Vox launches Armata to helps South African business tackle cyber threats

With a growing number of South African organisations being targeted by global cyber attackers, integrated ICT and infrastructure company Vox has announced the launch of a new subsidiary, Armata Cyber Intelligence, to provide the technology solutions and niche expertise needed to help local businesses better protect themselves against cyber threats.

“South Africa is now the third most targeted country in the world when it comes to cyber attacks, with the average cost of an attack increasing from R3 million in 2020 to R4 million in 2021. Armata aims to deliver cost-effective intelligent cybersecurity solutions that help achieve zero interruption to our client’s business systems while maintaining the highest level of protection for their data, thereby gaining complete confidence in our offerings,” says Richard Frost, Product Head: Network and Endpoint Security.

The company follows the NIST Cybersecurity Framework, which provides best practice guidelines around how internal and external stakeholders at organisations can better manage and reduce the risk of cyber attacks. The framework is built around five main functions: Identify, Protect, Detect, Respond and Recover.

“Cybersecurity is made up of products, people and processes. Many organisations, especially SMBs, lack the funds to support all three in-house. Vox’s solution to this is to offer the product and services on a month-to-month basis to provide clients with a more affordable price. This allows clients to scale the solution to their budget and contain their costs in a predictable and controllable manner,” says Frost.

At launch, Armata’s offerings will include cybersecurity solutions, security services, managed security services, consulting services, and audits and assessments. This will help organisations comprehensively deal with endpoint security, email security, network security, cloud security, application security, digital security (on mobile and internet of things devices), web services security, and network access control.

It further helps organisations in the areas of identity and access management, backup, data discovery, data loss prevention, information rights management, vulnerability scanning, application code review and threat feeds, whereby customers have access to security intelligence collected from a variety of sources that can be used to proactively mitigate against cyber threats.

“In addition, Armata will offer customers user awareness testing programmes in order to ensure that employees are aware of the security risks. The need for both corporate and personal security education has always been critical, but it has now been brought to the fore with more people working from home, which leaves corporate networks and data more susceptible to attacks through an employee’s home network or other unprotected public networks, says Frost.

“By being cyber smart, we can effectively prevent 80% of attacks simply by knowing what to do. The rest of the attacks will be handled by your security solutions.”

 

Understanding the Rise of Cyber Crimes

Imagine the world’s most unfortunate case of Catch 22, and you’ve likely summed up the challenges both businesses and individuals face today.

While we in South Africa aren’t strangers to the concepts of traditional crime (think hijacking, theft, robberies and worse), unless you’re a city in GTA, your local residence likely has a strong stance on combatting all things illegal. Yes, the concept of a Lockdown presented so many challenges we could spend all day talking about them, yet they also presented one major unforeseen benefit: the absence of people in public spaces led to a drastic decrease in crime rates across the board.

Sounds like a win, right? Well, not really, as this conversely led to an increase in online users. The result? As traditional crimes decreased, Cyber Crimes increased, meaning instead of a reduction on illegal activities as a whole, criminals shifted their focus and used their time devising new ways to prey on unsuspecting end users.

Between the Covid-19 pandemic and the seemingly overnight shift to a work-from-home culture, the rise in Cyber Crimes has been unprecedented, and the sad reality is that these numbers are only set to increase. The statistics are, quite frankly, outrageous, and paint a bleak picture with regards to the reality that is Cyber Crimes.

  • According to CyberSecurity Ventures, there were more than 4000 malicious “Covid” related websites created within the first two months of lockdown, designed to prey on unsuspecting users simply looking to gain information about this unprecedented pandemic.
  • Said research also indicates that, as per 2021, there is one Cyber Attack occurring every 11 seconds – the highest number in human history.
  • Cyber Crime is predicted to cost the global economy $6 trillion per year by the end of 2021 – which would make it the world’s third largest economy, behind only the USA and China.
  • In 2015, ransomware alone cost the world around $325 million. Today? That number is estimated at $20 billion – 57% more in 5 years, making it the most rapidly growing (and potentially dangerous) form of Cyber Crime.

It seems as if while the rest of us were starting side hustles or binging our favourite series on Netflix, Cyber Criminals were devising new and innovative ways to take advantage of the “weak”. It’s important to remember that said criminals are masters of manipulating basic human emotions. Fear, loneliness, curiosity and desperation, were all abundant during these past years and, sadly, presented an opening from which to be exploited.

Cyber Criminals were ready to pounce and took advantage of companies trying to adjust to the unique challenges of adjusting to a completely foreign work environment. Between hacks, breaches, phishing, ransomware and Identity Theft, said individuals (sadly) adapted their tactics to perfectly capitalise on what was going on in the real world.

Regardless of who you are, where you are or how big your organisation may be, you’re a potential target.

Attacks are up, our guards are down, and if we’re not careful, any one of us could be next.

