MTN, Huawei sign strategic MoU on Net5.5G
MTN South Africa and Huawei have signed a memorandum of understanding (MoU) for strategic cooperation on Net5.5G. An IP Day Summit themed "Net5.5G Network Development" and co-hosted by the two organisations brought together experts from MTN's network planning and...
Boom period ahead for e-commerce
The global e-commerce market will reach $83,26-trillion by 2030 with a CAGR of 18,9% from 2024 to 2030, according to a new study by Grand View Research. The market has grown substantially due to the increasing popularity of omnichannel retailing in which companies...
Network security growth stalls as industry shifts to cloud
The network security market saw a modest single-digit revenue growth in Q1 2024 reaching $5,5-billion, according to Dell'Oro Group. This muted growth, down from double-digits a year ago was driven by a significant decline in hardware-based solutions and a contrasting...
Cisco well-positioned following recent announcements
Cisco is demonstrating great strength in collaboration targeting both hybrid work and call centres following its recent announcements at Cisco Live in Las Vegas, says GlobalData. "Cisco is moving the needle in a meaningful way on both the hybrid work and contact...
Hotels under threat from cybercriminals
Kaspersky has discovered a new fraudulent scheme targeting hotel owners and staff with fraudsters attempting to steal credentials or infect computers with malware. The fraudulent emails, posing as correspondence from former or potential guests, exploit the hospitality...
Tips to improve your backups
Backups are crucial. Whether you are worried about a ransomware attack or some other disaster taking out the information that keeps your business running, backups are the best way to mitigate data loss risks. Yet, organisations are often unsatisfied with the value...
Anatomy of a phishing attack
Phishing attacks are among the most widespread and effective tactics used by cybercriminals against business. These schemes aim to deceive employees into disclosing sensitive information, such as login credentials or financial data, by posing as legitimate sources....
Are printers included in your business cyber security strategy?
With cybercrime rates in South Africa skyrocketing, businesses are increasingly conscious of the need to protect their in-office and remote IT set ups from ill-intentioned hackers. Yudheer Harbhajun, business print sales manager for Epson South Africa, says that while...
AI’s double-edged sword requires a human security approach
Artificial intelligence (AI) has ushered in both promise and peril for organisations needing to combat cyber threat actors. As ESET Southern Africa chief technology officer Adrian Stanford notes: "AI is reshaping the battlefield between cyber attackers and defenders,...
Debunking payroll and HR outsourcing myths
Increased efficiency, risk mitigation, access to specialist expertise and the latest technology - the benefits of payroll and HR outsourcing are undeniable. But while the burgeoning demands on these departments have prompted many businesses to outsource their payroll...
Telcos grapple with revenue challenges
5G is a game-changer, promising unprecedented speed, reliability and connectivity. By 2030, projections suggest that nearly half of all mobile connections worldwide will be powered by 5G networks. However, amidst the excitement and anticipation, one crucial challenge...
How retailers can prepare for the R100bn e-commerce market
South African retail has experienced profound transformation over the past few years, with digital platforms and e-commerce reshaping consumer expectations. However, we are just in the earliest phases of digital transformation and SME retailers will need to be agile...