Four Critical Priorities Shaping CIO Strategies in 2021

By Tim Wood, CIO, Vox

With the economic rollercoaster ride of 2020 drawing to its uncertain conclusion, CIOs and business leaders are formulating and finalising strategies for what is hoped to be a new year of growth and recovery. There can be no doubt that technology and IT infrastructure will underpin and shape the majority of 2021 strategies – with the global pandemic having radically accelerated many digital transformation journeys (while propelling other businesses into newly formed digitisation initiatives). Arguably, the key to successfully leveraging technology to drive growth and recoveries in 2021 will be determined by the clarity of thinking around IT strategies – as well as leadership’s commitment to simplifying complexity while simultaneously harnessing emerging technology tools and platforms. All too often, decision-makers sway between investing in a plethora of tools that bring risk and complexity into the business environment, or doing too little and falling behind the rapidly evolving enterprise technology ecosystem.

To avoid either scenario, we have highlighted the four critical areas of focus for CIOs that can both deliver business value while enabling growth through savvy cost management…

1 – Clarify the WFH model

Although South Africa’s extended national lockdown forced many businesses to shift to remote working in a very ad hoc way, many have now settled into this mode of working as a way to manage costs in the wake of the crisis. At this stage, it is very important for leaders and CIOs to provide clarity around whether remote working will be a permanent feature for the business – or whether it will pursue a full return to the office.

Without this clarity, the technology support behind employees will be a patchwork affair as opposed to a formal and well-structured system with the requisite features. It also goes without saying that if remote working is being made permanent, then there must be a robust and detailed strategy to ensure that employees are able to perform both productively and professionally. For one, this means making sure that connectivity is guaranteed for every staff member, along with the required endpoint security. Looking ahead, providing some form of remote working and flexibility is becoming a core feature of talent retention and HR strategies – so businesses that remain unclear and/or unprepared for this will be quickly outperformed by their more nimble and responsive rivals.

2 – Get Proactive about Data Protection

With South Africa set to implement its landmark Protection of Personal Information Act (POPIA), CIOs are under pressure to ensure that their data management systems and processes are ready – which will naturally bring them in closer alignment with global best practices and a stricter international data privacy environment. Now is the time for CIOs and their teams to conduct detailed reviews of their systems across all disciplines, which should also include the rules of engagement with employees, contractors, client and third party suppliers. Consumer data privacy is likely going to be a highly topical issue in 2021, and businesses have to consider data leaks and data protection as one of the foremost business risks (and priorities) going forward.

As we have seen, cybercriminals and hackers are becoming more sophisticated in their attacks, and the use of techniques such as social engineering and whaling are becoming scarily commonplace. No business is immune, from large multinationals to start-ups to SMEs, and this makes investment into cybersecurity – as well as cyber insurance – increasingly important. A major part of this investment should include ongoing employee awareness initiatives and training, as well as cyber-attack simulations, vulnerability assessments and audits to make sure that the risks are very clearly understood across the organisation.

3 – Consider Automation of Key CX Touchpoints

As most business analysts agree, customer experience and the seamless resolution of queries is already a major differentiator of brand loyalty and business sustainability. Yet this requires investment into the right technology, guided by a very clear and intentional change management process to ensure that the technology serves its purpose (and doesn’t simply bring complexity and confusion). With this in mind, we believe that the automation and use of AI to drive certain interactions will be key – for instance, by providing chatbots and self-service mechanisms which allow customers and consumers to resolve things independently and at their own pace and convenience. In addition, enabling consumers to transact via intuitive and secure e-commerce channels will also be a key differentiator, and these channels should leverage AI and self-service to make sure that browsing, ordering, payments, deliveries, etc, are all supported by real-time, responsive functions.

