How IoT is enabling the rise of smarter South African homes

By Poena van Heerden, Senior Product Manager IoT, Vox

As South Africans become increasingly tech savvy, the reality is that they are also looking at ways to make their homes smarter in order to increase convenience and enhance safety by using a wide variety of DIY Internet of Things (IoT) sensors that can be easily connected, and their data viewed remotely.

Sensors are becoming smaller and cheaper, but with increased capability, lower power usage and durability and it is predicted that there could be 22 Billion connected devices by 2025. Although the Industrial IoT market is well established, an increase of sensors and solutions in the consumer market is expected, to enhance safety, cost saving and convenience.

A further enhancement to the above is the availability of IoT specific networks, such as the Sigfox Network that is operated by Sqwidnet, which provides coverage across 93% of the South African population. The availability of these networks eliminates the installation of home or business networks. Combine this with low powered, user replaceable batteries, that eliminates power outages, the user can view – the IoT devices without any restrictions.

The variety of sensors that are available in the market varies in complexity to suit all requirements, which can be for industrial, commercial or residential purposes.  Using an IoT mobile application or web application, the user has the capability to change certain measurable parameters or conditions on the sensors, via the IoT Network. The information received from the sensors can be viewed, analysed, and trigger an alarm to assist the user to react to a condition and make a decision where necessary.

These easy-to-install sensors provide users with flexibility in that sensors can be moved to suit changing conditions or requirements. Some basic sensors that are available to the consumer market include Smoke Detection, Water Leak Detection, Door Open /Closed Sensors, AC Power On/Off, Temperature sensors with a minimum and maximum setting, Vibration sensors as well as GPS tracking sensors.

Consumer IoT as a service

At its most basic level, an IoT solution comprises three main components:  sensors, a data transmission network, and a platform to analyse and view the information. More complex IoT solutions are also available in the market, with a level of Artificial Intelligence (AI) that integrates with other automated components to achieve the desired outcome, such as automated switching on of lights when dark or temperature control, etc.

Whilst IoT is still in its infancy stages (compared to other similar technologies), the use of IoT was predicted many years ago and can be associated with the following statements:

1926Nikola Tesla  – “When wireless* is perfectly applied the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole………and the instruments through which we shall be able to do this will be amazingly simple compared with our present telephone. A man will be able to carry one in his vest pocket.”

*not the 802.11 version

 1950Alan Turing wrote an article “It can also be maintained that it is best to provide the machine with the best sense organs that money can buy, and then teach it to understand and speak English. This process could follow the normal teaching of a child.”

 We live in a connected world, and people are looking for ways to use IoT and other smart devices to increase convenience and safety, improve energy efficiency and even save on costs. Given the way in which these sensors work, they can be used for multiple purposes across the home. The use cases are numerous and are only limited by the user’s imagination.

South African Firms Will Soon Feel the Full Impact of Data Breaches

While the growing number of data breaches and cyber attacks on companies shows that organisations are often not adequately equipped to protect themselves against such threats, privacy regulations being rolled out in many countries, such as GDPR in Europe and PoPIA in South Africa, means companies that fall victim will face further negative impact in the form of severe financial penalties.

Cyber threats such as ransomware cost businesses US$11.5-billion in 2019. The WannaCry ransomware affected many large organisations, including the British National Health Service (NHS). It affected an estimated 200 000 computers in 150 countries and caused damages estimated to be in the billions of dollars. Other popular ransomware attacks include CryptoLocker, CryptoWall, TeslaCrypt and SamSam, among a host of others. The cost has ballooned to $20-billion in 2020, with major companies such as Canon, Foxconn, Garmin, and Travelex being affected.

And, this is just the tip of the cyberthreat iceberg. Beyond ransomware, cyber criminals are engaging in social engineering, phishing or spear phishing, carrying out distributed denial-of-service (DDoS) attacks, exploiting software vulnerabilities (especially when not kept updated), strategically compromising company websites to access sensitive data (using tactics such as SQL code injection) or even adding ransomware to a particular organisation’s website as a way of targeting other companies that it works with (known as watering hole attacks).

If hackers from outside weren’t enough, organisations must also deal with insider threats from current, past or temporary employees or even third parties such as suppliers and customers, where loss or theft of data could be accidental, negligent or malicious.

