4 Reasons Why Cyber Security is Not a Tech Problem (it’s a People Problem)

Cybersecurity: It’s Not a Tech Problem — It’s a People Problem

We’ve all heard the term Cyber Security, but the reality is not all of us have tuned in and paid attention. Indeed, there are two types of people; those who listen when the topic comes up, and those who don’t believe it applies to them.

A key reason for this alienation is simple; say the word Cyber Security, and the conversation quickly turns technical. We go from “real threat” to Firewalls, Endpoint, Encryption with no middle ground.

Yes, the above are important, but oftentimes they cut out many people who need to understand the fundamentals. It also distracts from an uncomfortable truth: most breaches are the result of human error, NOT intricate hacking schemes.

Maybe it’s a clink. Possibly it’s a password. Probably someone acted without thinking. Each time, a person. And each time, the real weak point isn’t the system, but rather basic human behaviour.

  1. Human Error = Your Biggest Entry Point:

      Complex exploits and systems breached? Too much work. Most attacks need something far simpler; basic human trust.

      Whether a phishing email or fake login, made up invoices or a call from “FNB”, impersonation attempts are all geared around tricking unsuspecting users into voluntarily providing access. Rather than break the system, they’ll convince you to open the door and say come inside.

      They’re getting better at it too. Many scam emails are almost indistinguishable from their legit counterparts. Websites have genuine domains, and the messages come directly from the people you know (who’ve also been hacked).

      All it takes is a momentary lapse of concentration and they’re in.

      Woman sitting at a desk at night, covering her mouth in shock while staring at a desktop monitor, with a laptop and office equipment visible in a dimly lit workspace.

      2. The Poor Password Problem:

        We’ve created mailers, run webinars, sent out SMS’s and put out social media posts, yet poor password behaviour remains a key Cyber Security weakness (which you, yes you, may be compounding). This includes:

        • Recycling passwords across systems
        • Using easy-to-guess, personally grounded passwords
        • Sharing of info with friends or colleagues
        • Documenting passwords in easy to access places

        All it takes for the Dominoes to fall is ONE breach here. Attackers then usually gain access to multiple systems purely because the details have been repeated everywhere.

        Close-up of a laptop keyboard with a padlock placed on top and a sticky note showing a handwritten password, highlighting weak password security practices.

        3. Security vs Convenience:

        The nature of today’s fast-paced work environment is that everyone is under pressure. We have a constant need to be faster, work efficiently, meet our deadlines and deliver quicky. Sadly, this often leads to shortcuts and a high-pressure situation when safety is NOT the number one priority.

        Have you, for example, ever:

        • Sent important work info via your personal Email as Outlook wasn’t working?
        • Stored important company data on your mobile device?
        • Clicked “skip” on your two-factor authentication because you were in a rush?

        This transcends conventional protection and becomes a discussion of security habits which are sustainable and easy to follow.

        4. Training Beats Tools:

        Many companies go big on Cyber Security software but small on the human element. Regular training and support is as important as a fancy firewall – because there’s no point Norton fighting fires when you have an active match that can’t recognise a dodgy link.

        Well-trained workforces can stop attacks before Tech needs to step in – and that’s a key difference in a time sensitive environment.

        In the end, the best Cyber Security practices are cultural, not purely technological.

        Close-up of an old wooden door with a worn metal lock and latch, symbolising traditional physical security.

        Encourage a workspace where reporting mistakes is acceptable and policies are easy to digest. Leadership needs to prioritise this as much as the team, because organisations who take this shared responsibility seriously are far more resilient.

        The bottom line is that Cyber crimes will always involve tech, but tech alone isn’t enough. There’s always a human behind the system. Someone making decisions, under pressure, clicking links and sending files. And, in most cases, it’s their ability to make those decisions (and the info behind them) which ensures a business stays secure or guarantees it’s the next headline.

        Protect Your Kids from Online Predators

        Some practical thoughts to guide parents and grandparents

        It can’t happen in my home… can it?

        Just because your children are playing online games in the safety of your home doesn’t mean that they are safe from perverts.

        This is the reality of today’s digital world.

        It’s hard to believe, but every parent’s worst worry is now partly digital: how to protect kids from online predators who can reach children through games, apps and social networks in the safety of your own home. This guide discusses online grooming, practical steps you can take at home, and how tools from Vox and Norton™ can help you keep children safer online.

        [Editor’s note: This article comes with a sensitivity warning, particularly for parents, grandparents and other concerned family and friends.]

        According to the United Nations Children’s Fund (UNICEF), in South Africa, according to its ‘SA Kids Online Study’, one-third of children in the country are at risk of online violence, exploitation and abuse.

        • One-quarter (25%) of those surveyed confirmed that they had added people whom they’d never met face-to-face to their friends or contacts list.
        • Similarly, nearly one-fifth (18%) of those surveyed had sent a photo or video of themselves to someone they had never met in real life.

         

        These stats also confirm just how naïve and vulnerable children can be – and why parents and guardians need to protect them.

        Protect kids from online grooming_1

        And so, when we read about the pervasiveness of online grooming, your first response as a parent might be: ‘It can’t happen in my home – can it?’ but your second response should be: ‘How can I make absolutely sure that it doesn’t?”

        With Vox and global cybersecurity expert company Norton™, parents can exert real parental control by setting up tools to help your kids explore the Internet more safely.

         

        Unpacking Online Grooming

        In decades past, parents and caregivers worried about ‘flashers’ – perverts lurking around schools in long coats, who waited to suddenly give their young victims an eyeful that they weren’t expecting.

        Today, the perverts are looking for the reveal to be the other way around – and the effects can be far more lingering and devastating.

        Online grooming

        Norton™ warns that, as part of the attempted grooming process: ‘…predators may spend months steadily getting to know their potential victims. They might start this process by contacting children as they play popular online games such as Fortnite or Minecraft.

        ‘…Once predators gain the trust of their victims, they will then steer conversations more often toward sexual topics and will eventually ask children to engage in sexual conversations, send explicit photos, or meet them in real life.’

