031 812 9650 rd@isite.co.za
  • Facebook
  • Facebook
isite Computers
  • Home
  • About Us
  • Services
  • Blog
    • Law Firms
    • Business Continuity and Disaster Recovery
    • Cybersecurity
    • IT Architecture
    • Lockdown / Remote Work
    • Outsourcing IT
    • Unified Communications
    • Miscellaneous
  • Free Assessment
  • Contact Us
Select Page
Get to Know These 6 Benefits of Microsoft OneDrive for Business

Get to Know These 6 Benefits of Microsoft OneDrive for Business

by Ridwaan Docrat | Microsoft

Reading Time: 4 minutesMicrosoft OneDrive for Business is one of the leading cloud platforms available on the market today. It’s used by over 85% of Fortune 500 companies, including Chevron, Good Year, and Nestle. The range of data, security, and collaboration...
Microsoft 365: It Has a Ransomware Problem You Need to Know About

Microsoft 365: It Has a Ransomware Problem You Need to Know About

by Ridwaan Docrat | Cybersecurity, Microsoft

Reading Time: 2 minutesThis is Part 1 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Microsoft 365 remains as the #1 ranking office suite controlling 48% of the global market featuring a staggering...
Ransomware Attacks in South Africa: What You Need to Know

Ransomware Attacks in South Africa: What You Need to Know

by Ridwaan Docrat | Cybersecurity

Reading Time: 5 minutesRansomware Attacks in South Africa: What You Need to Know South Africa is no stranger to ransomware. According to data by Kaspersky, the country saw more than 12 000 ransomware attacks in just the first half of 2021. Whilst the Interpol...
IT Security in A Nutshell: 3 Best Practices for Smartphone Cybersecurity

IT Security in A Nutshell: 3 Best Practices for Smartphone Cybersecurity

by Ridwaan Docrat | Cybersecurity

Reading Time: 2 minutesKnow these three best practices for keeping your smartphone safe from cybercriminals: Every Smartphone Has a Lock Screen. Use it. Always. Your smartphone is designed for quick, easy access to all your data. No one wants to constantly log into...
VoIP Security Risks (And How to Prevent Them)

VoIP Security Risks (And How to Prevent Them)

by Ridwaan Docrat | Cybersecurity

Reading Time: 4 minutesVoIP is the modern alternative to the traditional landline telephone. It offers a myriad of business benefits, ranging from scalability and flexibility to cost savings and cutting-edge features. The vulnerability of VoIP technology to security...
« Older Entries
Next Entries »

Categories

  • Business Continuity and Disaster Recovery
  • Cybersecurity
  • Email
  • Google
  • IT Architecture
  • Law Firms
  • Lockdown / Remote Work
  • Microsoft
  • Miscellaneous
  • Outsourcing IT
  • Unified Communications
  • Web Hosting

Schedule A Free Consultation

We're here to help!


0 / 300


Office

Unit 4, Oakwood Office,
Forest Office Park,
15 Summit Drive
Sherwood
4091



Call Us

031 812 9650



Email

rd@isite.co.za



Business Hours

Monday to Friday: 8am to 5pm

© iSite Computers - Site by DEZIGN-IT

Sitemap - Privacy Policy - Terms and Conditions

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.