Organisations Need More Than Just a Wall

Business growth today is driven by technological innovations: we’re more interconnected than ever, with our networks connecting mobile devices and Internet of Things (IoT) devices by the millions. In addition, IT is becoming more software-defined, and more of it is moving to the cloud in order to meet expectations of seamless remote working, making cybersecurity critical.

Organisations need to start off with a comprehensive risk assessment that helps identify the threats that they face, what controls need to be put in place. They can deploy various technologies such as network and infrastructure security as well as endpoint security – to prevent or reduce the impact of cyber risks, depending on what they deem to be an acceptable level of risk.

To achieve this, they need specialised technical staff who are equipped with the latest skills and qualifications to ensure that appropriate controls, technologies and practices have been implemented. However, not all organisations have access to such skills though, and it is imperative that they work with a trusted partner – that can enable businesses and remote workers with connectivity, hardware, software and managed services – in order to be able to fight off the latest cyber threats.

A company’s employees are critical to the success of their cybersecurity efforts.

Everyone in the business needs to be aware of their role in preventing and reducing cyber threats, whether it is handling sensitive data, understanding how to spot phishing attacks – data shows that 95% of hacking attacks start with phishing or spear phishing emails – and ensuring that security policies are adhered to when working from their own devices.

Despite best efforts, data breaches and loss still do happen, and companies need to be adequately protected. More recent offerings in the market such as cyber insurance cover businesses against financial loss, disruption and reputational damage that result from cyberattacks. It covers software and data, and it protects against liability arising from the misuse of, and third-party attacks on IT infrastructure. This includes data breach expenses, extra costs, and loss of income, as a result of insured incidents.

Furthermore, putting proper process in place is crucial in defining how the organisation’s activities, roles and documentation are used to mitigate the risks to their information. These processes also need to be continually reviewed: cyber threats change quickly and processes need to adapt with them. But processes are nothing if people don’t follow them correctly.

Financial Impact of Cyber Attacks

Overall, organisations – and the IT departments within them – face the tall order of effectively managing their security risk while also supporting growth. A further challenge is the introduction of privacy regulation in several regions, such as GDPR in the European Union and the Protection of Personal Information Act (PoPIA) in South Africa, which requires organisations holding data of their citizens to put sufficient measures in place to safeguard this data, and holds them accountable in case of a data breach that results in the theft or leaking of personal information.

In South Africa, the penalties for failing to comply with PoPIA include a maximum of a R10 million fine or imprisonment for a period not exceeding 10 years or both, for serious offences; and a fine or imprisonment for a period not exceeding 12 months or both, for less serious offences. PoPIA was put into full effect on 1 July 2020, with local organisations being given a year’s grace period initially. The Information Regulator has stated that there will be no further exemptions, meaning that local businesses have less than a month to ensure they are compliant with the full regulation.

Fines placed on companies found to be in contravention of regulations can vary according to region. For the GDPR, it is up to €20 million, or 4% of the firm’s worldwide annual revenue from the preceding financial year, whichever amount is higher. Similar amounts are listed for the UK GDPR and Data Protection Act. Prominent companies that have been fined for data breaches at their organisation include Equifax ($575-million), Uber ($148-million), Yahoo ($85-million), Google ($7.5-million) and British Airways (£20 million).

On top of this, there is still the cost of the root cause analysis into the attack, identifying areas for improvement, and making the changes. With costs potentially running into the millions, hundreds of millions or even billions, organisations need to do more than pin their hopes on protections built in within operating systems and basic firewalls and antivirus software. They need to take a holistic and proactive approach to defending their networks, devices, software and data from attacks, loss or unauthorised access by using people, technology and processes to create strategies to protect data, ensure business continuity and safeguard against reputational and financial loss.

Adopting a Unified Communications (UC) Strategy

Hate it or love it, the hybrid workforce is now a universally accepted construct – as is the similarly unanimous acceptance of its fragility. Today you’re working from home, but tomorrow you could be back at the office.

While both locations have their merits, they also face similar challenges and share a mutual need to be able to connect with co-workers, customers and suppliers via singular, unified platforms. Each environment requires adequate support in order to function properly – especially with regards to the appropriate video and voice endpoint.

The workspace of the future needs to be flexible and support your communication requirements in a meaningful way.

The demands of hybrid working can be taxing, and you need to be able to spend time on what matters while technology is managed in the background.

So, why UC?