Okay, we’re with you, but what hope is there?

Well, the way forward lies in knowing which areas to focus on and identifying where in your armoury you can use the required reinforcement. Between more robust security measures and the adequate end-user training, you may not be able to prevent Cyber Crimes altogether, but at least ensure that your organisation is best equipped to not be a statistic. Here are some basic tips for the business and the individual hoping to secure their Cyber Space:

  • Over 90% of Data Breaches are caused by human error – meaning they’re entirely preventable.
  • Regardless of where they’re working from, ALL employees need to be able to identify and avoid potential threats.
  • As an organisation, it is incumbent upon you to protect yourself by protecting others. Ensure than guidelines around user safety and training sessions are conducted. Regularly.
  • As an end user, you can learn to be wary of file attachments of ANY sort from unknown users or someone outside of your organisation. Do NOT download files from unknown sites and be able to identify secure URLS.
  • Phishing and spear-phishing are two of the most common methods of attack, so you should focus on strong Email encryption while identifying how to spot a scam.
  • Adopt a Zero Trust policy, which basically assumes everything is a threat until otherwise proven.
  • Understand and implement two-factor authentication, strong password protection (which must regularly be changed) and access control only relevant to the employee’s clearance level – don’t give just anyone access to confidential information.
  • Be vigilant: both internal and external threats exist, so conduct proper monitoring (such as penetration tests or assessments) to establish weak points, vulnerabilities or issues with your network.

Just like in real-life, you’ll never be able to completely eradicate Cyber Crimes. However, as the pandemic has proven, you can’t rob someone if there’s nobody to be robbed. Just as empty streets resulted in less criminal activity, so too will the reduction in potential targets present fewer opportunities for these hackers to exploit.

The world we live in has been permanently altered by the pandemic and will likely never look the way it did before. As such, accepting this permanence should also mean accepting that a robust Cyber Security program is now as essential as a locked door and ADT would be to your conventional workspace.

Securing business systems goes beyond the technology

Tim Wood, Executive Head – IS & IT at Vox

While companies invest a great deal of time and effort in securing their systems, remote and hybrid working has forced businesses and their staff to acknowledge that security goes beyond IT. For all the best technology, a human lapse could result in a catastrophic breach.

Let’s use an analogy that many South Africans will be accustomed to. Security conscious estates or complexes have varying levels of access control. These complexes have high walls, electric fences, security guards manning key entry points, and many – if not all – have security monitoring and patrolling the premises 24/7.

It’s possible that this environment could lull someone into a false sense of security, and they’d let their guard down. However, we know that this would be a mistake. Just because the complex or estate boasts these security measures, there are still several ways someone could be at risk.

When they enter and leave the complex, they could become targets of criminals. When they are inside their own unit, they may not be aware of an undetected breach at the estate’s entrance. It is possible criminals are operating from within the secured estate. What if they have adult children going in and out late at night?

Obviously, this is not an exhaustive list of possibilities, but the point is obvious – it would be a mistake to be lulled into taking anything for granted because we understand that security extends beyond the physical measures in place. And so, in the South African context, one invests in physical security, and then continually remains aware of risks and behaves in a way to minimise them.

Similarly, securing a company requires a conscious effort and it involves an interplay of people, processes, and technology. In a traditional workplace setup, a company can – and will – do all that it can to control its environment. As the pandemic has shown so vividly, this environment no longer exists only in a physical form, yet the requirement to secure it remains.

A company can no longer lock the doors and rely on the fact that access is restricted. Systems need to be accessed remotely and in providing for this you lose control of the environment. As sobering as it is, you must start with the premise that your staff will, at some point, leave their laptop unattended in a public space.

Securing company systems requires protecting your software, protecting your hardware, protecting and backing up your data, and the ongoing education of your system’s users. To get this right, it is important to ask – and answer – who is accessing your systems; from where; using what; how; and why are they accessing them?

Who is trying to access your systems?

In an ideal scenario, it is your employee attempting to access company systems. However, someone may have stolen login credentials, which would be a targeted and planned attack. Alternatively, it is also possible someone encountered an unlocked device and is opportunistically attempting to gain access. There are various ways to mitigate this risk. User access management is paramount. A company needs strong password policies such as complexity rules and password resetting timetables. Multi-factor authentication adds a layer that could be the difference between being breached or not.

One cannot always rely on an employee to remember to lock their devices every time they are not using them, and so auto-lock is crucial. Encrypting external devices such as hard drives and USB sticks is vital – what if an employee leaves a USB stick on a coffee shop table or airport lounge chair?

Where is the employee working from?

Remote working means that an employee must access systems from various locations. In many instances it will be their home, but they could also be accessing systems from an airport or café. As a priority organisations should implement virtual private network (VPN) technology to ensure encrypted and private access to the corporate network.