        Reports have also surfaced of cyber predators infiltrating another online game popular with kids, namely Roblox.

        But there ARE ways to fight back – and in the Vox family, we’re definitely here to help.

         

        The Danger Lurking Behind Everyday Apps

        Vox has teamed up with Norton™, which provides industry-leading antivirus and security software for PC, Mac and mobile devices.

        According to Norton, children today gravitate toward social media apps that allow them to connect easily with their friends. But these social networking apps and websites are also favoured by predators who use them to communicate with their intended victims.

        Norton says that, in addition to online games, some of the apps that predators may use to communicate with children include WhatsApp, Snapchat, TikTok, Kik, Monkey, Whisper and Chat Avenue.

        For any parent, it’s frightening to think about the multiple ways that predators can use technology to find and target their victims.

        So let the experts take care of it for you.

        child 1073638 1920 | Vox | Protect Your Kids from Online Predators

         

        What Norton and Vox can do for you 

        Vox has partnered with Norton to make industry-standard protections readily available to families with Norton Family and Norton 360 providing one app for many devices.

        These tools don’t replace conversations, but they give you clear alerts, activity reports and the ability to set safe boundaries.

        Smart monitoring allows parents to monitor search terms, videos and app downloads; receive alerts for unsafe behaviour; and get detailed activity reports.

        In addition, options such as location tracking allow you to define safe zones for your children and receive real-time alerts if those boundaries are crossed. Children can share their location through the mobile app.

        All of these safety features – and many more – are available from Norton’s comprehensive protection for your devices and online privacy.

         

        Protect Kids from Online Predators at Home

        UNICEF says that keeping children safe online also relies on parents and caregivers maintaining open communication; using technology to protect children; spending time with them online; and encouraging healthy online habits

        • Talk regularly and openly: Start conversations about online life the same way you’d talk about who your child plays with in the street. Ask gentle questions: who are your friends online? What games do you play? What apps do you use?
        • Agree house rules: Device-free zones (dinner table, bedrooms at night), time limits for play, and rules about sharing photos or personal information.
        • Use parental controls: Industry tools such as Norton Family and Norton 360 offer activity monitoring, content filtering, screen-time limits, location supervision and alerts for risky behaviour. These tools help you set boundaries while still allowing kids to explore.
        • Co-play and co-view: Sit with younger children while they play online and encourage older children to show you new apps and settings. This builds trust and gives you a live view of who they interact with.
        • Check privacy and friend lists: Make sure profiles are set to private, review followers and friends together, and remind children never to share addresses or phone numbers in chats.
        • Watch for signs: Increased secrecy, sudden changes in behaviour, new devices or new online friends that appear overnight are all red flags.

         

        Balancing Safety and Privacy

        Monitoring doesn’t mean spying. Explain to your child why you’re using parental controls and that the aim is safety, not punishment. As children grow, shift from more direct monitoring to regular check-ins and shared agreements about responsible online behaviour.

        Quick checklist for parents and grandparents (bullet list for snippet targeting)

        • Have an open conversation about online risks this week.
        • Set simple house rules for devices and sharing.
        • Install parental controls and review activity reports weekly.
        • Make social profiles private and review friend lists together.
        • Know how to report abuse to the app/platform and to local authorities.
        • Keep devices in communal spaces for younger children.

         

        Before our world became as digital as it is today, parents only had to worry about their children’s safety in the physical environment. Today, we have to be concerned about online predators that can access our homes through our digital devices.

        This is all a lot to think about, so why not let Vox and Norton take care of it for you with our comprehensive and proactive suite of solutions?

        We’re here to help you keep your children safe in the online world for as long as possible without becoming another statistic.  Please click here for more information.

         

        “Making the decision to have a child is momentous. It is to decide forever to have your heart go walking around outside your body.” ~Elizabeth Stone, author

        mother 2935723 1280 | Vox | Protect Your Kids from Online Predators

         

        Frequently Asked Questions

        How can I tell if my child is being groomed online?
        Look for signs such as secrecy around devices, sudden new friendships, unexplained gifts, changes in mood or sleep, or attempts to isolate the child from family. If a child is using private messaging apps or deleting chat histories, take note and ask open, non-judgemental questions.

        What do Norton parental controls actually do?
        Norton Family and Norton 360 provide content filtering, web and search supervision, screen-time controls, social media monitoring, location supervision and alerts for unsafe behaviour. They produce activity reports so you can spot potential problems early.

        Will parental controls invade my child’s privacy?
        Used thoughtfully, parental controls are a safety tool. Be transparent: explain why you’re using them, involve your child in setting the rules, and gradually reduce monitoring as your child demonstrates responsible behaviour.

        At what age should I set up parental controls?
        Start young, because even pre-schoolers benefit from basic content filtering and supervised access. For older children, combine tools with conversation and digital literacy lessons so they understand safe behaviour.

        What should I do immediately if I suspect grooming?
        Stay calm, listen to the child, preserve any evidence (screenshots, chat logs), report the account to the platform, and contact local authorities or child-protection organisations for guidance.

        Where can I get help in South Africa if I need to report abuse?
        Report serious threats to the police (SAPS) and the platform where it occurred. Seek support from child-protection organisations and trusted local counselling services.

         

         

        Real Risks of Critical Infrastructure Cyber Attacks

        No longer only in the movies…

        There are very real cyberthreats lurking today, including critical infrastructure cyber attacks, and all organisations need to protect themselves. We tune into the movies and TV shows for entertainment – sometimes because we need a serious dose of escaping reality to forget about our challenges for a while.

        And if we’re watching a thriller, when the film is over, we breathe a sigh of relief that what happened in it was much too far-fetched to have any actual connection to reality.

        Perhaps viewers a couple of years ago were comfortable, while watching the 2023 American apocalyptic thriller ‘Leave the World Behind’, to think that they would be returning safely to reality when the credits finally rolled, because….