Unified Communication (UC) has become, in our opinion, the only strategy worth adopting. Not only is it more integrated and user friendly, but it provides an intuitive, ‘one touch to join’ functionality together with a consistent user experience on mobile and boardroom systems alike. At Vox, we have hand-picked a range of UC solutions. These solutions are packed to the brim with features to efficiently secure and simplify online meetings with functionality, flexibility and affordability in mind.

Keep connected, communicating and collaborating with a solution for any space and budget – you won’t have a problem finding a Bring Your Own Meeting (BYOM) or Microsoft Teams Room (MTR) solution, no matter what UC platform your brand has adopted.

What are my options?

Both BYOM and MTR have their respective strengths and benefits, and an amalgamation of both should sufficiently compliment any business communication needs. This mix allows for complete efficiency, with selected solutions even catering for both on a single device. Ultimately, with room for complete customisation as per your brand needs, there’s something for everyone – from basic online meetings to advanced Teams video calls.

Tell me more about BYOM:

When it comes to BYOM, our approach to video conferencing is highly flexible, as users simply connect their mobile device (either via cable or wirelessly) and begin their meeting. Doubtful about wireless? Our new breed of solutions will have you up-and-running in under 30 seconds. The experience will allow your device to fully sync with the tap of a button and enjoy an intelligent, auto-tracking camera, noise blocking microphone and immersive sound bar. Your digital meeting experience can reach new heights; and longing for the way things used to be done will be a thing of the past.

What about MTR?

Well, Microsoft Teams has connected the world in a way we never imagined, bringing new levels of live, online collaboration that redefine efficiency.

Said collaboration tools have extended into a highly customisable Teams app, which features a plethora of features guaranteed to boost your communication. However, while these new features do excite us, the core focus of Microsoft remains improving quality of service for limited bandwidth and improving overall security – not the end user experience.

Microsoft Teams Room, however, has a wealth of new features definitely worth mentioning. From one touch to join to proximity transfers, mobile compatibility, transferring of a single call across devices and boardroom functionality to uninterrupted functionality, you’re spoiled for choice with MTR. In addition, their latest feature completes the UC offering and offers PSTN dialling from any Teams app, thereby further enhancing their overall service offering.

Ultimately, why choose Vox?

We have the expertise and knowledge to maximise the efficiency of our platforms whilst equipping every workspace with fit-for-purpose collaboration devices. Not only do we cater for the MTR hardware device, Fibre connectivity (both last mile and ISP services) and beyond, but our service offerings include MTR licensing and direct audio routing with voice plans.

The time to consider how you and your colleagues transition from the home office to the office cubical, boardroom and back is now. Enhance your user experience while waving goodbye to “sorry, I’m late” and “can you guys hear me”. The new hybrid working world has seen an increased reliance on effective communication and, with video conferencing more affordable than ever, it’s worth investing in a UC strategy which synergises with your business outcomes and enables a truly digital workforce.

Can Microsoft Teams Replace your Phone System?

Ah, Teams.

The backbone of WFH and the brand champion of these sombre times. Many impersonators have made inroads along the way, but there was always only going to be one winner. Although in any other time in history Teams would be the unappreciated stepchild of the Microsoft Office family, it’s now the blue-eyed golden gal – and we’re better off for it.

Our new way of living and the introduction of hybrid, home-meets-office workspaces has seen Teams surpass even Word and PowerPoint as Microsoft’s most-used tool. Truth be told, it’s even replaced decades long concepts such as boardrooms or in-person appointments, but that’s a story for another day. Our focus today is unpacking the future of communications while asking ourselves that all important question – can Microsoft Teams replace your Phone System?

First off, why Teams?

Well, in light of the pandemic, Teams has seen its growth increase exponentially. Don’t believe us? We’ve done our homework.

  • At present, there are an estimated 145 million daily Teams users worldwide.
  • As of April 2020, this number was “only” around 44 million.
  • In the first month of lockdown alone (March – April 2020), Teams usage jumped to 75 million (or a 70% increase in 30 days).
  • By June of the same year, this usage was up by 900% overall.
  • The entire country of Russia has a population of 146 million – there are as many people using the Teams app per day as there are living in Russia. Let that sink in!

In the first few months, Skype and Zoom may have had a shout, but as the marathon continued Teams began to pull away – and for good reason. It’s rich features and diverse functionality allow for full business continuity without the hassle of intense training and processes. Most technologically savvy employees can figure out the ins-and-outs relatively easy, and it’s a bug-free, simple solution to meeting, calling and conferencing dilemmas.