It must be noted, however, that automation and indeed any new tech investment should have a clear and well documented business case behind it (ringfencing both scope and costs) – as well as a supportive infrastructure that is inherently agile and responsive to a changing consumer environment. Where technology implementations are proving too costly or far removed from the core business offering, CIOs should not hesitate to pivot and change tack to prevent wasted resources. Importantly, every technology initiative should be underpinned by agile development methodologies with the aim of reducing manual interventions and processes where possible.

4 – Keep a Hawk-Eye on Business Value

In an age whereby technology innovation is developing at a lightning-fast pace, CIOs have to balance the temptation of adopting every new trend with a moderate and thoughtful approach to change management and business growth. This can be achieved by working more closely with business and finance functions to identify where, for example, it makes sense to reduce Capex spend by moving to Cloud environments, and where technology can clearly deliver on business value through increasing sales and revenue. Moreover, 2021 will likely be a year in which CIOs have to use technology as a savvy cost management tool – shifting to outsourced services where it makes sense, for example, and using software to gain real-time views of expenses, productivity, sales performance, and much more.

While 2021 is sure to be a year of recovery and renewed innovation, success will be defined by seamless and engaging customer experiences as well as corporate professionalism – both of which can be fundamentally supported by proactive technology strategies.

Cybersecurity tips for the festive season

The spate of cyberattacks targeting individuals in South Africa in recent months necessitates a more cautious approach to our online activities.

What can we do to become more cybersecurity aware especially with the festive season around the corner?

Not only must digitally-connected South Africans keep the threats of previous years in mind, but hackers have become more sophisticated thanks to the connected lifestyles of South Africans. For example, email and text phishing will almost certainly remain a constant threat. However, more elaborate tactics designed to compromise your financial information and steal your identity are coming to the fore.

Related: What can organizations do to prevent the rise of phishing attacks?

Before we explore some of these, also remember that this is an opportune time for fraudsters to exploit our collective goodwill. Fake charity scams are not unique to the internet. But when combined with all the COVID-19 scams that have been flooding our devices the past several months, it is easy to have one slip through and donate by accident. The best way to mitigate the risk of this happening is to phone the charity and confirm the outreach to your device. The minute or two it takes to make a call can save you countless hours of trying to recover your funds and change your online banking details.

Another familiar, but largely ignored tactic, is to keep your mobile device locked when you are not using it. Lost or stolen phones and tablets are perhaps one of the most significant causes of compromised personal data. If your device supports it, activate the biometrics security feature. This would then require either a retinal or full face scan to unlock the device. At the very least you must lock your phone or tablet with a strong password that contains upper and lowercase characters, special characters (for example $,%, &) and at least one number.

One of the most critically important lessons is to never use public Wi-Fi networks especially when it comes to your online banking and shopping. Even though it is tempting to use the Wi-Fi available at a coffee shop, restaurant, or shopping centre, rather switch your wireless access off completely. Using specialised tools, hackers can ‘eavesdrop’ on these public networks and steal your passwords and other details without you being any the wiser.

Now, when it comes to your device, it is important to always keep your apps and operating system (whether it is Android, iOS, or something else) up to date with the latest patches. These contain essential security features that protect you against some of the latest developments in cyberattacks. Also, uninstall applications you do not use. Not only will this free up additional storage space, but it also reduces your digital footprint by eliminating potential weak points in your security.

Related: Total Security to keep your family protected

It is advisable to disable your location settings when you are out and about. For example, if you check-in at the movies or at the destination of your fishing trip, those who follow you on social media will see you are not at home. Criminals might exploit this information to break in or commit other nefarious acts. As part of this, wait until you are home from holiday before sharing those happy snaps of the beach or bush getaway.

Related: How safe is your home this festive season?

The final tip is the most obvious of all. Your phone and tablet are the windows to your online life. And just like you would not dream of running a laptop without security software installed, so too must your mobile devices also include protective software. It might be tempting to download freely available software to accomplish this, but rather invest a few rands into buying a quality mobile solution.