        [Editor’s note: If you haven’t seen the movie, here comes a spoiler alert!]

        cyber attack leave the world behind | Vox | Real Risks of Critical Infrastructure Cyber Attacks

        …because a war was NOT actually being started outside the cinema by sinister forces who began by first destroying communication networks and critical infrastructure through a highly targeted cyber attack.

        (If you haven’t seen the movie and want to know more, here’s a quick sneak peek at the trailer. The movie stars Julia Roberts, Mahershala Ali, Ethan Hawke and Kevin Bacon.)

        Except that… attacks on infrastructure ARE becoming more commonplace in the real world, as Information Technology (IT) and Operational Technology (OT) systems become increasingly intertwined.

        Let’s look at some real-life examples.

         

        Why It’s real: IT and OT Convergence 

        large Colonial Pipeline | Vox | Real Risks of Critical Infrastructure Cyber Attacks

        One of the largest oil pipelines in the United States, the Colonial Pipeline in the eastern USA, went down in May 2021 for a few days because of a massive cyber-attack. It caused fuel shortages, panic buying and a temporary spike in gasoline prices.

        The attack, from a Ransomware-as-a-Service (RaaS) operation named DarkSide, caused a four-day shutdown of the pipeline, after DarkSide’s operators had accessed the company’s IT network, stolen 100 gigabytes of data and encrypted several critical systems. A significant section of the eastern part of the country was affected, and Colonial Pipeline paid the hackers nearly $5 million as a ransom to finally regain control of their systems.

        The Colonial Pipeline ransomware attack is considered to be one of the most significant attacks on critical national infrastructure in history.

        So perhaps the moral of this particular story is this: Taking down critical infrastructure is not so far-fetched after all!

        digital 4683519 1920 Infrastructure threat resized | Vox | Real Risks of Critical Infrastructure Cyber Attacks

        As for communications networks, cyber-attacks on telecommunications companies (telcos) can have far-reaching consequences. The nature of the information held on customers can put their personal safety at risk if it’s breached.

        American telco giant AT&T has had its systems breached more than once. System breaches have also taken place on Tangerine in Australia, Kyivstar in Ukraine, Alphalink in France, Bharat Sanchar Nigam Limited in India… the list of international telcos that have been attacked just goes on.

        Data breaches and service failures undermine customer trust and have a negative impact on reputations. The result is companies being hit with recovery expenses as well as a potential loss of future customer revenue.

         

        Closer to Home: South African Incidents

        South Africa has not gone unscathed as far as significant cyber attacks are concerned.

        michael geiger JJPqavJBy k unsplash resized | Vox | Real Risks of Critical Infrastructure Cyber Attacks

        • Transnet Attack: In July 2021, South Africa’s state-owned logistics firm, Transet, suffered a major ransomware attack that disrupted operations at ports and significantly affected the supply chain, demonstrating how ransomware can affect national economic activities. You could perhaps regard this as being SA’s own version of the Colonial Pipeline major critical infrastructure attack, because the results were also severe and far-reaching – in fact, Transnet declared a ‘Force Majeure’, meaning an event that cannot be reasonably anticipated or controlled.
        • Experian South Africa: In August 2020, this renowned consumer, business and credit information services agency experienced a data breach where a fraudster gained unauthorised access to the personal information of approximately 24 million South Africans and almost 800,000 (793,749) businesses. The exposed data included contact information and employment details.
        • National Health Laboratory Service (NHLS): When the IT systems of the NHLS were targeted by ransomware in 2024, all files on the affected computers and servers became inaccessible, leading to a halt in NHLS operations. In addition, 1.2 terabytes of data was stolen during the attack, including the sensitive medical information of millions of patients.
        • South African Weather Service (SAWS): In January 2025, the SAWS disclosed that its ICT-base systems were disrupted by an attack led by ransomware-as-a-service group RansomHub.

         

        These are just a few examples of local cyber breaches in South Africa. Knowing the cause, impact and response to past data breaches can help businesses protect their own data – and bottom-line – by ensuring that they avoid the same pitfalls and mistakes.

         

        Practical, Non-technical Actions Organisations Can Take

        You don’t need to be a security expert to take sensible steps that reduce risk. Recommended actions include:

        • Develop and exercise an incident response plan and communications strategy so you can act fast when an event occurs.
        • Classify and prioritise critical assets and data to focus protection and recovery efforts where they matter most.
        • Conduct regular tabletop exercises with leadership, legal and communications teams to test decision-making under pressure.
        • Strengthen supplier and vendor oversight — downstream vendors can introduce supply-chain risk.
        • Train staff to recognise phishing and social engineering, the most common initial vectors for ransomware attack.
        • Consider cyber insurance and ensure coverage aligns with your operational risk profile.

         

        It’s important to understand that kidnapping today is no longer only the domain of Somali pirates operating off the coast of Northeast Africa, using speedboats and machine guns to take over lucrative international cargo ships. Cybercriminals – like the Colonial Oil attackers – now ‘kidnap’ data, holding systems and companies to ransom until significant sums of money are paid.

        No organisation wants to be in the media spotlight for the wrong reasons. Being aware of cyber attacks suffered by other companies can help your business to learn from these pitfalls and stay safe moving forward. Let’s go back to the movies to ponder that one a bit more closely:

        Leave the world behind | Vox | Real Risks of Critical Infrastructure Cyber Attacks

        “In my line of work, you have to understand the patterns that govern the world. It can help you see your future. And I knew something was coming.” – George H Scott, ‘Leave the World Behind’

        Any business can be a victim of cybercrime. If you need help with cyber protection for your organisation, please contact Vox to see how we can be of assistance.

         

        FAQs

        What are critical infrastructure cyberattacks?
        Critical infrastructure cyberattacks target systems that support essential services — such as energy, transport, health and communications — and can disrupt services, harm the economy and endanger the public.

        How can I tell if my organisation is being targeted?
        Common signs include unexplained system slowdowns, unusual login patterns, unexpected file encryption, or ransom notes. Prompt investigation and containment are vital.

