Phishing in Africa

What is Phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can […]


Dear Customers, It is hard to believe that December is upon us and that 2019 is quickly approaching. We want to take this opportunity to thank you for your continued support during this year and look forward to helping you support and grow your IT infrastructure and company in 2019. We also want to take this […]

We are moving!

On 30 November 2018 we say farewell to our old offices and hello to our new NOC (Network Operator Center). We have secretly been building a new head quarters where we can better serve our clients (YOU). On Friday the 30th we will have a standby team available but we ask for a little leeway […]

Basic Cyber Security 101

We’re talking cyber security. So we’re going to start from the very top. Passwords Passwords. So, when you’re setting a password it’s important to have 8 to 10 characters.  Now make sure those characters are lowercase and uppercase. Now I always try and have numerals as well, and if you can get special characters in […]

Teen tech addiction – how to stop it.

Addiction is not just a disease. It is escapism. It is the incessant pursuit of brief happiness, wreaking havoc on the real world around the victim – and consequently, driving them to delve deeper into their relief from reality. There are two types of addiction. Psychological and physical. Psychological is caused by an emotional need […]

Printers – the thermal exhaust port in the Death Star

One of the biggest security flaws in a network is complacency and arrogance. “We have a firewall, a strong WiFi password, our employees change their passwords regularly, our website has been tested for vulnerabilities etc.”. What is overlooked in almost every organization is the printer. Have you ever taken a moment to consider just how […]

Is This Your Password?

What is extortion? Extortion is defined as: “the crime of obtaining something from someone, especially money, by using force or threats.” Recently there has been a wave of hackers extorting people, often bluffing – but not always. An example of digital extortion: People often use the same password on multiple websites. Although your bank’s website […]

A Word on Disaster Recovery

As we prepare to roll our a new service offering “Onsite DR” i would like to take a moment to share some of the reasons why you need to start thinking disaster recovery. ONSITE DR is a rented service from weloveIT. A replica of your live servers is made onto one of our disaster recovery […]