Cybersecurity Articles

Shadow IT! We Shine Light on This Internal Cybersecurity Risk

Shadow IT, or the use of unauthorised technology by employees at work continues to rise. In fact, 35% of employees say they need to work around...

Microsoft Exchange Online vs. Exchange On-Premise: What Should Your Small Business Choose?

Email is the backbone of modern business communication. And despite the recent popularity surge in platforms like Slack, Zoom, and MS Teams, email...

Microsoft 365: Hit by a Cyber Attack? Do This Next

This is Part 4 of 4 in our awareness series on Microsoft 365 and cybersecurity for small to medium-sized businesses in South Africa. Read Part 1,...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.