        What’s the difference between a ransomware attack and a data breach?
        A ransomware attack encrypts and locks systems to demand payment; a data breach involves unauthorised access and exfiltration of sensitive information. Both can occur together.

        How can smaller businesses protect themselves against these threats?
        Smaller businesses should focus on basics: backups, an incident response plan, staff training, and assessing third-party risks — these steps significantly reduce exposure.

        Does cyber insurance replace preparedness?
        No. Cyber insurance can help with financial recovery, but it does not replace proactive measures like planning, training and asset prioritisation.

        Please Call “Someone” – Understanding The Role of ISPs in How We Connect

        There was a time when making a call was delightfully straightforward: dial, ring, hope. For many of us in South Africa the SMS “Please Call Me” was part poetry, part panic and entirely human — a tiny message that wrapped an invitation, a plea or a dramatic update into a handful of characters. Those little messages told whole stories: “No airtime”, “Call me now”, “Dad has phone.”

        Fast forward to now and everything’s changed. Voice is no longer a simple circuit-switched thing handled by telcos alone. It’s wrapped inside data — Teams meetings, WhatsApp calls, Zoom, VoIP — and your ISP (Internet Service Provider) is the pipeline carrying all of it. It all comes down to understanding the role of ISPs and how they quietly became one of the most important players in how we connect, work, and socialise.

        Understanding the Role of ISPs

        The “Please Call Me” may have been an SMS, but today’s equivalents are data messages: a missed WhatsApp call, a Teams ping, a video invite. Under the bonnet, these are streams of data that ride on the network your ISP provides. That’s why when your data is flaky, your call might sound like you’re speaking from inside a tin can.

        Put simply: the shift to data-first communications means ISPs don’t just provide Internet — they determine the quality of your voice and video experience.

        What an ISP actually does (short and simple)

        At a basic level, an ISP connects your home, phone or office to the wider Internet. But there are a few specific roles that make the difference between “Hello?” and “Crystal clear”:

        Last‑mile access and coverage

        • The “last mile” is the physical link from your house or building to the ISP network. This could be Fibre, Fixed Wireless (LTE/5G), Satellite or older copper. Where you live and which access type is available has a big effect on reliability and speed.
        • Coverage matters. If your suburb has multiple Fibre providers or a good wireless footprint, you’ll have more options and often better service.

        Data carriage, prioritisation and latency

        • ISPs carry your packets — the tiny chunks of data that make up calls, messages and streaming. How they route, queue and manage those packets affects latency (delay), jitter (variability) and packet loss — the three things that kill call quality.
        • Some ISPs offer prioritisation services (Quality of Service, or QoS) for voice and video. That means your Teams call can be given priority over a background file download — a practical difference when everyone’s using the network.

        Value‑added services and managed voice

        Why your ISP matters for voice, video and work from home

        If you work from home, teach online, or game in the evenings, your ISP will either make your life easier — or test your patience. Here are a few key reasons:

        Consistency
        A good ISP delivers consistent speeds and low latency. That means fewer dropped calls and less frustrating “you’re on mute” moments.

        Support
        When something goes wrong you want competent 24/7 support that understands voice and data interactions. Managed voice customers benefit from monitoring and fraud protection, so outages are noticed and acted on before they cause chaos.

        Resilience and Failover
        A knowledgeable ISP will offer failover options: a secondary internet link, or an Active‑Active set‑up for businesses that can’t afford downtime. That’s the difference between “we’ll call you back when the network’s up” and “we stayed online through the outage”.

        Cost vs Value
        Not all ISPs are the same. Some compete mainly on price; others bundle managed services, monitoring and local support. It’s worth evaluating the whole package — not just monthly rand value.

        If calls are poor, here’s what to check first:

        1. Which connection type are you on? (Fibre, LTE/5G, satellite?) Fibre usually wins for stable voice.
        2. How many devices are using the connection? Too many streams = congestion.
        3. Router placement and age — Wi‑Fi still affects call quality even on a fast Fibre link.
        4. Are you using the nearest server for your service (video game or VPN)? Local servers reduce latency.
        5. If it’s business grade, ask your ISP if QoS, VLANs or voice prioritisation are configured.

        ISPs aren’t glamorous. They don’t make headlines the way shiny phones or apps do. But they’re the unsung conductors of modern communication: ensuring your voice, video and messages arrive when they should, crisp and uninterrupted. So the next time a Teams call goes silky-smooth, give a little nod to the network quietly doing its job — and if it doesn’t, perhaps the time has come to speak to your ISP.

        Frequently Asked Questions

        1. What does an ISP do for voice calls?
          ISPs provide and manage the internet connection that carries VoIP, Teams and WhatsApp calls; they influence latency, packet loss and prioritisation which determine call quality.
        2. Why is Fibre often better for voice than wireless?
          Fibre offers symmetric speeds and low latency with less congestion, so voice and video streams are more stable than many wireless links.
        3. Can my ISP improve my existing call quality?
          Yes — via QoS settings, managed voice services, upgrading last‑mile access, or by recommending and installing a better Wi‑Fi solution.
        4. What is VoLTE and does my ISP control it?
          VoLTE sends voice as data over 4G; it’s delivered by mobile operators but the ISP or fixed access provider still affects the overall experience if you connect via mobile‑to‑Wi‑Fi handover.
        5. Who do I contact if calls keep failing?
          First check your router and local setup; if problems persist, contact our 24/7 support.

        Making the Ultimate Fibre Connection

        If we’re talking connectivity, there’s only one choice worth investing in. It’s fast, it’s future-proof, it’s the ultimate Internet experience. Spoiler alert: it’s Fibre.

        Chances are, if you live in any of the major cities (and even most of the smaller towns), you’re living in a Fibre coverage area where a monthly subscription opens a world of unlimited data at the fastest speeds available. Must be nice, right? It is.

        If you’re still on the fence, we’re here to tell you that getting connected with Fibre is not as intimidating as it might seem.

