<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Your old hardware could be your most expensive cyber threat

Too many organisations treat secure IT disposal as an afterthought. Once a laptop or hard drive is no longer in use, it’s often left to gather dust or sent to recycling without proper data wiping. That’s a major risk. Sensitive information doesn’t disappear when a...

Visibility that drives real resilience

Strong cybersecurity begins with the ability to see everything, writes Roy Alves, sales director of J2. Visibility starts with a real time view of the client’s entire digital estate across endpoints, networks, cloud and hybrid environments. This approach relies on...

Why we have to let (the right) AI into our emails

With artificial intelligence (AI) now augmenting up to 80% of phishing emails and cybercriminals constantly upping their games, relying on employee training alone is both insufficient and damaging. To manage human risk effectively in this new landscape, organisations...

Why human error is our biggest cyber threat

Cyber-attacks are getting smarter, faster and more personal, and even the best security technology can’t stop them if people keep clicking on the wrong links. Craig Freer, director of managed services provider Qwerti, says businesses are fighting a new kind of battle,...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>