And, with more people using the app than even Microsoft themselves may have anticipated (although we did hear some theories about Bill Gates…), SME’s and corporations are sitting up and paying attention. Traditional phone systems are sadly becoming archaic, and many of the features offered by Teams are in fact crucial to the new working world. In many ways, the move makes sense on paper, but is it genuinely worth it?

The Pros and Cons of Teams:

Naturally, a large part of the allure of Teams is down to the capabilities offered by the programme not found on traditional phone systems. Video calls, live chat, file storage, sharing and group meetings – it’s like a real life office space. However, it’s important to note that at it’s core, the software wasn’t designed for enterprise-grade communications any more than a Rolls Royce was created for off-road racing. True, the former may be the pinnacle of innovation and technology, but there are certain heavy duty capabilities only suitable to products specifically designed around them.

True, Teams does have so much going for it that your day-to-day needs are more than catered for, but what about when your communication needs expand beyond this?

It’s important to evaluate your business needs and decide whether Teams is truly viable. Make no mistake, many small businesses may actually enjoy simplified communication and find it more conducive to their working model (provided, of course, that these brands work within their parameters and don’t require anything higher-grade). However, when you factor in functions such as multi-location or advanced call routing, queuing and reporting, you may find out that the switch is not as appealing as you initially thought.

What you need to consider:

 Before making the choice to swap out your existing system, you need to ask yourself if the new one (in this case, Teams) will negatively impact your customer experience. Consider factors such as call quality, extensions, uptime and transfers (which are all standard features with even the most basic Phone Systems). Enterprise-level functionality requires a system that is speedy, efficient and built for high-demand, high-volume call rates and, sadly, Teams was simply not designed for large-scale communication operations.

Make no mistake, the app has been a lifesaver to most WFH users and many a brand – including our own. However, it’s a collaboration system with calling features rather than a calling platform on its own. Any enterprise who makes its bread and butter off intense communications requires in depth-features and functionality, and Teams (no matter how great) wasn’t designed for such.

Microsoft Teams is a fantastic platform, of that there’s no doubt. However, the simple answer is no, it can’t be used to replace an existing phone system if you’re a brand that requires more than basic functionality. On a smaller scale wherein internal comms and meetings are your basic requirements, sure, but the moment you factor in enterprise-voice capabilities, you’d be better off with something created for such a purpose. In fact, you may actually compromise your customer experience and, ultimately, your bottom line through trying to fit a square peg in a round hole, and it’s always better to be penny wise AND pound smart.

Our suggestion? Amalgamate the two. Use Teams for its intended purpose, and for allowing your collaboration internally to skyrocket.

Your employees deserve the best tools in order to perform at their peak, and modern communication needs demand modern communication solutions.

Let your Teams handle your Team, but don’t shoot yourself in the foot and accidentally hit your customers in the process.

Navigating Internet Usage and Safety Against Digital Predators

Unfortunately, we face a grim reality around sexual abuse online against children. The question remains: How can parents identify and address the problem and how do we better navigate internet usage and safety for our children?

A study conducted via the Centre for Cyber Safety and Education assessed the usage of kids between grades 4 and 8, and the results were quite alarming. From the findings, some of the more damning statistics indicated that 40% of the kids surveyed had either connected or chatted with a stranger online. Of those:

  • 53% had revealed their phone number to a stranger.
  • 21% spoke via phone with a stranger.
  • 15% attempted to meet a stranger.
  • 11% met a stranger in their own home, the stranger’s home, a park, mall or restaurant.
  • 30% texted a stranger from their phone.
  • 6% revealed their home address to a stranger.

Scarily, 90% of these kids revealed they have at least one device capable of unmoderated browsing. This indicates a serious problem with potentially devastating consequences, as not only are our kids sitting ducks but there is a world full of dangerous predators ready, willing and able to take advantage of them.

What can we, as parents, do about it?