         

        The A to Z of Fibre

        Like all things tech, understanding Fibre involves learning a few acronyms and abbreviations. It starts with ‘C’ – for coverage – which you can check quickly and easily on our website, here:

         

         

         

        If you’re covered, you can move on to ‘O’ for Order. Just browse through the packages available on our Vox Shop, find the one that suits your needs and budget and add to cart.

        Once your order is confirmed on our side (keep an eye on your inbox for our confirmation mailer), we’ll get in touch with your FNO (Fibre Network Operator) to double-check your details and confirm your line is available.

        From there your FNO will confirm an installation date with you. This is where another abbreviation comes in – ONT (Optical Network Terminal). This is what turns your Fibre signal into data. If you have an ONT already installed, congratulations! You’re halfway there.

        If not, no worries – your FNO will still install one for you. This process might just take a bit longer overall as they’ll bring the Fibre in from the street and discuss the best place for your ONT to live in your home permanently.

        That’s right. Once it’s installed, it stays the property of your FNO and lives at that address. That’s because Fibre is a fixed line. If you move, that ONT stays right where it is – and you’ll inherit a new line at your new address.

        Don’t let that be a dealbreaker. We’re here to help you through all the admin and get you connected again if you do need to move. You can read more about that right here.

        But let’s not jump ahead quite yet.

        Once your line is active, as your ISP (Internet Service Provider), we’ll supply you with a free-to-use Wi-Fi router. You’ll have the choice of either installing your router yourself (we’ve got a handy step-by-step guide, so no stress) or having one of our dedicated Vox engineers install it for you.

        And that’s it! Now you’ve made the ultimate connection. But wait, there’s more…

         

        Taking Your Home Network to the Next Level

        As your ISP, we’re also dedicated to ensuring you get the most from your connectivity experience.

        So, full disclosure: As incredible as Wi-Fi may be, it can also be temperamental. Your signal quality can be affected by everything from where you place your Wi-Fi router to the thickness of your walls and regular home appliances like microwaves.

        The list is long, but we’ve broken it all down for you here. That’s also why we offer a range of Mesh Wi-Fi devices and ability to strengthen your network as much as possible.

        Life can and will happen, and sometimes that means your Fibre going down. If it’s not an area outage or scheduled maintenance, once you’ve checked all the cables from your router to your ONT and switched everything on and off again (laugh, but this does help), just know that with Vox, you have someone to call.

        Which brings us to the final abbreviation of your Vox Fibre journey – the VTSC (Vox Technical Support Centre). Our team of experts are available 24/7 to help you troubleshoot any issues you may have.

         

        Frequently Asked Questions

        What is Vox Fibre for home?
        Vox Fibre for home is a fixed Fibre broadband service offering high speeds, uncapped data options, a free Wi‑Fi router and 24/7 Vox Technical Support (VTSC).

        How do I check if Vox Fibre is available at my address?
        Visit the Vox coverage page and enter your address to see if your area is covered and which packages are available.

        Who installs the fibre and the ONT?
        Your Fibre Network Operator (FNO) installs the fibre and the Optical Network Terminal (ONT). The ONT remains the property of the FNO and stays at the address.

        Do I get a router with my Vox Fibre subscription?
        Yes. Vox supplies a free‑to‑use Wi‑Fi router. You can self‑install using our guide or request a Vox engineer to install it.

        What if my Wi‑Fi signal is weak in parts of the house?
        Weak signal is often down to router placement or walls. Vox offers Mesh Wi‑Fi devices to extend coverage and improve speeds throughout your home.

        How do I report an outage or slow speeds?
        First check cables and restart devices. If the issue persists and it isn’t scheduled maintenance, contact VTSC for 24/7 support and troubleshooting.

        Will my ONT move with me if I relocate?
        No. The ONT stays at the original address (it belongs to the FNO). If you move, the FNO will arrange a new installation at your new property.

        Are Vox Fibre packages uncapped?
        Many Vox Fibre home packages offer uncapped data. Check the specific package terms on the Vox Shop page for details.

         

        Smart home, smart security: Lock all the doors (IOT and Wi-Fi) wi-fi

        Smart geysers, pool pumps, doors, fridges, washing machines and gates are opening the door to a whole new world of efficiency but they do present a risk

        There are more than 400 million smart homes globally. In South Africa, it’s expected to reach 20.6% of the market by 2028 with multiple well-known brands selling smart devices designed to optimise lighting, power and water usage, and home security.   With the increase of (IOT) Internet of Things Wi-Fi devices, attackers are now targeting smart home appliances, wearables and security systems.

        As South Africans become increasingly reliant on smart door locks, smart security cameras, smart smoke detectors, fire alarms and home security systems, it’s equally important that they ensure these smart solutions are secure themselves. The risk to health and property if a device is left open to hackers is untenable, and yet many homeowners don’t realise how important it is to change the password on their router. The latter’s password is usually set to default when it’s purchased or installed, and this makes it an easy gateway into any home network.

        Then there’s the risk that comes with not using a strong password. According to the World Economic Forum, the world’s most popular passwords are still terrible – 123456 is the world’s most common. It is also the worst. More than 4.5 million people have used it and it takes a hacker under a second to crack. In fact, if a person’s password appears on any of the top password lists, it’s not going to keep their home safe.

        Now, imagine if that password was used to gain access to your home security system. A digitally savvy criminal can remotely open the gate, turn off the beams, unlock the front door, turn off the cameras and the alarms, and walk into your home without anyone noticing. This becomes even more bone-chilling if you realise that this could all happen while you were at home.

        It is not a sign to stop using these devices. The value they add to quality of life is significant. The ability to schedule temperatures, lighting, switches, speakers and appliances is incredibly convenient, and saves both time and money. It’s more of a call to network action. Yes, you can use your IoT Wi-Fi devices to monitor your solar and improve your standard of living, but do so with a network that’s been optimised to handle the load and the risk.