As part of the ongoing education, employees should learn to become aware of their surroundings and the potential for eavesdropping. They should make the care and security of physical assets like laptops a priority. This extends to clean desk policies – nothing should be left lying around, while each employee should understand how to appropriately dispose of printed documents.

What devices are they using to access systems?

As far as reasonably possible, it would be wise to restrict access to company systems from devices other than company-managed assets. It is not ideal for staff to use personal or shared devices. With company-managed assets, a business can invest in central device management software, including the ability to wipe devices remotely. It enables companies to encrypt hard drives, ensure appropriate back-ups are in place and to update devices with the latest operating systems and malware and antivirus software.

How is the employee accessing your systems?

While employees may access company systems through their dedicated home fibre, it is also possible they are connecting via public Wi-Fi access points. Again, it can never be overstated – education is paramount. Take the time to teach staff about the dangers of unsecured Wi-Fi and honeypots, as well as being aware and alert to their surroundings.  Then reinforce this message consistently.

Why are they accessing the company system?

They may need to access emails and collaboration tools, but it may also be that they work in critical areas such as payments. There are various things a company can do here, including limiting access levels dependent on the employee’s job function, monitoring the device activity of staff working in critical areas and running vulnerability scans and penetration tests, which are simulated cyberattacks against your own system to isolate vulnerabilities that need to be addressed.

Securing a business’s systems is an ongoing task. It is about cultivating a company-wide security mindset as much as it is about investing in the best available technology.

Very much like living in South Africa today.

 

Examining the Future of Cyber Security

It’s already well documented that the frequency of Cyber Crimes is on the rise.

Looking back, the introduction of lockdowns, curfews and tougher legislation led to a drastic decrease in traditional crime statistics worldwide. Good news, right? Well, not entirely, as with this decrease in people going outside came an increase in staying online and, sadly, a similarly steady rise in Cyber Crime.

Worryingly, experts predict that by the end of 2021, we can expect one cyberattack incident every 11 seconds (Source: Technewsworld online, 2021). This number is in fact double that of 2019 (one every 19 seconds), and four times the rate of just five years ago (one in 40 seconds). A lot can change in a short space of time, right?

Sadly, this rapid increase in Cyber Crimes worldwide comes at a substantial cost for businesses involved – not just, as you may expect, in the damages incurred, but also due to the added expense of additional security measures. Worldwide, Cyber Attacks dealt an estimated $1 trillion worth of damages (around 1% of the Global GDP) in 2020 alone. This number is on the rise and, as such, Cyber Security has now become a fundamental component of any brand hoping to embrace the Digital Revolution yet remain unscathed.

So, what does tomorrow hold in the world of Cyber Security?

Truth be told, the concept is still relatively new, and only in recent years has it been recognised as its own entity and independent of traditional IT Security. Gone are the days where your industry standard Firewall and a licensing fee paid by the tech guy was sufficient protection for your organisation.

The world of technology is ever evolving and, as such, the threats as well as the measures used to negate them are in a constant state of evolution. Not every new innovation and solution sticks around for good (just look at Blackberries as an example) but, what is indisputable, is that technology is rapidly becoming increasingly intertwined with our daily lives.

From conversations to banking, dating, shopping and watching movies, technology is impacting devices and services that weren’t previously considered part of the IT infrastructure. We’ve seen smart fridges and TVs connected to the Internet – many fail to realise that they present areas of potential weakness which a hacker can dispute. Our first prediction is that as our reliance on the Internet increases (as it’s bound to), so too will we begin to adopt new, all-encompassing security solutions which cater for multiple devices. We also foresee a world wherein the future of Cyber Security is less concerned with protecting the individual device (although that is important), but rather our Data and information, wherever it may be held.

That being said, the most glaringly obvious Cyber Security challenge today deals with remote and hybrid workspaces. Like it or not, the concept is here, and looks likely to be a part of our reality for the foreseeable future.

This creates a haven for Cyber Criminals, who pounce on areas of weakness and vulnerability before you even know what hit you. No longer can companies or individuals assume that the corporate level office security is sufficient – we need to, as individuals, account for misconfigured systems or unsuspecting employees who may unknowingly put your organisation at risk.

More and more, companies and organisations are ushering in a “zero-trust” mindset, which necessitates that all associates approach any engagement as if they were a security risk. It’s a well-documented fact that Cyber Criminals have been preying on remote workers and, with the concept not going away any time soon, you can expect more stringent internal company policies and a larger emphasis on home Cyber Safety.

The unfortunate reality is that Cyber Attacks will become more targeted.

The downside of being locked down is that, while the majority of us were wishing for Nando’s, picking up some extra weight or learning a new skill, Cyber Criminals used that time to hone their abilities and develop new methods of infiltration – meaning vigilance is more important now than ever before.

