The risks inherent in an unmanaged Microsoft 365 environment
Organisations need to rethink their security technology stack and how environments are managed and contained, says Gartner in an analysis of the threat vectors most...
Monkey or tree? The false alarm that’s costing money
Property safety is often a litany of false alarms and fake threats that take up time, cost money and test patience, but, it doesn’t have…
Vox MTN LTE-A secondary location functionality
Work from anywhere. Connect anywhere. Open the worlds of the digital nomad, remote worker and hybrid office with the Vox MTN LTE-A secondary location functionality…
A Managed Network Saves Countless Headaches – Both In and Out of Office
Why deal with the complications of managing your own network, when there’s a much better option available? Hybrid work is here to stay. But, while…
Endpoint Detection and Response – Where Prevention Meets Cure
It’s not a position you ever want to find yourself in, but despite every precaution, cyber incidents can and will happen. Which is why you’ll…
Failover: Connect. Control. Save.
Add LTE connectivity to your current Internet connection so failure to connect doesn’t mean failure to do business IDC describes connectivity as the lifeblood of…
The edge of strategy: where compute redefines service delivery
Edge computing is more than a weighty IT terminology; it is the very tip of productivity and data ingenuity that can energise every organisation’s IT…
Vulnerability Management Makes all the Difference
As the world becomes increasingly interconnected, it’s time to ditch slow, reactive cybersecurity measures for efficient, proactive solutions and long-term risk reduction. There’s no going…
Cyber Awareness Month: The ultimate security pincer movement
Training, penetration testing, vulnerability management and endpoint detection response (EDR) form the four prongs of the security army that will protect against the security enemy…
Active threat hunting a non-negotiable for the modern business
By Richard Frost, Product Head: Cybersecurity at Armata With South Africa being a favoured target for cyber attackers globally, and with the threats growing in…