Thankfully there is a variety of behaviour and technology-based controls for parents to implement to safeguard their families:

  • Parents can moderate airtime and restrict access between certain hours. For example, no device time if they’re meant to be studying or sleeping, and move the family devices to common areas where you can keep an eye on their browsing habits. For toddlers, you can download content in advance and switch off the connection later, and even games or social media should be carefully controlled.
  • It’s relatively easy to regulate your kid’s social media content. Teach your young ones what not to share with the outside world (particularly new people), as predators take advantage of naivete. Educate them on not revealing private information such as plans, addresses or whereabouts, and maintain an open line of communication so that they’re not afraid to confide in you. Be open and explain the dangers, and don’t yell if they make a mistake, let them feel like you’re there to listen should anything unwanted occur.
  • You should also educate your kids on the dangers of adding, accepting or meeting strangers online (again, even when gaming). Remember that it’s easy to change your identity and pretend to be someone else, which is what many people do to gain the trust of their victims. Warn your little ones about the dangers of meeting anyone they don’t know and enforce strict rules around keeping you informed of their whereabouts at all times.
  • Lastly, set Internet guidelines and disable location services via your apps. Keep an eye out for behavioural changes including sudden secrecy, unexplained gifts or increased alone time. As a parent, you usually instinctively know when your child is upset. However, pay close attention to their behaviour for anything unusual; particularly before, during and after going online.

Cyber Security Software

Although your first steps should be correcting browsing behaviour, there are several tools designed to protect your kids online which should be considered your primary line of defence.

Parents should consider trusted security software that helps keep their kids safe online by allowing them to block access to adult websites and content, block inappropriate apps as well as harmful search requests on YouTube, manage access to games and even screen time by device.

Further protections can include using the GPS tracking feature of smartphones to locate your children in real-time and even having the ability to define “safe zones”, with instant alerts if your children move beyond the selected area.

Some good examples of software to look at include an Anti Virus for the Home with a Safe kids function, social media and dark web scanners, firewall products for the home or DNS security solutions.

In your journey to make things safer for your child, the more protection the better. Sadly, predators are real, and any kid can be a victim. As a parent, I strongly believe in all the products and measures stated above, and I pray that these may be of similar assistance to you.

 

TP-Link Deco is Here to Save Your Wi-Fi Network and Your Sanity

More than just a quick way to boost your coverage, TP-Link Deco lets you take control of Wi-Fi usage in your home with a handy app.

Where would we be without Wi-Fi? As brilliant as it may be for carrying the Internet to our devices, it does come with one or two drawbacks – especially as we’re all spending a lot more time at home now, staring into screens of various sizes.

This new reality has meant we not only rely on the need for fast, reliable connectivity – for work and play – but also smarter ways of limiting screen time and keeping our kids from going down potentially destructive social media spirals.

Your Wi-Fi, your way

First, let’s talk coverage. We all love it. We all need it. But it’s hands down one of the most frustrating things to get right. Unfortunately, there are loads of obstacles in modern homes that impact our coverage and bandwidth.

These include, but aren’t limited to, the size of our house, what the walls are made from and how thick they are, how many floors we have and whether our router is near other objects that might interfere with the Wi-Fi signal, like a microwave or even a fish tank.

Mesh Wi-Fi offers a great solution for creating a seamless network in your home quickly and easily. All you need to do is place a mesh router in the areas of your home most in need of a signal boost and you’re all set. If you need more coverage, you simply add a mesh unit where needed.

If you choose TP-Link Deco, you’ll not only enjoy seamless Wi-Fi throughout your home, you’ll be able to monitor Internet usage from the palm of your hand via the Deco app – one that includes robust parental controls.

Worried about screen time? There’s an app for that

The Deco app is designed to help you set up your TP-Link mesh solution, but it also includes a ton of other useful functionalities to help make your day to day life just that much easier – especially when it comes to monitoring and limiting websites and screen time for your kids.

With the TP-Link Deco app, you can create a profile for each member of your family and manage them individually. This means if one of your kids is on an Internet time-out, no one else suffers too – their devices will be the only ones affected. Not only will you be able to cut their Wi-Fi access for a set time, you’ll also be able to limit the sites they visit or apps they use and keep it all extremely age-appropriate with ease.

The Deco app is also invaluable when it comes to setting your TP-Link routers up, as it will guide you to the best placement for each one and give you an indication of how good your Wi-Fi network really is. TP-Link Deco units are also capable of handling up to 100 connected devices, so there’s no need to worry about overloading your network anymore either.

With Vox Wi-Fi Home Mesh, you’ll be able to cover your home in a cosy blanket of Wi-Fi and sleep comfortably knowing your Internet is totally within your control and just an app away.

Reinventing Email for a Digital World

With more than four billion email users globally, there is no arguing the fact that this is still the most pervasive form of electronic communication out there. Whether you are an SME or a large corporate, having email is the cornerstone to engaging with your customers. But as technology has evolved, the way this platform can be leveraged to build a brand has also changed.