It’s not all doom and gloom, however, as the Security industry has not taken these challenges lying down. In fact, the International Data Corporation (IDC) predicts that, globally, people will be spending $174 billion on Cyber Security alone by the year 2024 (Source: Fieldeffect.com, online). Cyber Security represents one of the largest and fastest growing online market segments worldwide and, with the increase in awareness and breaches, you can only expect this number to grow.

But what comes next?

Well, by looking ahead, we can immediately notice a few key talking points in the world of CS.

If you feel like you’re reading more about digital threats now, it’s because people are more aware of this very real danger and (finally!) giving it the attention it deserves. We foresee a significantly increased focus on prevention, education and awareness across the board. As of yet, not many organisations have adequate response planning in the event of a breach, and we anticipate that this will change as incident preparedness and response guidelines become more common.

Furthermore, the introduction of new regulatory concerns has ensured that organisations are now forced to be accountable and responsible for their Data Security. It’s very likely that, in time, there becomes a minimum Security threshold for businesses to maintain, and we expect mandatory training, audits and compliance assessments.

Truth be told, it’s hard to predict the future (if we could, we’d be in that business instead of Cyber Security), but one thing is certain – the rate at which threats are evolving will evoke a similarly powerful response. We predict more stringent protocols, a greater focus on awareness and, most of all, Vox leading the way when it comes to keeping you safe.

Remote working has accelerated globalisation of businesses

The new workforce presents both risks and exciting opportunities, say two senior Vox executives

As the world settles into a hybrid-working model, the risks and opportunities have become more pronounced, with the most notable post-Covid legacy being the globalisation of businesses, say two senior Vox executives.

Craig Freer, Executive Head: Managed Services, says it has become the de facto standard that projects are delivered remotely. “This is not a new concept, it started long before the pandemic with off-shore managed services. However, the pandemic has accelerated global access to skills. 18 months ago, it was almost unheard of in some industries to work from a country of your choice, whereas today remote delivery is normal,” he says.

Freer says there’s a risk of losing in-country skills because businesses can cast their nets further, citing knowledge of HR companies recruiting around the world in efforts to find the best resources at the most competitive cost. “If you consider that this makes skills in countries such as South Africa up to 30% or even 40% more affordable, it does present somewhat of a risk in a skills-scarce environment.

“If you have pounds, you can get the same resource from a country such as ours at a far better cost than you would have paid locally. Naturally, another risk is that if someone is concerned about instability at home or is just generally open to adventure, the next step would be making the physical move to the country that houses their employer.

“It is a risk, but I don’t think it is panic stations, because there is a flip side to the coin which presents an opportunity and gives South Africa a competitive advantage. IP-based companies that have strong resources can compete in European countries because of the time zone and competitive pricing. You’d easily come in up to 30-40% more price-competitive than what they would pay locally – precisely because they are now more comfortable with remote delivery.”

Rudi Potgieter, Executive Head: Guardian Eye, a Vox security solution, says that as the world settles into a rhythm after the initial rush of switching to remote working, everyday matters such as managing productivity present new challenges, and that in the medium to long-term, employees may experience higher levels of remote management as a payoff for the luxury of working remotely.

“One of the more practical challenges faced by employers is managing productivity. Across industries, after the initial rush to set up systems for remote work, there has needed to be management of the workforce’s perception of what working from home means, and the implementation of tools and measures to manage productivity.

“There’s a certain luxury that comes from working from home in the form of fuel savings, not needing to spend money on work clothes, office food, and so forth. You’ll find that as time passes, as a compromise for this luxury, some employees may need to accept higher degrees of micromanagement in the form of productivity tools. This payoff will potentially start encroaching on privacy.”

Freer says that his organisation, and many others, have chosen not to take this invasive route as it does more harm than good. However, he says, there’s a need to develop processes that seek to reverse losses in skills development and company culture that remote working has caused.

“If you think about a technical environment, in the past if someone had a problem they could lean over a cubicle and get help immediately from someone with more skill. This led to continual skills development on the job. The risk, if there aren’t processes in place to address this, is that skills can become stagnant.”

He says technology will play a pivotal role in workforce engagement. “If you look at the trucking industry, for example, they’ve brought out all sorts of monitoring tools for the cab, to the extent that if a driver starts getting fatigued, it is picked up and they’ll either call the driver or send out some sort of alert. It’s quite conceivable that we will see innovations using the laptop camera where you’ll be able to see whether people have disengaged. This would give you an insight into employees and where they are and if they need help. But, as mentioned, it is a fine line where technology is supportive or becomes invasive.”

Potgieter says the only certainty is that the world will never be the same again. “We’ve heard the phrase ‘new normal’ being bandied about. Our future normal will be adaptation on an ongoing basis, whether this is role-specific adaptation driven by innovation or adapting to legislation and other external factors.

