Jun 6, 2025
Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...
Jun 6, 2025
Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments – spanning on-premises, hybrid, and multi-cloud architectures – can lead to...
May 27, 2025
While remote and hybrid work arrangements have recently started to decline as the return-to-office trend has gained momentum around the globe, many companies continue to embrace these models to attract and retain top talent. The working-from-home option does impact...
May 22, 2025
With the continent’s rapid digital transformation, African businesses are being exposed to increasingly complex cyber threats. As their digital footprint grows, so too does the potential for cyberattacks, writes Vinay Hiralall, chief commercial officer of Liquid C2....
May 14, 2025
As ransomware attacks become increasingly common, businesses must understand the difference between traditional disaster recovery (DR) and cyber recovery strategies. By Hemant Harie, group chief technology officer at DMP SA While DR centres on restoring IT operations...
May 7, 2025
Businesses today are forced to navigate an increasingly perilous landscape of cyber threats, characterised by the increasing frequency and sophistication of cyberattacks. By Graham Brown, country manager at Commvault The financial repercussions are staggering, with...