This will go a long way to ensure your festive season is a safe and happy one.

 

Tips to protect your online identity

A recent US survey has found that 77% of consumers are concerned about online identity theft.

34% of respondents indicating they had experienced a cyberattack, it seems a matter of when rather than if a person gets hacked. Meanwhile, South Africa has the third most cybercrime victims in the world, losing R2.2 billion a year. All this suggests that our increasing connectedness requires a rethink of how to better keep our digital lives safe.

Central to any cybersecurity approach is getting the basics rights. This revolves around applying common sense to help guide us in our activities in the cybersphere just as they do in the physical world.

Related: Cybersecurity in the physical security world

Dos and don’ts in our everyday online activities

 Firstly, you must use a different password for every online account you have. These passwords must be hard-to-guess and never be written down. This is easier said than done given how extensive our digital footprint is. From the laptop (or smartphone) passcode through to email, social networks, online shopping, online banking, messenger apps, and other passwords, it is not difficult to imagine that each of us can easily require 10 or more unique passwords.

This is where a password manager becomes critical. Typically, you would need just one login to get into the manager with the solution providing encrypted passwords to get into each of your online accounts. While there is a myriad of freely available tools that can do this, it is worth investing in a product from a reputable vendor.

Adding on to this, you should consider opting in for two-factor authentication if the service allows for it. This means you rely on more than just a username and password to login to an account. In most instances, this could take the form of an SMS to your phone providing a one-time password (OTP) to confirm it is, in fact, you that is trying to login. So, even if a hacker guesses (or steals) your password, they still need physical access to your phone (or another device) to gain access.

Despite the high number of malware and phishing scams out there, many people still click on links they get or download and open attachments they receive via email. Nowadays, this could extend to opening malicious videos on instant messenger apps like WhatsApp or Facebook Messenger. It is therefore critical that you never click on any link that cannot be verified. You can simply contact your friend to confirm the message or by simply deleting it. You must avoid emails from unfamiliar senders.

Related: One click can kill your company

Looking for grammatical errors and spelling mistakes on messages claiming to be from the bank or insurer are easy ways to spot a fraudster. Another giveaway is links that do not work or that redirect to sites you do not recognise. Hover over a suspicious link with your mouse to see where it is going and avoid if it seems like a strange site.

While social media has become the preferred way for many people to keep in touch with friends, family, and loved ones, we must be vigilant in the personal information we post on a social network. Check your privacy settings to ensure only friends can see your posts. This keeps the information limited to a smaller circle of people.

Unfortunately, many people (including children and teenagers) share everything about their lives. Not only is this potentially dangerous from a real-world perspective (think kidnapping, human trafficking, and home break-ins), but it can also result in online identity theft.

Related: Digital privacy – Does it still exist?

The best cybersecurity technology in the world means little if we do not take responsibility for our own online behaviour. It is about being vigilant about what we do and share in the digital realm and questioning every email and link we do not recognise.

Braintree Helps Business Mitigate Cyber Attack in Less than Two Hours

Implementation of advanced threat protection helps supplier recover from phishing attack and strengthen security posture.

 A leading South African supplier  to the logistics sector discovered that it was the victim of a malicious phishing and scamming attack that compromised their systems and resulted in fraudulent emails and invoices being sent out to contacts from the mailbox of a senior employee, and turned to Braintree, the consulting and integration division of Vox, for assistance.

The matter was only brought to the organisation’s attention when a recipient of one of these fraudulent emails questioned its authenticity, highlighting the need for the ability to detect and mitigate such phishing attacks as soon as they occur, in order to protect against reputational damage, data loss, or even financial loss.

Related: What can organizations do to prevent the rise of phishing attacks?

And increasingly, legislation being put in place worldwide to protect data privacy, such as the General Data Protection Regulation (GDPR) in the European Union, holds organisations accountable if customer information is lost or misused as a result of poor data management and protection practices.