“People from all walks of life have been forced into remote work because there was no other option. A few years ago, an employee asking to work from home would have been met with suspicion, but we have adapted. Before the pandemic we may have had nine branches, now we have more than 2000 – because of remote working – and these need to be secured, and this has been done. This is rapid, ongoing adaptation.”

Ultimately, says Potgieter, for all the challenges, the new work reality has brought opportunity. “It requires pragmatism. We may lose things we didn’t want to lose, but we have gained so much in terms of innovation.

“I think as a country, South Africans are amazing. We are unbelievably resilient people and adapt very quickly to change. This stands us in good stead.”

Backup: Your Last Line of Defence

Picture this…

Your brand is the epitome of Cyber Awareness. You’ve followed the protocols, run the penetration test, installed Pentagon level Firewalls and run Security so tight, Mr Robot himself would walk away and say “it ain’t worth it”. Then, one faithful day, the lovable but technologically challenged office Beryl sees a legitimate looking Email, clicks the link provided and boom – your organisation is compromised.

It can happen. It has happened. It will, sadly, happen to many organisations in the future – Cyber Breaches do occur, and are very, VERY real.

According to the University of Maryland, an attempted hack occurs once every 39 seconds. And while we may assume that “hacker” refers to the stereotypical hooded man behind a computer, systems are now so advanced that malware is capable of a completely automated, uninterrupted barrage just looking for an opening – meaning your business is perpetually at risk.

Now, we could discuss the ever-looming threat of Cyber Crimes at length, but that’s not why we’re here today.

Rather, we’re here to offer a glimmer of hope to those businesses who have been or may be unfortunate enough to be hacked in future.

So, with that in mind…

Let’s talk Backup.

Whether it’s photos, documents, video files, or confidential information, your Data is of utmost importance and, because cyberattacks occur more and more often, it seems almost impossible to assure yourself that said Data won’t be corrupted or stolen.

Conventional precautions are no longer a guaranteed safeguard, meaning Data Backup is now a sure-fire way to ensure proactivity. In truth, any loss can compromise a variety of things, including your identity, family safety and even an entire company. Nobody wants to lose their information and, sadly, doing so is often a death blow to even the most thriving legacy enterprise.

Enter Backup Software, which is like Batman, but better.

Should disaster strike, you can rest easy knowing that your information is still available, accessible and attainable to your business – all is most definitely not lost. In fact, deliberately choosing not to maintain an easily attainable storage solution is essentially accepting that should a breech occur, you’re happy to live without your valuable information. The problem, however, is when you factor in POPIA and the importance of third-party Data into the equation – you’re liable (and prosecutable) for any damages incurred (and then some).

Okay, so what’s the way forward?

Well… any Backup software essentially copies critical Data from your servers, Databases, devices or Cloud and makes this information accessible should the need arise. Better yet, it can serve as a means of protection when it comes to sensitive information which may be lost in unforeseen circumstances (for example: if a laptop crashes unexpectedly) whilst also securing said info against the plethora of Cyber Security threats in existence.

Your options are vast and can range from the simple (and conventional) external hard drive (which we don’t recommend) to a secure Cloud location (which we do) that can’t be destroyed, stolen or misplaced.

Whether your personal or home information, any individual can benefit from the correct solution – especially if you’re hoping for an added layer of Data Loss Prevention for both surety and peace of mind. It’s also important to note that you can in fact store multiple copies of the same information. Yes, we know, there’s major scepticism around the Cloud and a seemingly universal fear of it one day crashing, but the reality is that not only is this highly unlikely, but duplication of Data means you’re fine even if it does occur.

Look – things happen. Sometimes you drop your phone off a boat while taking a selfie, or you’re innocently minding your own business and get hit with the blue screen of death. This is just the tip of the iceberg – there are dozens of reasons (including the ones’ we’ve painstakingly broken down above) to substantiate your need for an effective backup solution.

The important thing to remember is that this shouldn’t be done blindly – it helps to consult with the experts, determine what (if not all) information you can’t afford to lose and implement a strategy which factors in the time, process and cost implications.

It’s always better to be safe than sorry, and for those under the impression that a monthly retainer is too much, just factor in that the average organisational Data Breach costs between R10 and R15 million apiece. Be proactive so that you don’t have to be reactive – you may find the survival of your company depends entirely on it.

Surviving the Wait for your Router

So you’ve made the choice to sign up for FTTH, but you’re not sure what happens next.

Do you click “apply” and stare longingly at your phone’s Wi-Fi symbol until it says ‘connected’? Do you call Vox every day and get frustrated with our customer service department? Or do you search for our Facebook page to leave a comment and a reference number in the hopes that Postman Pat (bonus points if you know who that is) shows up at your door with box full of routers and a bag of dreams?

