Should your organisation be using EDR?

How secure are the devices that access your company networks? Can you rest easy, knowing that something is monitoring threats that exploit people’s laptops and smartphones? Most organisations are not as secure as they believe. Phishing in particular diminished...

Digitising the delivery game for Gen Z

The delivery game has experienced a seismic shift in recent years, thanks to the convergence of Gen Z’s shopping habits and the exponential growth of online shopping. Gen Z, the digitally native generation born between the mid-1990s and early 2010s, has not only...

Rethinking workforce access in the world of hybrid work

The shift to hybrid work models has highlighted gaps across South Africa’s internet connectivity landscape. According to the Cisco Global Broadband Survey1, 87% of South African respondents said they rely on their home internet connection to work or run a...

Expert tips to protect your solar system against winter weather hazards

Severe weather such as sudden cold snaps and the recent unexpected bout of snow in many parts of South Africa have sparked some discussion around whether home solar systems are at risk. Extreme weather can both permanently damages solar systems and substantially lower...

Threat actors add .zip domains to their phishing arsenals

Phishing has been a digital thorn in the side of cybersecurity for over a decade. These unsolicited, cleverly masked requests are the wolf in sheep’s clothing of the digital world. They are always looming, waiting for some unsuspecting employee to click on a...