Case Study – Successful Phishing Attack
Background We have a client who we provide a base level service to. We are responsible for ensuring their desktops are operational and their employees have the capability to log in to their emails, with all other services being [...]
Re-Think Password Security
Weak and stolen passwords are the number one reason for data breaches globally. This has introduced specific password alternatives like biometrics, Single Sign-On Sessions (SSO), pin codes, Magic links, and physical keys to the forefront of the digital world. However, as great as these alternatives [...]
What Is Application Whitelisting?
Enterprise security and resource management are of utmost importance for any organisation these days. Application whitelisting is a proactive threat mitigation technique that allows pre-authorised programs or software to run while all the others are blocked by default. Benefits [...]
Remote Working Has Become The New Norm
As COVID-19 (coronavirus) continuous to disrupt our lifestyles and hurt economies worldwide, it has also made organisations vulnerable to cybersecurity risks as employees continue to work remotely. Almost 7 months have passed and Covid-19 has turned into a global [...]
The Basics of the Indigenous Procurement Policy of 2015
The process of indigenous procurement can be confusing for many businesses and organisations. In this article, we provide answers to many of the burning questions you may have around this topic. Reach out to us if we haven't answered [...]