If you’re like us, the wait for Wi-Fi can feel like the night before Christmas. Not only do you find yourself consumed with thoughts of seamless browsing like it’s date night with Brad Pitt, but every minute feels like eternity – which can naturally become a bit frustrating.

Because of this, we’ve put together this survival guide to navigating the wait until your Fibre to the Home is connected.

Step One: Chill Out.

We don’t mean sit in the fridge or get in touch with the Jozi climate. We mean that like anything good in life, getting your Fibre going takes time (we’ve written a whole article about potential reasons behind delays here).

Entering a Fibre agreement with Vox isn’t like a Tinder date – so it’s highly unlikely that instead of your shiny new router, you meet an old guy with a receding hairline (at least we hope so), nor will we stand you up. You’re dealing with humans (although thankfully not the ones from Home Affairs) and, as such, it takes a bit of time to get you online.

Of course, if it’s six months later and that little “no connection” Dinosaur has run so much he’s basically bedridden, something probably went wrong. However, a week or two is pretty standard industry practice, so trust that we’re working on getting you running so that the T-Rex can take a break.

Step Two: Make Connections.

Home Wi-Fi has different purposes for everyone.

For some, it’s a platform to yell obscenities at ‘Noobs on Call of Duty. For others, it’s basically a peace treaty for a hyper-active two-year old with an iPad. For most, it’s purely out of necessity (let’s face it – who’s NOT connected these days?) but, with Work from Home being a thing, it’s even become an essential way to make a living.

As a temporary solution, there are a variety of options available until those five bars start flashing in your bottom right corner.

  1. Use your mobile hotspot.

This is usually better for emergencies only, such as when you told your line manager you’ll send your already completed project to her and, Murphy’s Law, there’s no connection come time to send.

It’s a fairly simple way to get fast connectivity to your device – if admittedly a little costly. You can also tether your smartphone or tablet but, again, this depends on the strength of your cell signal (and whether or not you’re capable of seeing your phone bill without wanting to burn down MTN).

  1. Find public Wi-Fi.

Working from home is cool, but as a temporary fix, you can also use a variety of libraries, coffee shops or even the gym to get those important crunch deadlines under your belt (although working behind the Stairmaster might be a bit distracting).

You’ve got to make sure the network is secure and go easy on the bottomless coffee (lest you end up emulating the dinosaur we talked about earlier), and it’s a relatively cheap, feasible solution which also allows you to stretch your legs a bit.

Or, chances are your employer will let you pop into the offices, in which case you can enjoy free connectivity AND sit in the boss’s chair for a few days. Sounds pretty win-win.

  1. Get a dongle.

We’re past the stage where “dongle” is still a funny word (well, kind of). With Vox Mobile Data, you can connect to the Internet wherever you are for both business and personal requirements.

A mobile and wireless solution that allows you to connect to your business and your team, you can link up to 10 Sim cards and choose between pre-paid or contract options. Monitor or manage your mobile usage (and then start with the Hot-spotting), take your connectivity with you and say goodbye to missed deadlines – it’s a great, simple and quick-fix until you’re permanently connected.

  1. Phone a friend/ask the audience:

Remember when the guy next door borrowed your drill and never returned it? Now’s your time to cash in. Sure, nobody likes to be “that guy”, but unless you’re next to a Dursley, chances are the people closest to you wouldn’t mind a few days of sharing the connection. There’s no harm in asking and, if they say no, you can save yourself a few cups of sugar next time they come knocking like a Jehovah’s witness.

Step Three: Get busy.

Of course, connectivity makes the world go around. But it’s not everything – and load-shedding survivors will tell you that sometimes, a little “no Internet” goes a long way.

The time spent offline gives you a great way to detach and enjoy quality time with your loved ones. If you can survive the initial withdrawals without too much bloodshed, chances are you’ll find yourself finding ample ways to pass the time.

That being said, we know that waiting for your Fibre can be a drag, which is why we commit to making the process as speedy, painless, and efficient as possible. We may not get it right every time, but we’re in the business of knowing our business, so you can rest assured that we’ll do our best to ensure your wait for Fibre doesn’t transform into The Hunger Games.

Can your Business Afford to NOT be Secure?

Between PoPIA, global hacks and an abundant use of the term “ransomware”, it seems like Cyber Security is the talk of the town.

Let’s face it though, it’s for good reason, as a seemingly endless space of Cyber Crimes has led to numerous Data Breaches, the compromisation of personal information on an international scale and, with the implementation of new privacy laws, a unanimous fear of the worst case scenario.

Admittedly, it all seems a bit doom and gloom, but you’ll be pleased to know that Cyber Security is not just an empty, pie-in-the-sky promise of a brighter business future and protection for those who can afford it. In fact, many brands make the mistake of thinking “it won’t happen to me” – it can, and, if you’re not careful, there’s a high chance it will.

