Jul 25, 2023
How secure are the devices that access your company networks? Can you rest easy, knowing that something is monitoring threats that exploit people’s laptops and smartphones? Most organisations are not as secure as they believe. Phishing in particular diminished...
Jul 25, 2023
The delivery game has experienced a seismic shift in recent years, thanks to the convergence of Gen Z’s shopping habits and the exponential growth of online shopping. Gen Z, the digitally native generation born between the mid-1990s and early 2010s, has not only...
Jul 25, 2023
The shift to hybrid work models has highlighted gaps across South Africa’s internet connectivity landscape. According to the Cisco Global Broadband Survey1, 87% of South African respondents said they rely on their home internet connection to work or run a...
Jul 25, 2023
Severe weather such as sudden cold snaps and the recent unexpected bout of snow in many parts of South Africa have sparked some discussion around whether home solar systems are at risk. Extreme weather can both permanently damages solar systems and substantially lower...
Jul 25, 2023
Phishing has been a digital thorn in the side of cybersecurity for over a decade. These unsolicited, cleverly masked requests are the wolf in sheep’s clothing of the digital world. They are always looming, waiting for some unsuspecting employee to click on a...
Jul 24, 2023
A common misconception is that both cyberattacks and cybersecurity controls are sophisticated and complex. “In fact, the methods criminals use to infiltrate industrial networks are often relatively straightforward,” warns Charles Blackbeard, business...