Unused accounts pose a real threat

It’s very likely that you’ve been using the internet for many years now and already forgotten how many different accounts you’ve created. However, old accounts pose a real threat as there’s a big chance they store a lot of sensitive data. If one of your old accounts...

Innovation needed in the counterfeiting war

When it comes to fraud, the impact of the production and sale of counterfeit goods is just as detrimental to the economy as cyber crime and identity theft. This issue came under the spotlight in 2019 when there was an outright war that was waged by the South African...

Medium businesses: don’t stagnate

Medium-size businesses do not have to stand back and watch the transformation of large organisations. The floodgates of technology have opened for everyone. Medium businesses, in particular, can take huge advantage of fantastic breakthroughs available at very...

The story behind Azure security

Security has to be baked into any cloud solution. When organisations trust their systems to the cloud, they expect security to be a given. Azure goes a step further: its proactive approach to security, compliance, and privacy is unique, with Microsoft leading the...
Networking and storage at the heart of the network

Networking and storage at the heart of the network

The heart of the enterprise has always been the network – and it has become more relevant than ever in today’s world of always-on connectivity. Marcel Fouche, GM for the networking and storage business unit at Networks Unlimited, points out that the move to...