        The network is not only a point of vulnerability, it’s also the key to ensuring it can handle the demands of a comprehensively smart home. Older routers can handle up to 32 devices at the same time before losing coherence, so the first, most important step, is to prioritise investing into the latest technology. A modern router with an incredibly strong password will immediately make your network more secure and will make it easier for you to connect multiple devices and gain all the benefits of a smart home and smart technology.

        When you optimise your network settings for your IoT Wi-Fi devices, your devices will function better and you will gain better control over performance and network capacity. It sounds complex, but it boils down to using the best possible technology to handle the role. And this is not just the router. You want reliable equipment and a connectivity provider who can ensure your devices remain secure and functioning optimally.

        When you combine the connectivity with the security and the technology, then you have the perfect trifecta of smart home functionality that will deliver the right performance at a consistency it demands. It also means that as a South African, you get that smart doorbell, intelligent power management and all the other digital bells and whistles within a tight ecosystem that’s geared to protect your home without compromise.

        Fibre vs 5G – Where is the Future Headed?

        In a world of constant innovation, two contenders make their claim to the throne.

        The title in question? King of Connectivity.

        Up until now, both have emerged as leading innovations destined to shape the future of communication. Fibre was firmly King Undisputed, and there was that incident with 5G and Covid (which we don’t talk about – but that’s firmly behind us). Today, both offer groundbreaking advantages yet vastly different applications, scalability, and uses. Today, we’ll unpack the strengths of each, and make a definitive decision as to which one is truly best.

        Fibre Internet:

        Often called the Backbone of Connectivity, Fibre Cables transmit Data as light through microscopic strands (known as, shock horror, Fibres). For years, it’s been the undisputed gold standard of Internet – offering unmatched speed and reliability.

        Why it’s Awesome:

        • More Speed, Better Bandwidth: You know the deal. Fibre offers up to 100Gbps speeds and more, meaning it’s a perfect conduit for data-heavy applications like 4K Video Streaming, Cloud Services, and Large Scale Enterprise Networks.
        • Low Latency, Low Problems: Fibre generally boasts minimal delays due to its use of light-based Data transmission, meaning it’s perfect for gaming and real-time connectivity needs.
        • Real Internet, Real Reliable: Remember the days of Copper Cables? Long gone. Fibre is less susceptible to interference, damage, or theft – meaning it’s ultra-reliable (and South Africa proof).

         

        The Downsides:

        • It Can Be Costly: Performance wise, Fibre is unbeatable. However, the process of getting there can be quite time-consuming and, more importantly, expensive. This makes accessibility, particularly in rural areas, a significant investment and reduces the potential reach thereof.
        • Mobility Matters: Unlike more mobile alternatives, Fibre is primarily a fixed connection. It’s great at the home or at the office, but if you’re after on-the-go Connectivity, there’s not much Fibre can do (nor can you take it with you).

         

        5G Network:

        We’re way beyond the doomsday projections linking the pandemic to 5G towers. Today, the technology represents the fifth generation of wireless networks – promising faster speeds, improved latency, and the capability to support large numbers of connected devices.

         

        Why it’s Awesome:

        • UltraSpeeds Made Mobile: With amazing download/upload speeds, 5G offers lightning quick browsing and streaming to smartphones or mobile devices – making it essential for those who need rapid connectivity on-the-go.
        • Connectivity, and Beyond: since it’s designed to support as many as 1 million devices per square KM, 5G promises to be the backbone of smart cities or densely populated urban areas requiring Internet less prone to interruption.

         

        The Downsides:

        • Coverage Matters: The problem with 5G signals is that they can struggle to penetrate thick walls, or cover long distances. This creates a need for more towers (and we all know how well that went in 2020) and limits immediate expansion into suburban areas.
        • It’s Codependent: You can’t unlock the full potential of 5G without a robust Fibre backbone – meaning it needs to be backed by proper cabling and infrastructure.

         

        The Future: A Complementary Partnership

        Rather than one technology replacing the other, Fibre and 5G will work hand in hand to shape the future of connectivity.

        The question should then be reworked from “which one will replace the other” to “how will they work together” to shape the future of Connectivity.

        First, Fibre:

        The bottom line is that Fibre is revolutionary and will continue serve as the foundation blocks for years to come. As our Internet demands increase, no alternative at present has the capability (or scalability) required to meet these enhanced demands. Fibre does. From Cloud to Datacentres to home, business, and iOt needs, it’s primed to dominate the industry for generations to come.

        Furthermore, it is pivotal to powering 5G networks – requiring a correlation to each 5G base station in order to maximise its potential.

        Next, 5G:

        5G is primed to dominate mobile connectivity and high-speed internet on-the-go. From innovating smart cities to vehicles, industrial automation, and healthcare, the high capacity/low latency power dynamic means it’s primed to be a cornerstone of a majorly connected connectivity ecosystem.

         

        Our takeaway? The future will be HYBRID.

        Fibre will continue to be the backbone, but 5G will serve as the central nervous system required to power the perfect body. They’ll serve to complement rather than compete with one another – with the endgame being seamless, fast, reliable Internet for both fixed and mobile users alike.

        In South Africa, the debate “fibre vs 5G” keeps cropping up, but each technology serves different needs. Fibre internet remains the backbone for high-capacity, low-latency links (think datacentres, enterprise and fixed broadband), while 5G network takes mobility, dense device support and smart-city applications to the next level.

         

        FAQs

        Is Fibre faster than 5G?
        Yes — Fibre can offer higher, more consistent speeds and symmetrical upload/download performance; 5G can be very fast on mobile but is more variable depending on coverage.

        Do I need Fibre for 5G to work?
        Essentially yes — 5G base stations typically rely on a Fibre backbone to deliver the full benefits of low latency and high throughput.

        Which is cheaper: Fibre or 5G?
        It depends. Fibre installation can be costly upfront, especially in rural areas; 5G fixed wireless can be cheaper to deploy in hard-to-reach areas but may offer different performance levels.