“Cybercrime has turned into big, organised business, with small and medium corporates high on their list of targets as these organisations often do not give security the same level of consideration as larger companies, who might have entire teams dedicated to take care of their security. Data in fact shows that 58% of breaches take place at smaller organisations, and the average cost per breach is US$120 000.

Though there has been a long-standing misconception that only the enterprises are at risk from cybercrime, this is changing and more small businesses are getting serious about security,” says Chris Badenhorst, Strategic Head for Azure at Braintree.

Related: Cybersecurity: Eight steps to protect your business

These smaller organisations often operate in a hybrid environment, with some of their functions in the cloud, and the rest on premise – where the biggest threat is presently. Turning to a partner like Braintree provided the affected customer with access to some of the leading, certified security consultants in the industry, who are able to combine software with global best practices and local industry expertise. The solution was not to just sell a product, but to provide a full range of software and hardware recommendations to ensure that the customer can significantly improve their security score.

Remote and on-premise assistance

The successful attack happened despite their efforts to protect their environment, with a malicious Outlook Rules Exploit that originated from an usual phishing method: targets receive emails from people who are their contacts or known organisations, that include links. When the link is clicked on, they are taken to a fake Office 365 login page aimed at stealing their details, and adding Outlook rules that forward the target’s emails – usually those that are financial in nature – to the hackers. Emails may also be sent to the target’s contacts in order to spread the malware further.

Following an audit of their existing software, it was recommended that they migrate to using Microsoft 365 Business Premium, which provides them with advanced identity, security and device management features. While the licenses for users were set up remotely, a managed IT services team from Braintree was sent out to the customer in order to roll out Microsoft Defender for Office 365, which helps protect against threats that come via email attachments and links, as well as ransomware, malware and zero-day threats.

“The managed IT team then carried out deep scans of PCs and laptops – while unplugged from the broader network – at the customer premises in order to remove the malware within the course of an afternoon. Following this they began applying upgraded security policies to protect the businesses information on mobile devices, using Microsoft InTune,” says Badenhorst.

Related: Vox Managed IT – Daly Morris Fuller Case Study

The time taken to recover from cyber attacks is largely dependent on the nature of the attack and its severity. This particular customer was fortunate in that the malware was discovered before it could cause more severe harm. Servers that are held captive by ransomware, where even a company’s backups might still carry the malware, can take much longer to resolve.

Braintree also helped set up Azure Information Protection, which provides the customer with data loss protection (DLP) features, including the ability to better track, manage and protect their emails, documents and other confidential information shared with people from outside the organisation.

Related: Downscale your office and not your business with Braintree Azure KickStart for SMMEs

“All these improvements means that both Braintree and the customer are immediately alerted if there is either a breach, or if there is an attempt to send sensitive information via email to external parties. What we have put in place will ensure that the business is taking a more proactive approach to mitigating risks and improving their security score,” says Badenhorst.

Downscale Your Office and Not Your business with Braintree Azure KickStart for SMMEs

Braintree, the Microsoft consulting and integration division of Vox, has announced the introduction of Azure KickStart, a scalable packaged cloud solution that allows small to medium businesses to embark on a cloud journey.

Data shows that lockdown regulations and economic pressures have led to organisations of all sizes downscaling their offices as they let employees work remotely. For small and micro enterprises, this poses a challenge in terms of providing employees with access to their files and applications stored on a server in the office, and in managing their on-premise equipment.

Related: Vox, enabling a digital work environment

“This is a clear example of how important it has become for organisations to embrace a remote working strategy by digitising their business processes and ensuring they can be securely accessed from any device from anywhere and at any time. This solution provides them with both the software platform as well as the advice and support that small businesses need in order to begin the shift,” says Heath Huxtable, Executive Head at Braintree.

