Shadow IT, or the use of unauthorised technology by employees at work continues to rise. In fact, 35% of employees say they need to work around their company’s cybersecurity policy to get their job done, with 83% of IT professionals reporting that employees have...
Cybersecurity Articles
Microsoft Exchange Online vs. Exchange On-Premise: What Should Your Small Business Choose?
Email is the backbone of modern business communication. And despite the recent popularity surge in platforms like Slack, Zoom, and MS Teams, email shows no sign of slowing down. It’s thus imperative that businesses take their email infrastructure seriously. After all,...
Microsoft 365: Hit by a Cyber Attack? Do This Next
This is Part 4 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1, Part 2, and Part 3. Malware strikes your business. It’s too late for proactive protection. It’s too late to regret! What...
Microsoft 365: (Actionable) Tactics to Thwart Ransomware– iSite Computers
This is Part 3 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1 and Part 2. We covered in Part 2 the importance of patch management for not only Microsoft 365, but every device, network,...
Microsoft 365: Update These Three Systems to Reduce Malware Risk
This is Part 2 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1. Defending your Microsoft 365 infrastructure from cybercriminals begins with up-to-date software. For a single user, that’s...
Microsoft 365: It Has a Ransomware Problem You Need to Know About
This is Part 1 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Microsoft 365 remains as the #1 ranking office suite controlling 48% of the global market featuring a staggering 258 million-plus...
Ransomware Attacks in South Africa: What You Need to Know
Ransomware Attacks in South Africa: What You Need to Know South Africa is no stranger to ransomware. According to data by Kaspersky, the country saw more than 12 000 ransomware attacks in just the first half of 2021. Whilst the Interpol Cyberthreat Assessment Report...
IT Security in A Nutshell: 3 Best Practices for Smartphone Cybersecurity
Know these three best practices for keeping your smartphone safe from cybercriminals: Every Smartphone Has a Lock Screen. Use it. Always. Your smartphone is designed for quick, easy access to all your data. No one wants to constantly log into their Gmail app or...
VoIP Security Risks (And How to Prevent Them)
VoIP is the modern alternative to the traditional landline telephone. It offers a myriad of business benefits, ranging from scalability and flexibility to cost savings and cutting-edge features. The vulnerability of VoIP technology to security threats, however, is one...
Two Factor Authentication can save you thousands of $$$
Two Factor Authentication (also known as 2FA, TFA, Multi-Factor Authentication, or 2 Step Verification) is an extra layer of security designed to protect your online services like Gmail, Facebook, Office 365, Yahoo, Dropbox, Zoom, and the like. Banks have been among...
Thought your data was safely backed up in the cloud? Think again…
There is a lot of confusion regarding the terms ‘sync’ and ‘backup’. In my experience as managed IT services provider, I find that there are still many businesses setting up their devices to sync critical data with services like Google Drive, OneDrive, Dropbox, Box,...
IT Security in A Nutshell: Three Tips for Safer Email
Today, we overview our top three tips for email cybersecurity in your small business: Don’t Immediately Act On Email Content From People You Don’t Know Once a hacker (or a shady marketer) finds an email from anyone at your company, odds are they can figure out how...