Branding lost

One of the mistakes many organisations make is to view email in isolation. Yes, it is a communication tool, but it is also responsible for setting your professional and corporate identity. Given how tight budgets have become, many businesses are tempted to select one of the many free email services available as their primary means of customer contact. And yet, this is probably one of the biggest mistakes they can make.

A generic email domain not only takes away from the brand name of the company but also conveys less of a professional image.

With people becoming increasingly security conscious around scams, fly-by-nights, and even malicious attacks, sending a business email from a free account will not attract significant interest. And when your competitors have a personalised domain, chances are you will lose out to them especially when it comes to people’s perceptions of your brand.

The devil is in the details

In fact, with email, branding is essential as it enables the business to optimise how it works with its target audiences. After all, sending an email means the company knows who it is engaging with. This means email signatures and banners can be used to put specials in place that are relevant to those individual customers.

By including such a banner, a company does not have to reinvent the wheel but simply create awareness of a product or campaign that will likely attract interest from that specific user. It is such a small detail but one that many companies neglect.

Security-focused

Given the changing regulatory environment and the arrival of the Protection of Personal Information Act (PoPIA), companies would do well to ensure the security and integrity of their data. This is more so the case when it comes to email and how it uses customer data to provide tailored communication.

This is where working with a trusted and experienced partner can make all the difference. Using a free service means the organisation has no control over the policies and security measures that are put in place. It is this lack of control that can become the biggest challenge at an organisation. However, an environment managed by a local partner means the organisation can put the necessary policies in place to protect data from leaking.

For instance, a policy can be put in place to make it impossible for an employee to email credit card information and other sensitive customer data. This can even extend to controlling the language contained in emails. Things like swear words, emoticons, and even slang can negatively impact on the professional image the organisation wants to maintain.

And from a security perspective, being able to manage the defensive measures in place can address how email has become one of the main entry points into an organisation. As attacks become more sophisticated, the security mechanisms of freely available email platforms might not be able to adequately protect users from receiving suspicious messages.

Keeping it safe

Of course, no environment is completely hacker-proof. This is where your local partner must provide the necessary disaster recovery and business continuity features that keep your emails safe and quickly recoverable from compromise.

After all, you want to remain focused on your core business priorities and not spend time managing all the complexities around email. Having access to locally-developed solutions that are priced at the correct value proposition for the market makes a massive difference in this regard.

With email becoming the first line of engagement your business has to the outside world, can you really afford not to have it convey a professional image while delivering you the security and business continuity features you need.

Take Control of Your Data

Estimated Reading Time: 3 Minutes

We can all agree – when it comes to the safety and security of one of your most valuable assets, there’s no such thing as overkill in data protection.

Data makes the world go around. A data breach doesn’t just have devastating consequences for businesses, the effects can ripple out and ruin the lives of regular people too.

Just look at the chaos that ensued in the United States recently when a prominent pipeline operator on the East Coast fell victim to a ransomware attack and had to go offline for six days before it could contain the threat. This sent almost everyone in 17 states on the Eastern seaboard into panic-buying pandemonium, filling up everything from multiple cannisters, barrels and mini tankers to, yes, cardboard boxes, with gas and depleting gas station reserves on the entire East Coast as a result.

Even if you’re not worried about the threat of cybercrime (honestly though, who isn’t?), your data is still at risk thanks to hardware/system failures and human error.

There’s no better time than now to take control.

Tick all the boxes

The 3-2-1 backup strategy has long (well, 11 years and counting) been considered best practice by IT professionals when it comes to data protection. Essentially, it boils down to this: you should have at least three copies of your data (one in use, the second for failover and a third for additional comfort) stored on two different mediums (i.e. disk and the cloud) with at least one of those options stored safely offsite – preferably in the cloud.

Related: We’ve Got Your Back(up)

If you opt to store your data in the cloud, don’t be afraid to ask the tough questions to find out if your data centre of choice has protocols in place for fire suppression and a back-up power supply for redundancy, because there are other threats to your data besides cybercrime.

It’s also worth storing your data in an ISO 27001 certified data centre, as this means it meets the international standards for the overall management of information security. It’s not exactly a walk in the park for data centres to achieve this kind of certification either and once a certificate is awarded, the certification body continues to perform surveillance audits to ensure best practices are not only maintained but improved upon.

Frequent backups and multiple copies of your data are important, but it’s the recovery portion of your data protection strategy you should really be focusing on.

