on them by 21st century threat actors.

Next-generation firewalls can provide real-time views into your network activity as well as actionable application and risk dashboards and reports, all without sacrificing any of your network performance. More than just a barrier between your network and online threats, next generation firewalls, are purpose-built and scalable, including everything from VPNs (Virtual Private Networks) for data encryption and remote working opportunities to application control and advanced threat protection.

In the face of a Ransomware attack, a Next-generation firewall cuts malware off at the knees by preventing it from connecting to the hacker’s control server and exchanging encryption keys to begin encrypting your data.

Managed Backup

Should all of the above fail – because anything that can and will happen, usually does – then your ultimate insurance policy against a Ransomware attack is a data backup and recovery plan. By keeping a copy of your data safely stored in a separate location, you’re not only shielding yourself from having to pay ransom for access to your data, with an efficient recovery plan in place, you’re also ensuring business can carry on as usual without the need for costly downtime.

That said, a backup solution is something that needs to be monitored constantly – not only to ensure your backups are error-free and constantly updated, but also to guarantee it’s free from malware too.

Clearly, when it comes to Cyber Security, the whole is greater than the sum of its parts.