Related: What is Microsoft Teams and why your organisation needs it

Braintree has developed Azure KickStart to provide organisations with a secure and scalable single cloud offering to enhance and manage their communication, collaboration and productivity, from R1 995 per month. The basic package brings together the critical services that organisations need in order to run their servers and applications in the cloud, as well as to manage their security and devices.

As clients progress in their cloud journey, they can add on more storage, cloud-based services, Office M365  and line of business solutions. Critically, Azure provides built-in, multi-layered security controls, enterprise grade threat protection against ransomware and zero-day attacks, as well as data encryption on both the server and client side.

Related: Vox launches customised firewall service aimed at SMEs

Data is stored in the Microsoft Azure Data Centre in South Africa, while built-in compliance tools ensure businesses meet international regulation and standards. All of this helps businesses strengthen their security posture, as well as reduce costs and complexity.

Braintree provides a managed environment, with businesses having access to a dedicated and certified team for architecture guidance, system administration and operations, monitoring and reporting, performance testing and tuning, with a single point of contact for Azure and Office support.

“There has been a change in customer behaviour as a result of the pandemic, and a majority of organisations are now looking to implement an e-commerce platform in order to cater to this demand. As an additional offering, Braintree has introduced a digital online store called QuickStore. Braintree can get customers up and running with QuickStore within 24 hours, from just R1 975 per month per business,” says Huxtable.

QuickStore provides business-to-business, business-to-consumer and direct-to-consumer companies with a digital store that enriches customer experiences and helps drive sales.

It is also hosted on Microsoft Azure, providing a 99.99% uptime.

Kickstart your journey into the cloud

The basic package includes; Security, Storage and 1 terabyte of Azure Backup. Meanwhile, Azure Active Directory helps organisations connect their employees, suppliers, and ensure that the right people have seamless access to the right applications and data from any location or platform, with a single sign-in.

The flexibility of the Azure platform means that businesses can set up any number of hybrid configurations combining on-premise and off-site, helping extend the lifetime of their existing IT infrastructure while reducing Total Cost of Ownership.

The  individual add-ons include Office, which gives users web and mobile access to the latest versions of popular apps such as Outlook, Word, Excel, PowerPoint and OneNote; and Teams, which helps improve collaboration and communication by bringing together meetings, apps and files in a single place.

Finally, for those organisations that are looking to move more of their operations into the cloud, Braintree Azure KickStart features standard, premium and customisable virtual machine offerings so that they can run line-of-business applications – such as accounting, payroll, production, human resources, customer relation management and much more – all in the cloud.

Related: Microsoft’s local data centres – To move or not to move?

“Braintree can help organisations migrate their open source databases to the cloud; if a business needs a database, they can easily add Azure SQL database to their KickStart package. Moving your entire operations from an on-premises server provides a cloud-enabled environment that helps businesses grow without being constrained by the boundary of physical walls or IT infrastructure,” says Huxtable.

For more information visit the Azure KickStart page on Braintree’s site.

Bringing Teams Together from Across the Globe

Do you want to make, receive and transfer calls in the office, at home, or on the road using your PC or mobile smart device?

Now more than ever, your business needs a modern voice solution and phone system with capabilities that combines unified communication and collaboration platform.

Connect your Microsoft Teams to the world

TeamsVOICE enables users to:

  • Make, receive, transfer, forward and put a call on hold from any location on a computer or smart device
  • Make calls to landline or mobile numbers of internal and external contacts
  • Have the basic functionality of a traditional business phone system (PBX)

Related: What is Microsoft Teams and why your organisation needs it

TeamsVOICE uses Braintree’s existing VoIP platform to connect with Microsoft Teams and the world using two key elements:

  • A Session Border Controller (a device that protects and regulates IP communication flows)
  • SIP Trunks (virtual phone lines)

A modern voice solution

Many businesses are now implementing hybrid work environments that can accommodate onsite and remote working employees.

Calls can be made to landline or mobile number of internal and external contacts, giving you the basic functionality of a traditional business phone system (PBX).