        Will 5G replace Fibre in homes?
        Unlikely. Fibre remains the best option for consistent, high-capacity home and business links. 5G is a strong complement, particularly where Fibre isn’t available.

        Which is better for businesses?
        For stable, scalable operations and cloud services, business Fibre is preferred. For mobility, IoT or temporary sites, 5G provides flexibility — most organisations benefit from both.

        ‘Stranger Danger’ From Just One Click

        We teach children to look both ways before crossing the road — we should teach employees the same caution online. Phishing and malicious attachments are the “stranger danger” of the Internet: an email that looks legit can be the single click that opens a door to ransomware, data loss and costly downtime. Organisations can reduce risk dramatically by equipping people with simple, repeatable habits and the right protections.

        Phishing is a fraudulent email or message designed to trick people into clicking links or opening attachments that install malware or steal credentials. One careless click can allow attackers to deploy ransomware or access sensitive company data.

        Don’t click: how phishing works

        Cyber criminals impersonate trusted organisations or colleagues, craft urgent requests, or hide malicious links in seemingly normal documents. The attack chain is often short: a convincing message → one click or opened attachment → malware executes → attackers escalate access or encrypt files. That single step is why “stranger danger online” is so effective.

        Ransomware attacks unleash havoc

        When malware runs on one device it can move laterally across a network, encrypting files and disrupting operations. Recovery can be lengthy and expensive; backups, endpoint protection and incident response plans reduce harm, but stopping the initial click is the most cost‑efficient defence.

        Look both ways: how to spot phishing — 5 quick checks

        • Check the sender address (does it match the organisation, not just the display name?).
        • Hover over links to view the real URL before clicking.
        • Don’t open unexpected attachments — confirm with the sender first.
        • Watch for urgent language, threats or inconsistent tone and spelling.
        • Verify payment or credential requests with a separate call to the sender.

        How to help employees become cyber‑smart

        1. Train: regular, bite‑sized awareness sessions that explain phishing examples and reporting steps.
        2. Test: run simulated phishing campaigns and give immediate feedback to anyone who clicks.
        3. Enforce: use technical controls (MFA, endpoint protection) and clear reporting routes so staff act quickly.

        Joint responsibilities — people, process, products

        Security is everyone’s job. Employees need awareness and reporting channels; managers must model safe behaviour and enforce policies; IT should deploy prevention tools and run simulated exercises. Combine behaviour change with product protections like phishing simulations and endpoint defences to lower organisational risk.

        A quick tip on reporting and response

        If you suspect an email is phishing: don’t click the link, screenshot the message, forward it to your IT security team (or quarantine it), and change exposed passwords if you believe credentials were entered. Rapid reporting shortens the mean time to detect and contain costly threats.

        Learn more about our cybersecurity solutions and protective services.

        Frequently Asked Questions

        1. What is a phishing email?
          A phishing email impersonates a trusted sender to trick recipients into revealing credentials or opening malware‑bearing attachments.
        2. How can one click cause a ransomware attack?
          A malicious attachment or link can install malware that encrypts files and spreads across a network, forcing an organisation to restore from backups or pay a ransom.
        3. How do I spot a phishing email?
          Check the sender address, hover links to see the real URL, avoid unexpected attachments, watch for urgency or greedy requests, and verify with the sender if unsure.
        4. What should employees do if they suspect phishing?
          Do not click; report the message to your security or IT team, quarantine the email if possible, and change any potentially exposed passwords.
        5. Are simulated phishing campaigns effective?
          Yes — regular simulations with immediate, contextual training reduce click rates and reinforce safer online behaviour.
        6. What is multi‑factor authentication (MFA) and why use it?
          MFA requires an extra verification step (e.g. SMS or authenticator app) beyond a password and greatly reduces the chance of account takeover.
        7. How often should employees receive cyber awareness training?
          At minimum quarterly refreshers plus just‑in‑time micro‑learning after simulations; frequent reinforcement keeps awareness high.

        How 5G Networks Can Strengthen Your Business Cybersecurity

        The rollout of 5G technology is revolutionising more than just network speeds—it’s reshaping enterprise cybersecurity. With stronger encryption, smarter authentication, real-time monitoring, and network segmentation, 5G delivers an advanced security framework that helps businesses proactively defend against cyber threats.

        Below, we explore how 5G enhances cybersecurity and strengthens your company’s digital resilience.

        Key Cybersecurity Benefits of 5G Networks

        • Enhanced data encryption

        • Stronger privacy protection

        • Network slicing for isolated security zones

        • Multi-layered authentication

        • Real-time threat monitoring and anomaly detection

        • Edge computing security advantages

        • Automated security responses

        • Secure connectivity for large device ecosystems

        • AI and machine learning-driven threat prevention

        • Improved global roaming security

        Let’s unpack how these 5G capabilities work to secure your business.

        1. Enterprise-Grade Data Encryption

        5G introduces next-generation encryption, including 256-bit encryption standards and advanced cryptographic algorithms—future-proofing networks, even against emerging quantum computing threats.

        Why this matters:
        Sensitive business data is significantly harder to intercept or decrypt, drastically reducing exposure to cybercrime.

        2. Stronger Privacy & Identity Protection

        Unlike 4G, 5G masks user identities using a Subscriber Concealed Identity (SUCI) instead of transmitting personal identifiers in plain text.

        What this means for business:
        Better protection for confidential internal data, customer profiles, and proprietary information.

        3. Network Slicing: Custom Security Zones for Your Business

        5G allows multiple isolated virtual networks to run on the same infrastructure. Each can have tailored security controls, access rules, and monitoring.

        Security advantage:
        If a breach occurs in one slice, it can be instantly quarantined—leaving the rest of the network untouched.

        4. More Secure Authentication

        5G strengthens access control through:

        • Multi-factor authentication (MFA)

        • Secure device verification

        • Asymmetric encryption-based identity validation

        Result:
        Fewer risk points, less impersonation, and tighter access control across networks and connected devices.