How fast you recover from a data disaster could mean the difference between keeping your company running or shutting up shop forever.

Choose fool-proof failover

The financial impact of a data breach will depend on the severity of the attack as well as how long it takes for you to bounce back from it, which sometimes results in tens of thousands of rands lost per hour. In fact, by our calculations, 70% of SMEs that suffer a ransomware attack go out of business six months later.

In addition to robust security protocols, your data protection plan should include the assurance that not only is your data being backed up, it’s being monitored constantly to make sure your backup data is not only error- and virus-free, but instantly accessible if disaster strikes.

Vox Backup is powered by Veeam, meaning you get the benefit of powerful and reliable, market-leading backup and replication software. If you opt in for Managed Backup, our skilled engineers will supply detailed monthly reports of your backup and recovery strategy to keep you in the loop.

Cybercriminals are annoyingly determined, and even with the most robust security protocols in place, you might still find yourself falling victim to ransomware. Should the actual worst happen, your managed backup and data recovery plan will literally save the day.

How IoT is Enabling the Rise of Smarter South African Homes

As South Africans become increasingly tech savvy, the reality is that they are also looking at ways to make their homes smarter in order to increase convenience and enhance safety by using a wide variety of DIY Internet of Things (IoT) sensors that can be easily connected, and their data viewed remotely.

Sensors are becoming smaller and cheaper, but with increased capability, lower power usage and durability, it is predicted that there could be 22 Billion connected devices by 2025.

Although the industrial IoT market is well established, an increase of sensors and solutions in the consumer market is expected, to enhance safety, cost saving and convenience.

A further enhancement to the above is the availability of IoT specific networks, such as the Sigfox Network that is operated by Sqwidnet, which provides coverage across 93% of the South African population. The availability of these networks eliminates the installation of home or business networks. Combine this with low powered, user replaceable batteries, that eliminates power outages, the user can view – the IoT devices without any restrictions.

The variety of sensors that are available in the market varies in complexity to suit all requirements, which can be for industrial, commercial or residential purposes.  Using an IoT mobile application or web application, the user has the capability to change certain measurable parameters or conditions on the sensors, via the IoT Network. The information received from the sensors can be viewed, analysed, and trigger an alarm to assist the user to react to a condition and make a decision where necessary.

These easy-to-install sensors provide users with flexibility in that sensors can be moved to suit changing conditions or requirements. Some basic sensors that are available to the consumer market include Smoke Detection, Water Leak Detection, Door Open /Closed Sensors, AC Power On/Off, Temperature sensors with a minimum and maximum setting, Vibration sensors as well as GPS tracking sensors.

Consumer IoT as a service

At its most basic level, an IoT solution comprises three main components:  sensors, a data transmission network, and a platform to analyse and view the information. More complex IoT solutions are also available in the market, with a level of Artificial Intelligence (AI) that integrates with other automated components to achieve the desired outcome, such as automated switching on of lights when dark or temperature control, etc.

Whilst IoT is still in its infancy stages (compared to other similar technologies), the use of IoT was predicted many years ago and can be associated with the following statements:

1926Nikola Tesla  – “When wireless* is perfectly applied the whole earth will be converted into a huge brain, which in fact it is, all things being particles of a real and rhythmic whole………and the instruments through which we shall be able to do this will be amazingly simple compared with our present telephone. A man will be able to carry one in his vest pocket.”

*not the 802.11 version

 1950Alan Turing wrote an article “It can also be maintained that it is best to provide the machine with the best sense organs that money can buy, and then teach it to understand and speak English. This process could follow the normal teaching of a child.”

 We live in a connected world, and people are looking for ways to use IoT and other smart devices to increase convenience and safety, improve energy efficiency and even save on costs. Given the way in which these sensors work, they can be used for multiple purposes across the home. The use cases are numerous and are only limited by the user’s imagination.

It’s Time for South Africans to Get Serious About Wi-Fi

With South Africans spending more of their time on the Internet to carry out a wide variety of activities, and now even increasingly working from home, they need to give more consideration to the Wi-Fi networks in their home – and rely on advice from their ISP (Internet Service Provider) – to ensure they benefit from the best and most consistent online experience possible.

Many users tend to get confused between the Internet and Wi-Fi – using these words interchangeably –  and poor or unreliable connectivity often tends to get dismissed as ‘an Internet problem’ that might probably be caused by the infrastructure provider or your ISP.

