The risks inherent in an unmanaged Microsoft 365 environment

Organisations need to rethink their security technology stack and how environments are managed and contained, says Gartner in an analysis of the threat vectors most...

Read more

Monkey or tree? The false alarm that’s costing money

Property safety is often a litany of false alarms and fake threats that take up time, cost money and test patience, but, it doesn’t have…

Read more

Vox MTN LTE-A secondary location functionality

Work from anywhere. Connect anywhere. Open the worlds of the digital nomad, remote worker and hybrid office with the Vox MTN LTE-A secondary location functionality…

Read more

A Managed Network Saves Countless Headaches – Both In and Out of Office

Why deal with the complications of managing your own network, when there’s a much better option available? Hybrid work is here to stay. But, while…

Read more

Endpoint Detection and Response – Where Prevention Meets Cure

It’s not a position you ever want to find yourself in, but despite every precaution, cyber incidents can and will happen. Which is why you’ll…

Read more

Failover: Connect. Control. Save.

Add LTE connectivity to your current Internet connection so failure to connect doesn’t mean failure to do business IDC describes connectivity as the lifeblood of…

Read more

The edge of strategy: where compute redefines service delivery

Edge computing is more than a weighty IT terminology; it is the very tip of productivity and data ingenuity that can energise every organisation’s IT…

Read more

Vulnerability Management Makes all the Difference

As the world becomes increasingly interconnected, it’s time to ditch slow, reactive cybersecurity measures for efficient, proactive solutions and long-term risk reduction. There’s no going…

Read more

Cyber Awareness Month: The ultimate security pincer movement

Training, penetration testing, vulnerability management and endpoint detection response (EDR) form the four prongs of the security army that will protect against the security enemy…

Read more

Active threat hunting a non-negotiable for the modern business

By Richard Frost, Product Head: Cybersecurity at Armata With South Africa being a favoured target for cyber attackers globally, and with the threats growing in…

Read more