The good news is that it’s not exclusive to said industry monoliths. Instead, it’s feasible, attainable, affordable and, given the all too legitimate reality of potential attacks, crucial.

First things first, however – how does Cyber Security interlink with my FTTB?

It’s easy to think the two are unrelated as, at first glance, they’re completely different products operating in separate hemispheres. However, they’re more intertwined than you may expect, with Cyber Security becoming a fundamental component of maintaining your brand safety while still enjoying optimum Fibre to your Business.

First off, Fibre on its own is vastly superior in terms of safety and overall security. Not only is it less prone to theft or interception, but the high speeds involved allow for minimal interference and easier preventative action should a breach occur.

With Vox Business Fibre, not only can your Data safely be stored in our Cloud facilities, but you have access to the fastest, most reliable means of transmitting your information. Combine this with our numerous Security based offerings (such as Firewalls, AntiVirus, Patch Management and Backup) and not only is your organisation safeguarded against threats, but also backed up with the necessary support to minimise any damage incurred.

That’s great, but what does this mean for my business?

Well, the average cost of a Cyber Breach has risen from around R3million pre-Covid to around R4 million for any SME unfortunate enough to be impacted by it. Compare this to the minimal monthly costs of maintaining a security strategy which prevents said breaches, and the reward far outweighs the potential risk.

It’s not some tale of woe from a distant land either, as South Africa is the 3rd most targeted country in the world when it comes to Cyber-attacks. And, if you’re thinking “my company is too small for anyone to worry about”, we’re sorry to break it to you but SME’s are actually the perfect target, as their lack of adequate security measures makes them significantly easier targets than huge corporations with high-end protection.

Hopefully you’re not running around waving your hands in panic by now, because we’re here to tell you that, despite all the above, there’s still a ray of hope.

In fact, with the correct solutions and proper training, you can reduce your risk by up to 95% (fun fact: 95% of security breaches are the result of human error – so a little training can mitigate a large portion of the risks involved).

With Vox and our best-in-class Cyber Security Solutions, we’re making your organisational safety easily accessible to all Vox Fibre customers. These solutions are tailor-made to ensure your business enjoys the best protection available, in doing so protecting your business, your Data and your important customer information.

Better yet? Our solutions aren’t limited to high-end businesses with a massive staff component either, as they can cater for the SME with 20 or less users as well as the 40 plus range accordingly. The best part? Your security budget isn’t tearing your ceiling a new one – as they start as low as R3 436.00pm.

At the end of the day, a small monthly outlay is nowhere near the potential costs incurred by a Security Breach. Factor in that the new POPIA regulations present the threat of further fines (or even jail-time) for any organisation deemed to be negligent with their customer information, and the decision to take the matter as seriously as possible is a no-brainer.

The sad reality is that we live in a world full of threats – both in the real world and, unfortunately, the digital one as well. Just as your business wouldn’t leave its office unlocked and invite thieves to help themselves, your virtual security needs to be guarded under lock and key. Well, with Vox Cyber Security Solutions, you won’t just have a lock and key, but rather a padded cell, armed guard and machine-gun wearing Pitbull to boot.

There’s No Point in Having an Unmanaged Firewall

Unmanaged Firewalls can potentially be just as dangerous as not having one at all.

Before I explain, let’s discuss exactly what a Firewall is.

Firewalls are software or a hardware appliance running firmware that prevents unauthorised access to a network. This is done through sets of rules to identify and block threats.

Firewalls are typically used in both enterprise and personal environments, and some devices even come with built-in Firewall software – like Windows 10, for example.

But what makes them so important? At least, since they first appeared in the early days of Internet. Networks needed protection from unwanted access through the interconnected networks, which became the modern Internet. Nowadays, Firewalls have become the foundation of network security.

Firewalls are complicated to maintain, so it’s important to understand how they work.

A Firewall establishes a border between an external network and the network it guards by inspecting all data entering and leaving that network. This process requires the setup and configuration of pre-configured rules to determine good or bad pieces of data, referred to as packets.

Packets contain important information, including the data being transferred and information about the data, like where it came from.

Firewalls use this information to determine if a packet stream is in line with its rule set. If it fails, the Firewall stops the stream from entering the network.

Rule sets are setup according to several things, including:

  • The source
  • The destination
  • The content

If one had to consider a more real-world analogy, Firewalls can be compared to the fence and security gates around your home. Yes, we have burglar bars on the windows and security gates at the doors, but without a fence, when a burglar walks down the street, they have free access onto the property.

Firewalls are therefore installed at an organisation’s network perimeter to guard against external threats, or within the network to create segmentation and guard against insider threats.

In addition to immediate threat defence, Firewalls perform important logging and audit functions. They keep a record of events, which can be used by administrators to identify patterns and improve rule sets. These rules should be updated regularly to keep up with ever-changing cyber threats.

