we now love SOLAR power

In light of the recent Eskom power outages we have been forced to find alternative solutions to keeping our systems running 24/7. Solar was the obvious solution so we put our Project Engineer Vidette Kallie to the task. As an IT company we are no stranger to uninterrupted power suppliers, but what do we know […]

Collaborative Work Space Network Risks & Implications

  • 03/10/2019
  • Day to Day
  • 0 Comments
  • Sean Sutherland

Collaborative Space With the increase of mobile and remote work forces, many organizations and freelancers are looking for an alternative solution to the traditional and outdated office space, a solution that will reduce their overhead costs, allow for a flexible work space and provide potential networking opportunities. Collaborative work spaces generally offer a stress free […]

Phishing in Africa

What is Phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can […]

GONE FISHING DECEMBER 2018

Dear Customers, It is hard to believe that December is upon us and that 2019 is quickly approaching. We want to take this opportunity to thank you for your continued support during this year and look forward to helping you support and grow your IT infrastructure and company in 2019. We also want to take this […]

We are moving!

On 30 November 2018 we say farewell to our old offices and hello to our new NOC (Network Operator Center). We have secretly been building a new head quarters where we can better serve our clients (YOU). On Friday the 30th we will have a standby team available but we ask for a little leeway […]

Basic Cyber Security 101

We’re talking cyber security. So we’re going to start from the very top. Passwords Passwords. So, when you’re setting a password it’s important to have 8 to 10 characters.  Now make sure those characters are lowercase and uppercase. Now I always try and have numerals as well, and if you can get special characters in […]

Teen tech addiction – how to stop it.

Addiction is not just a disease. It is escapism. It is the incessant pursuit of brief happiness, wreaking havoc on the real world around the victim – and consequently, driving them to delve deeper into their relief from reality. There are two types of addiction. Psychological and physical. Psychological is caused by an emotional need […]

Printers – the thermal exhaust port in the Death Star

One of the biggest security flaws in a network is complacency and arrogance. “We have a firewall, a strong WiFi password, our employees change their passwords regularly, our website has been tested for vulnerabilities etc.”. What is overlooked in almost every organization is the printer. Have you ever taken a moment to consider just how […]