Blog
Most Popular Posts
Two Factor Authentication can save you thousands of $$$
Two Factor Authentication (also known as 2FA, TFA, Multi-Factor Authentication, or 2 Step Verification) is an extra layer of security designed to protect your online services like Gmail, Facebook, Office 365, Yahoo, Dropbox, Zoom, and the like. Banks have been among...
5 Reasons why backing up to an external hard drive is a BIG mistake
Backup is something that every business should do. Whilst every business says that they do have a backup plan in place… the reality is that many don’t. I find that they are either backing up to multiple external hard drives or even worse: Backing up to a single...
Thought your data was safely backed up in the cloud? Think again…
There is a lot of confusion regarding the terms ‘sync’ and ‘backup’. In my experience as managed IT services provider, I find that there are still many businesses setting up their devices to sync critical data with services like Google Drive, OneDrive, Dropbox, Box,...
IT Security in A Nutshell: Three Tips for Safer Email
Today, we overview our top three tips for email cybersecurity in your small business: Don’t Immediately Act On Email Content From People You Don’t Know Once a hacker (or a shady marketer) finds an email from anyone at your company, odds are they can figure out how...
Load Shedding: UPS or Inverter for Your Business?
Load Shedding: UPS or Inverter for Your Business? Just two weeks of load shedding in June 2021 cost the South African economy an approximate R25 billion. Whilst overall economic losses add up well into the trillions since 2008. Investing in reliable business...
IT Security in A Nutshell: Staying Secure When Browsing the Web
Here are our top tips on how to stay secure when browsing the web: Install from Safe Sources Only When you see a message in your web browser that tells you to install anything, stop! A free app that offers to save you time and money could be malware, i.e., malicious...
VoIP vs Landline: What’s Best for Your Small Business?
Although almost every business owned a landline 20 years ago, numbers continue dropping in favour of modern alternatives. In fact, research by Blueface found that a staggering 61% of businesses switch to VoIP at the end of their landline contract. It seems clear that...
Simple Practices to Outsmart Social Engineering Part 4-4
Simple Practices to Outsmart Social Engineering - #BeCyberSmart October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The theme for 2021 is “Do Your Part. #BeCyberSmart.” At iSite Computers, we’ve dedicated this month to...
Four Ways to Secure Your Workstation Part 3-4
Four Ways to Secure Your Workstation - #BeCyberSmart October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The theme for 2021 is “Do Your Part. #BeCyberSmart.” At iSite Computers, we’ve dedicated this month to publishing a...
Know These Don’ts of Network Security Part 2-4
Know These Don’ts of Network Security - #BeCyberSmart October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The theme for 2021 is “Do Your Part. #BeCyberSmart.” At iSite Computers, we’ve dedicated this month to publishing...
Three Powerful Password Tips Part 1-4
Three Powerful Password Tips - #BeCyberSmart October is marked globally by various countries and organisations as Cybersecurity Awareness Month. The theme for 2021 is “Do Your Part. #BeCyberSmart.” At iSite Computers, we’ve dedicated this month to publishing a...
Data Breaches in South Africa: What You Need To Know
Data Breaches in South Africa: What You Need To Know (Updated 2021) The impact of a data breach can be devastating. According to research by IBM Security, the average cost of a data breach in South Africa has grown to R46 million in 2021. Added to that is the...
The Top 4 Benefits of Image-Based Backups
Data is the new currency, and in order to stay competitive businesses must protect it. If an organization is to remain viable, it must provide constant access to the critical data and tools needed to stay productive. At the same time, data size and volume are...
Phishing, Smishing, and Vishing: Three Cyber-Attacks Your Small Business Needs to Know About
Know (and Mitigate) the Threats that Put Your Business at Risk Phishing attacks are on the rise. In a study by Alto Research, data revealed that phishing attacks in Europe jumped by 718% since the start of COVID-19. Whilst Google detected over 2 million...
4 Business Continuity Planning Essentials for Your SMB
Learn How to Think ‘Big Picture’ When Crafting an Effective Business Continuity Plan Ensuring access to mission-critical applications and data following a disaster is critical. However, business continuity and disaster preparedness are about much more than that. In...
The Pros and Cons of an In-House IT Department – iSite Computers
As your small business grows, so too does the scale and complexity of your IT environment. Unsurprisingly, you reach a point where IT costs and efficiency concerns start diverting critical attention away from your core business. Does this mean it’s now time to...
Backup or Business Continuity? Realising Modern Data Protection
In this article, we’ll define and discuss the importance of business continuity rather than simple backup practices. We’ll take a quick look into modern solutions, such as cloud computing and image-based backups, and how they can support the data needs of small to...
Popular Causes of Data Loss (And How to Prevent It)
If you've ever been in a spot where your company has lost data, you know how scary it can be. Hundreds or even thousands of files containing valuable information can be gone in a second or two. Think accounting records, client information, operating procedures, and...
9 Cybersecurity Tips Every Business Should Know
A massive global shift to remote working environments has created an open season for cybercriminals. No business - big or small - is safe. Small to medium-sized businesses (SMBs), however, have a bigger target on their backs, so strengthening your company’s security...
3 Reasons Why Your Business Needs VoIP Phone Technology
According to the BCT Insight Report by Blueface, 61% of businesses with traditional telephones adopt VoIP phone technology at the end of their landline contract. And for good reason. The business benefits of VoIP encompass productivity, cost-savings, flexibility, and...
Operational Downtime
Struggling to maintain smooth IT operations which costs your business huge amounts of time and money.

IT Infrastructure
Unnecessary downtime due to poor IT infrastructure and lack of experienced IT management.

IT Forecasting
Difficulty in deciding on the right technology solutions for your business.
Virus Protection
Prevention and recovery of Ransomware Attacks.
Inefficient IT Vendors
Hassles with inefficient IT vendors.

Data Backup
No solid data backup leading to loss of valuable data.



