It’s important to note that the Internet connection you get from your provider, and your home Wi-Fi network are two different parts of a broader ecosystem that rely on each other to provide the optimal Wi-Fi experience.

While users increasingly prefer Wi-Fi for its convenience (who wants to still be using cables?), user behaviour and requirements these days are a far cry from even just a few years ago, when you could simply connect the Wi-Fi router you got from your ISP and get on with it. In today’s homes, each user likely has multiple mobile devices, while equipment such as smart TVs and gaming consoles crave high bandwidth to display content in 4K.

It’s not the same situation in every home though, and Wi-Fi cannot simply be a one-size fits all solution. Rather than simply plugging in the default router and hoping for the best, users should work with their ISP to better identify their specific requirements, and then ensure that they get the best home Wi-Fi solution to match their needs.

So, what do people need to keep in mind when looking to improve their Wi-Fi experience? Having a resilient home Wi-Fi network comes down to the following:

Connectivity: while dependent on what is available to you in your residential area, the type of connection that you use has a major impact on your Wi-Fi experience. Fibre-to-the-Home (FTTH) is the preferred option due to stability, consistency and cost, though wireless options such as Fixed LTE-A and 5G are gaining in popularity. Having more than one type of connection is ideal as it provides you with redundancy should your primary means of connectivity fail. This is recommended for those who are working from home, and need to ensure uptime.

Planning: several factors need to be taken into account to ensure the quality of your home Wi-Fi network, including the size of your home and the materials it is built with, the desired coverage area, the number of devices that need to be connected (adding a high number of devices to your Wi-Fi network without accounting for it can lead to congestion, resulting in limited bandwidth being available to each device), where these devices are located and what their speed requirements are.

Considering a home mesh network can help eliminate weak signal spots, enable truly seamless roaming around your house and provide lag-free connectivity for a high number of devices. Using the incorrect or outdated equipment can also result in regular Wi-Fi connection problems. It is more efficient and cost-effective to get the design right at the start, rather than spend extra money to fix your network once problems arise.

Installation: this includes ensuring your access points are positioned in the right areas, cabling is added where necessary, and ensuring that your critical network infrastructure makes use of an uninterruptible power supply (UPS) so that your network stays up even during loadshedding. It’s important to note that incorrect router or access point placement can lead to a poor network (and slower speeds) as signals have to be transmitted through different materials.

The biggest culprits of Wi-Fi signal degradation include concrete, drywalling, wood, glass, mirrors and even fish tanks. Also keep in mind that other devices in your home, such as microwaves, TVs, baby monitors and even other Bluetooth devices can interfere with your Wi-Fi signal.

Security and control measures: ignoring this aspect leaves your home Wi-Fi network at risk of being hacked, or just being abused. Your ISP should be able to help you to set up your home network properly, as well as guide you on getting the right security software to protect your network, devices and data.

A home Wi-Fi solution to suit your needs

With an increasing number of South Africans working from home, having stable and secure Wi-Fi access isn’t just a nice-to-have, it is a critical necessity to carrying out their jobs or running their businesses. Rather than just taking an educated guess at matching their requirements with the technicalities of installing a secure, stable and scalable Wi-Fi network at home, they should turn to their ISP for a fully managed Wi-Fi offering if they want the best possible outcome.

Wi-Fi experts, such as the engineers from Vox, can provide you with a home Wi-Fi solution that is suited to your exact needs. They should be able to manage the entire process, from comprehensive scoping to installation by professionals, and use centralised monitoring and management tools to ensure optimised speeds and consistent network coverage throughout your home.

They should even be able to provide you with 24/7 customer support – providing you with worry-free connectivity for all your wireless devices ranging from smartphones to tablets, computers, smart TVs, gaming consoles and even Wi-Fi security cameras. Of course, with even more connected devices coming to the home – think of smart fridges, smart access control systems and even smart switches and plugs that can help you switch on and off lights and appliances from an app – networks will have to handle all of this traffic effectively.

This is where Wi-Fi 6 will make a big difference, thanks to its superior performance when it comes to bandwidth capacity, throughput speeds and even advanced functionality not available in today’s devices. It is still early days though for Wi-Fi 6 in the consumer market, with the technology only starting to appear in devices such as the latest high end smartphones, and piquing the interest of users. However, we have yet to saturate the full capabilities of Wi-Fi 5, and it will take some time before there is mass adoption of the newer standard. In the meantime, shouldn’t your ISP be able to help you get the best out of your home Wi-Fi network today?