Related: Vox Business Voice – Leads 2 Business Case Study

Why you should switch to TeamsVOICE

Save up to 20% on your phone bill

Communicate with your team and clients, anywhere, on any device. You can live stream a meeting with up to 250 participants, or dial into a conference using your phone, with a saving of up to 20% on your telephone bill.

Symbiotic collaboration

Create easy to use digital workspaces for teams to collaborate and operate in and monitor their progress. TeamsVOICE lets you keep your existing numbers and add new ones when needed. It’s a simple switch.

Fast and flexible

You can connect with your team wherever you are, on a single platform, using Braintree’s mobile apps across Windows, iOS and Android devices.

Related: Microsoft Teams vs Slack

Vox partners with Wolfpack to launch Cybersecurity Portal for SA business

Integrated ICT and infrastructure provider Vox has partnered with local consultancy Wolfpack Information Risk to take the complexity out of cyber risk management.

By offering South African businesses a single online portal where they can assess threats and weaknesses, train and test employees, and track company-wide progress.

With data showing that 1 in 3 consumers will stop using a business after a security breach, cybersecurity isn’t just an IT risk, it’s a major business risk. The Vox Cybersecurity Portal helps businesses identify and address cyber risk areas within the organisation, including training and testing of staff.

Related: Cybersecurity: Eight steps to protect your business

“In today’s times, cyber criminals are looking for any possible means to penetrate an organisation. We are taking the complexity out of addressing cyber risk with our self-managed portal covering the full spectrum of prevention, detection, incident response and business resilience capabilities,” says Henda Edwardes, Executive Head: Carrier and Communications at Vox.

“We are seeing an increase against companies of all sizes – even NGOs and startups are at risk”, states Craig Rosewarne, Managing Director of Wolfpack.

At its core, the portal includes a Business Toolkit, Training, Simulated Attacks, and a Reporting Dashboard. As part of a limited time offer, business customers who subscribe to the monthly service will also gain access to a Protection of Personal Information Act (PoPIA) starter pack to guide them on how to become PoPIA compliant.

The Business Toolkit starts off with an intuitive online cybersecurity health check created by leading industry experts, with 50 questions covering key areas of the organisation. The portal then provides an easy to follow programme filled with checklists, editable security policy templates, operational guides and even awareness posters that provide guidance on how to close security gaps.

Related : Vox Cybersecurity Portal

“As organisations are increasingly strengthening their cyber security defences, the focus has shifted to the common weakest link – human error. By getting one of your employees to click on a malicious link or forward an email containing potential damaging content, these cyber criminals suddenly have access to your most valuable assets – information,” adds Edwardes.

Related: A total approach needed for home cybersecurity

To prevent this from happening, an understanding of the company’s current security environment and targeted training of employees has never been more important. A nominated staff member is able to create a tailored training and testing programme for employees and provide regular update reports on their progress.

According to Edwardes, there are over 40 available security awareness courses, and at-risk staff can even be auto enrolled in training to ensure organisations are better protected. These courses combine global best practice with Vox and Wolfpack’s deep understanding of the local cybersecurity landscape.

Changing culture requires engaging, fun and informative training on a regular basis. And, in addition to training, organisations will now be able to simulate realistic phishing attacks – using over 50 templates based on real-world incidents – in order to measure the effectiveness of the training, and make changes where required. Furthermore, the training courses can be accessed at any time, from any mobile device, tablet, or computer.

Related: Protect your business with this cybersecurity toolbox

“The Vox Cybersecurity Portal gives business customers a self-service hosted portal where they will be able to assess their current security posture and continuously monitor and improve the security posture through recommendations and enhancements to their environment.”

Related: Surveillance in the cloud

“The implementation of a proactive approach to information risk management ensures that your business is better prepared for any internal or external attacks. This leaves your company more secure,” says Edwardes.

