Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

Visibility that drives real resilience

Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...

Data readiness is the silent barrier to AI success

While South African organisations rush to deploy artificial intelligence, many are finding their efforts slowed by a lack of basic data readiness. This is according to Daniel Acton, chief technology officer at Accelera Digital Group (ADG), who adds that the...

Why we have to let (the right) AI into our emails

With artificial intelligence (AI) now augmenting up to 80% of phishing emails and cybercriminals constantly upping their games, relying on employee training alone is both insufficient and damaging. To manage human risk effectively in this new landscape, organisations...

The teen internet tango

If you’ve ever seen a teenager argue with their WiFi router at midnight, you know the internet isn’t just a tool, but a lifestyle. It’s the universal babysitter that sometimes forgets the babysitting part, a treasure chest of knowledge, memes, and questionable...