        5. Real-Time Threat Monitoring and Detection

        Powered by machine learning analytics, 5G monitors networks in real time to detect unusual activity and security anomalies at internet scale.

        Security outcome:
        Faster detection = faster response = fewer breaches.

        6. Edge Computing for Reduced Attack Surfaces

        5G can process data closer to its origin rather than routing everything through central servers.

        Benefits include:

        • Lower risk of data exposure

        • Faster incident response

        • Fewer network choke points for attackers

        7. Automated Cybersecurity Response

        5G networks can support self-automated threat detection and mitigation, reducing reliance on manual intervention.

        Impact on business:
        Shorter vulnerability windows, fewer successful exploits, and less operational downtime.

        8. High-Volume Device Security

        With capacity for up to 1 million connected devices per square kilometre, 5G delivers scalable, secure support for large device ecosystems.

        Security benefit:
        Centralised security oversight, real-time monitoring, and stronger endpoint protection across massive connected environments.

        9. AI-Driven Cyber Defence

        The ultra-low latency and high throughput of 5G allows AI and machine learning security models to respond instantly to emerging threats.

        Bottom line:
        Cybersecurity becomes predictive, not reactive.

        10. Safer Global Roaming & Network-to-Network Security

        5G replaces outdated roaming protocols like SS7 and Diameter with the Security Edge Protection Proxy (SEPP)—creating a unified, encrypted communication layer between global networks.

        Advantage:
        Improved protection for businesses operating across borders, especially those with mobile or roaming workforces.

        5G Is a Major Leap Forward for Business Security

        5G is no longer just about faster internet—it is a cybersecurity enabler that provides:

        • Stronger encryption

        • Smarter authentication

        • Intelligent threat monitoring

        • Network isolation and control

        • Faster automated responses

        For businesses navigating an increasingly unpredictable digital threat landscape, 5G delivers a future-ready security foundation.

        🔐 Secure Your Business with 5G-Enabled Cyber Protection

        The companies that adopt 5G aren’t just upgrading their networks—they’re upgrading their security strategy.

        Want to explore how 5G can protect and enable your business? Get in touch with Vox to future-proof your organisation today.

        5G’s Role in Enhancing Business Communications and Operations

        Not Just Entertainment: The Future of 5G in Business Communications

        5G was developed to handle the growing demand for data and deliver faster, more efficient mobile networks. In doing so, it brings major improvements to how we connect, work, and communicate. While most people get excited about 5G for entertainment — lightning-fast downloads or smoother gaming — the real game-changer lies in what 5G can do for business communications and business operations.

        Why Effective Communication Still Decides Business Success

        Business communication — internal and external — is the backbone of operational success. When communication is strong, companies see higher productivity, quicker problem-solving, better relationships, and healthier company culture.

        DecisionWise, a global consulting firm, found:

        • Companies with low employee engagement earn 32.7% less in operating income compared to engaged companies.

        • Companies with a highly engaged workforce see operating income rise by 19.2% within 12 months.

        The message is simple: when communication improves, engagement improves, and the bottom line follows.

        How 5G Transforms Business Communications

        5G theoretically delivers up to 20Gbps download speeds, 10Gbps uploads, and latency as low as 4ms. Tests in South Africa reached average speeds around 250Mbps, equivalent to high-end fibre.

        Its biggest strengths — speed, latency, bandwidth and efficiency — directly improve how companies communicate, collaborate, and operate.


        1. Faster Speeds for Instant Collaboration

        5G can reach speeds up to 100x faster than 4G LTE.
        This means:

        • Faster file transfers

        • Smoother video calls with clients and teams

        • Instant software updates

        • Faster access to cloud platforms and business tools

        For fast-paced businesses, speed equals efficiency.


        2. Ultra-Low Latency for Real-Time Performance

        Latency is the time it takes data to travel from point A to point B. With 5G, latency drops to 1 millisecond — compared to 30–50ms on 4G.

        Ultra-low latency benefits:

        • Real-time communication tools

        • Live collaboration

        • AI-driven decision-making

        • Virtual reality (VR) and augmented reality (AR) applications

        • Data-heavy IoT devices

        Web pages load faster, systems respond instantly, and real-time technologies finally work the way they’re supposed to.


        3. More Bandwidth for More Devices

        Modern workplaces rely on multiple connected devices. 5G’s increased bandwidth allows:

        • More IoT devices operating at once

        • More users connected without slowdowns

        • Better performance in high-density environments

        • Reliable smart office automation

        As businesses add more tools, sensors, and platforms, bandwidth becomes non-negotiable.


        4. Improved Network Efficiency and Reliability

        5G introduces technologies like:

        • Dynamic spectrum sharing

        • Network slicing

        Both ensure users get the network resources they need without interruptions — even during peak usage.

        This allows businesses to:

        • Automate processes

        • Host high-quality web conferencing

        • Enjoy consistent, reliable connectivity

        • Reduce downtime and performance bottlenecks

        Reliable networks aren’t a luxury. They’re a requirement.


        The Future: 5G Unlocks the Next Wave of Innovation

        5G doesn’t just improve communication — it enables entirely new business models and capabilities.

        5G supports advanced technologies such as:

        • Internet of Things (IoT)

        • Artificial intelligence (AI)

        • Augmented reality (AR)

        • Virtual reality (VR)

        These aren’t new concepts, but 5G finally gives them the infrastructure to scale.

        For example, VR in education and training is already accelerating. Forbes projects the global VR education market to reach US$13 billion by 2026.

        With 5G, innovations like VR classrooms, remote diagnostics, AR-assisted engineering, and predictive automation move from “future tech” to daily reality.


        Bring Your Business Comms Into the Future with 5G

        The advantages of 5G — speed, low latency, bandwidth, and efficiency — make it a powerful upgrade for any organisation looking to improve productivity and communication.

        If you’re ready to modernise how your business connects, collaborates, and operates, explore the 5G offerings from Vox.

        The future of business communication is already here. 5G just makes it faster, smarter, and more capable.