Again, taking the burglar analogy into consideration, a fence might keep burglars off our property, but when we live in a complex, access needs to be controlled, and some form of register needs to be kept to ensure we know who enters, exits and what their reason for visiting is.

A Managed Firewall can be compared to the security company who controls all of that on behalf of the residents of a complex.

Managing a Firewall is therefore extremely important to protect information assets inside of the network, and not managing it properly is almost as bad as not having a Firewall at all.

Securing Business Systems Goes Beyond the Technology

While companies invest a great deal of time and effort in securing their systems, remote and hybrid working has forced businesses and their staff to acknowledge that security goes beyond IT. For all the best technology, a human lapse could result in a catastrophic breach.

Let’s use an analogy that many South Africans will be accustomed to. Security conscious estates or complexes have varying levels of access control. These complexes have high walls, electric fences, security guards manning key entry points, and many – if not all – have security monitoring and patrolling the premises 24/7.

It’s possible that this environment could lull someone into a false sense of security, and they’d let their guard down. However, we know that this would be a mistake. Just because the complex or estate boasts these security measures, there are still several ways someone could be at risk.

When they enter and leave the complex, they could become targets of criminals. When they are inside their own unit, they may not be aware of an undetected breach at the estate’s entrance. It is possible criminals are operating from within the secured estate. What if they have adult children going in and out late at night?

Obviously, this is not an exhaustive list of possibilities, but the point is obvious – it would be a mistake to be lulled into taking anything for granted because we understand that security extends beyond the physical measures in place. And so, in the South African context, one invests in physical security, and then continually remains aware of risks and behaves in a way to minimise them.

Similarly, securing a company requires a conscious effort and it involves an interplay of people, processes, and technology. In a traditional workplace setup, a company can – and will – do all that it can to control its environment. As the pandemic has shown so vividly, this environment no longer exists only in a physical form, yet the requirement to secure it remains.

A company can no longer lock the doors and rely on the fact that access is restricted. Systems need to be accessed remotely and in providing for this you lose control of the environment. As sobering as it is, you must start with the premise that your staff will, at some point, leave their laptop unattended in a public space.

Securing company systems requires protecting your software, protecting your hardware, protecting and backing up your data, and the ongoing education of your system’s users. To get this right, it is important to ask – and answer – who is accessing your systems; from where; using what; how; and why are they accessing them?

Who is trying to access your systems?

In an ideal scenario, it is your employee attempting to access company systems. However, someone may have stolen login credentials, which would be a targeted and planned attack. Alternatively, it is also possible someone encountered an unlocked device and is opportunistically attempting to gain access. There are various ways to mitigate this risk. User access management is paramount. A company needs strong password policies such as complexity rules and password resetting timetables. Multi-factor authentication adds a layer that could be the difference between being breached or not.

One cannot always rely on an employee to remember to lock their devices every time they are not using them, and so auto-lock is crucial. Encrypting external devices such as hard drives and USB sticks is vital – what if an employee leaves a USB stick on a coffee shop table or airport lounge chair?

Where is the employee working from?

Remote working means that an employee must access systems from various locations. In many instances it will be their home, but they could also be accessing systems from an airport or café. As a priority organisations should implement virtual private network (VPN) technology to ensure encrypted and private access to the corporate network.

As part of the ongoing education, employees should learn to become aware of their surroundings and the potential for eavesdropping. They should make the care and security of physical assets like laptops a priority. This extends to clean desk policies – nothing should be left lying around, while each employee should understand how to appropriately dispose of printed documents.

What devices are they using to access systems?

As far as reasonably possible, it would be wise to restrict access to company systems from devices other than company-managed assets. It is not ideal for staff to use personal or shared devices. With company-managed assets, a business can invest in central device management software, including the ability to wipe devices remotely. It enables companies to encrypt hard drives, ensure appropriate back-ups are in place and to update devices with the latest operating systems and malware and antivirus software.

How is the employee accessing your systems?

While employees may access company systems through their dedicated home fibre, it is also possible they are connecting via public Wi-Fi access points. Again, it can never be overstated – education is paramount. Take the time to teach staff about the dangers of unsecured Wi-Fi and honeypots, as well as being aware and alert to their surroundings.  Then reinforce this message consistently.

Why are they accessing the company system?

They may need to access emails and collaboration tools, but it may also be that they work in critical areas such as payments. There are various things a company can do here, including limiting access levels dependent on the employee’s job function, monitoring the device activity of staff working in critical areas and running vulnerability scans and penetration tests, which are simulated cyberattacks against your own system to isolate vulnerabilities that need to be addressed.

Securing a business’s systems is an ongoing task. It is about cultivating a company-wide security mindset as much as it is about investing in the best available technology.

Very much like living in South Africa today.