Blog
Most Popular Posts
Three Types of Business Backups Explained Simple
Full Backups vs. Incremental Backups vs. Differential Backups Losing business data can be catastrophic, which is why it's imperative to have a tried and tested backup plan in place. There are three main types of backups for small to medium-sized businesses: Full...
Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022
October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The overarching theme for 2022 is “See Yourself In Cyber.” At iSite Computers, we’ve dedicated this month to publishing a four-part series aimed at creating awareness...
The Data Breach: What Is It and How to Stop One?
October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The overarching theme for 2022 is “See Yourself In Cyber.” At iSite Computers, we’ve dedicated this month to publishing a four-part series aimed at creating awareness...
Microsoft 365: Collaborate in the Cloud with Microsoft 365
With approximately 15 billion devices in use in 2022, the proliferation of mobile technology is transforming how people interact and work. Many employees are finding that they are more productive when they have greater flexibility around where and how they perform...
7 Reasons Why Google Workspace is a Great Tool for Remote Work
COVID-19 lockdowns didn’t merely shake up the business world, it also sparked a real revolution in how people work. With lockdown restrictions now practically over in South Africa, remote work still remains an attractive option. Unlike the emergency scenario in...
6 Factors to Consider Before Choosing a Web Host
Choosing a web hosting company is one of the first steps when launching a website. It’s a fundamental decision because your web host will set the tone for a variety of factors that will affect your website for months and years to come. Not all hosts are created equal....
Avoid These 6 Critical Data Backup Mistakes
There's no question that data backups are essential for businesses of all sizes, but making sure your backup process is effective and efficient is equally important. Unfortunately, many small businesses make a handful of common mistakes that can lead to data loss,...
What is Google Workspace for Education?
Google Workspace for Education (previously known as G Suite for Education) is an online software platform by Google designed to make teaching, learning, and academic management more efficient. If you're a teacher or work in management, admin, or IT at any educational...
Business Continuity in a Nutshell: Unplanned Network Downtime (And How to Prevent It)
According to a report by IT giant Datto, network outages account for 50% of all downtime events in business. The primary consequence is a hit to business continuity and employee productivity, which ultimately equals impact to your bottom-line. In this post, we’ll look...
Shadow IT! We Shine Light on This Internal Cybersecurity Risk
Shadow IT, or the use of unauthorised technology by employees at work continues to rise. In fact, 35% of employees say they need to work around their company’s cybersecurity policy to get their job done, with 83% of IT professionals reporting that employees have...
Microsoft Exchange Online vs. Exchange On-Premise: What Should Your Small Business Choose?
Email is the backbone of modern business communication. And despite the recent popularity surge in platforms like Slack, Zoom, and MS Teams, email shows no sign of slowing down. It’s thus imperative that businesses take their email infrastructure seriously. After all,...
Microsoft 365: Hit by a Cyber Attack? Do This Next
This is Part 4 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1, Part 2, and Part 3. Malware strikes your business. It’s too late for proactive protection. It’s too late to regret! What...
Why every small business needs an IT strategy
Most South African businesses now realise that technology (and its correct implementation) is crucial to the success of any organisation. Technology has likewise become invaluable to organisational leadership over the several past decades. The importance of having an...
Microsoft 365: (Actionable) Tactics to Thwart Ransomware– iSite Computers
This is Part 3 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1 and Part 2. We covered in Part 2 the importance of patch management for not only Microsoft 365, but every device, network,...
Microsoft 365: Update These Three Systems to Reduce Malware Risk
This is Part 2 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1. Defending your Microsoft 365 infrastructure from cybercriminals begins with up-to-date software. For a single user, that’s...
Get to Know These 6 Benefits of Microsoft OneDrive for Business
Microsoft OneDrive for Business is one of the leading cloud platforms available on the market today. It’s used by over 85% of Fortune 500 companies, including Chevron, Good Year, and Nestle. The range of data, security, and collaboration features make it an attractive...
Microsoft 365: It Has a Ransomware Problem You Need to Know About
This is Part 1 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Microsoft 365 remains as the #1 ranking office suite controlling 48% of the global market featuring a staggering 258 million-plus...
Ransomware Attacks in South Africa: What You Need to Know
Ransomware Attacks in South Africa: What You Need to Know South Africa is no stranger to ransomware. According to data by Kaspersky, the country saw more than 12 000 ransomware attacks in just the first half of 2021. Whilst the Interpol Cyberthreat Assessment Report...
IT Security in A Nutshell: 3 Best Practices for Smartphone Cybersecurity
Know these three best practices for keeping your smartphone safe from cybercriminals: Every Smartphone Has a Lock Screen. Use it. Always. Your smartphone is designed for quick, easy access to all your data. No one wants to constantly log into their Gmail app or...
VoIP Security Risks (And How to Prevent Them)
VoIP is the modern alternative to the traditional landline telephone. It offers a myriad of business benefits, ranging from scalability and flexibility to cost savings and cutting-edge features. The vulnerability of VoIP technology to security threats, however, is one...
Operational Downtime
Struggling to maintain smooth IT operations which costs your business huge amounts of time and money.

IT Infrastructure
Unnecessary downtime due to poor IT infrastructure and lack of experienced IT management.

IT Forecasting
Difficulty in deciding on the right technology solutions for your business.
Virus Protection
Prevention and recovery of Ransomware Attacks.
Inefficient IT Vendors
Hassles with inefficient IT vendors.

Data Backup
No solid data backup leading to loss of valuable data.



