The Vox Cybersecurity Portal is a monthly subscription service, with businesses paying per user, with a minimum 12-month contract.

Corporate climber: Bandile Maduna

Meet Bandile Maduna, born in Ladysmith and raised in Soweto by a single mother who was a teacher by profession.

“Growing up, my motto was ubuntu – to respect others at all time. I was taught to work hard and respect everyone despite their age,” says Bandi, as she is affectionately know at Vox. “I’m versatile and able to do all the work that is sent my way. I am a quick learner and always open to all sorts challenges and new things.

“One of my dreams was to enter the corporate world and that became a reality when I joined Vox 11 years ago. At the time I joined as a tea lady, but the company afforded me the opportunity to move through various positions and ranks and I even got the opportunity to study business admin which I am still busy with.

In 2014, I was appointed as a facility team leader. In 2016 I started to be a reliever for the front desk and in 2017 I started to work full time as a receptionist. 2019 was a wonderful year for me when our chief financial director approached me to assist as his personal assistant – a very humbling and warm moment for me.

I love working for Vox and am very grateful for all the opportunities that the company has given me.

I have always been that person to wake up inspired to face the day with a positive attitude and go to work full of energy and inspiration regardless of the situation in our township – things like not having shelter, having plenty of orphan kids to support, no power – I have seen it all!

“I am also a mentor for less fortunate people and especially children, and always encourage then not to dwell on their unfortunate circumstances, but to rather move forward with a good attitude and positive work ethic. This comes from my own learnings from a young age where I was taught to not hate, but rather to love at all times.

“I’m a motivational speaker in my community as well as a chairperson in more than one stokvel and I also unite the family through organizing various gatherings and above all, constantly pushing and encouraging kids to study, love one another and value one another.”

Vox and King Price Insurance launch pioneering cyber insurance offering

The first-of-its-kind cyber protection solution will alleviate key business continuity risks for SA companies.

With companies increasingly relying on data and robust IT systems to deliver value and profitability, it is no surprise that cybercrime now presents one of the biggest risks to business survival. Yet despite the fact that data breaches (now almost inevitable) cost South African companies R40.2 million per breach on average, many business leaders continue to ignore the threat. To mitigate this growing risk and even existential threat for SMEs, leading ICT provider Vox has partnered with King Price Insurance to provide a tailored and robust cyber protection solution – which is the first of its kind in South Africa.

Related: Vox launches customised firewall service aimed at SMEs

“The majority of local companies are running at a huge risk of falling prey to cybercrime, and both the financial and reputational costs of an attack or breach can be crippling for an SME, particularly with POPIA now coming online,” says Jacques du Toit, CEO, Vox. “Our new offering is designed firstly to raise awareness of the threats, and secondly to identify how and where a business is exposed. In today’s high threat online environment, one innocent click on a malicious link can unleash digital disaster for any business.”

Empowering SMMEs with one low-cost, scalable portal

Together with King Price, Vox is eliminating both the complexity and uncertainty that is usually associated with cyber security. The customer’s management or leadership team will gain access to Vox’s intuitive cybersecurity self-service platform, and begins the engagement by completing a 50-point cyber risk assessment to determine the company’s current risk profile.

The first-of-its-kind solution encompasses four key features:

  • A Business Toolkit (including a cybersecurity health check, a cyber risk dashboard, ready-to-edit templates and security awareness posters)
  • Training, incorporating regular and highly engaging cyber awareness courses to impact culture
  • Simulated Attacks (based on real-world incidents) to test, measure and fix effectiveness of the training
  • Reporting Dashboard to generate clear, actionable reports and identify risk areas.

Related: Vox Cybersecurity Portal

In addition, King Price Cybersure insures businesses against financial loss, disruption and reputational damage that result from cyberattacks. It covers software and data, and it protects against liability arising from the misuse of, and third party attacks on, IT infrastructure. This includes data breach expenses, extra costs, and loss of income, as a result of insured incidents.

