<center></center>

Empowered people are the real cyber superpower

It's time to retire the tired narrative that employees are the “weakest link” in cybersecurity. They're not. They're simply the most frequently targeted. And that makes sense – if you’re a cybercriminal, why brute-force your way into secure systems when you can just...

E-commerce is changing the traditional insurance distribution model

In today's evolving digital economy, a quiet revolution is transforming how consumers access insurance protection and how service providers are enhancing customer experience and revenue streams. By Carl Moodley, CIO of Genric Insurance Company Embedded insurance - the...

How to spot phishing, vishing and smishing

Phishing, vishing and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. By John Mc Loughlin, CEO of J2 Software These threats exploit personal information, such as names,...

The strategic advantage of independent Citrix audits

Citrix environments are foundational to delivering virtual applications and desktops to a diverse and global workforce. However, the intricate nature of these deployments - spanning on-premises, hybrid, and multi-cloud architectures - can lead to configuration drift,...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>