A highly comprehensive cyber product

“This is a very important and significant product offering, particularly given the heightened threat levels for SMMEs right now – and the growing cyber risks associated with employees working from home,” says Minnaar Fourie, Commercial Director at King Price. “By partnering with an agile and innovative technology leader in Vox, we can now offer customers a highly comprehensive cyber product that includes both cyber threat mitigation and insurance cover. This partnership also strongly aligns with our strategy of mitigating risk prior to claims.”

Indeed, by developing a solution that prioritises the identification of vulnerabilities in existing systems and infrastructure, Vox and King Price are raising awareness while simultaneously providing robust financial protection and alleviating key risks,

Bringing together market-leading expertise in technology and insurance.

“This offering is not only designed to insure against a massive threat for SMMEs, but it also ensures the ongoing education of leaders and employees around cyber threats,” adds Du Toit. “With two challenger brands coming together, both highly disruptive in their respective fields, Vox and King Price are providing business owners and leaders with a very accessible cyber protection offering that is designed to future-proof against emerging and existing threats.”

For more information click here. Should you wish for one of our specialised consultants to give you a call, leave your details with us here.

 

One click can kill your company

An innocent click can unleash digital disaster and sink your business. Keep your employees and your information safe with Vox and King Price

The last thing you want is to be headlining the evening news with “How Karen destroyed the company”. Your company. That you built brick by brick – and it could all come crashing down with one click.

Cybercrime has been identified as the most disruptive economic crime likely to affect organisations. 94% of businesses fall victim to cybercrime, 71% of businesses experience malicious attacks and 61% of businesses suffer negative impacts from cybercrime. Cybercrime is on the rise and wreaking more havoc than ever in an increasingly digital ‘work-from-home’ world.

Most common cyber attacks such as phishing and ransomware occur due to human error. You might be cyber savvy, but the chances are that many in your organisation aren’t.

Watch: Cybersecurity in the physical security world

According to the State of Email Security 2019 report by Mimecast, the number of global phishing attacks have increased and it is quite complex for SMEs to secure themselves as best as possible, says Craig Freer, Executive Head of Cloud at Vox. “It really is a case of they do not know what they do not know.”

South Africa has the third highest number of cybercrime victims worldwide, with the impact of an attack ranging from financial to reputational loss. Your business doesn’t have to be a statistic. Arm your company with three powerful tools:

Best of breed cybersecurity

It is becoming increasingly complex for SMEs to secure themselves, but cyber risk management doesn’t have to be complicated and costly. An easy-to-use platform help manage cyber risks facing your organisation and track your improvement progress.

The Vox Cybersecurity Platform offers an effective self-service platform to assess your cyber risks, train and test your employees and track your progress.

Related : Vox Cybersecurity Portal

Cyber insurance to keep you in business

You need a plan to ensure that your business is fully protected against cyber risks. A few clicks can lead your business to being hacked, phished or scammed through infected attachments – and you could lose everything.

King Price Cybersure cover includes cyber liability and cybercrime, data breach expenses, damage to computer systems and data, extra costs, and loss of income, as a result of insured incidents.

A comprehensive IT security toolkit

As targeted security attacks grow exponentially, the right tools are a critical element of every business strategy.

The Vox IT Security Toolbox helps you monitor your security environment 24/7, while keeping endpoint devices safe from viruses, malware and ransomware. Control what enters and leaves your network, and what your employees have access to with Vox’s intelligent all-in-one solution.

Related: Protect your business with this cybersecurity toolbox

Vox has joined forces with King Price Cybersure to arm you with comprehensive cyber protection. Sign up for the Vox Cybersecurity Portal, from as little as R75 per month per user, and you’ll get 20% off King Price Cybersure to cover the assets that your business needs to perform in this digital age.

To enquire more about our cybersecurity solutions, leave your details with us here and one of our specialised solution architects will give you a call.