What’s the Best Office 365 Backup? A Comprehensive Checklist
- Aug 22
Announcing new EDR capabilities for Webroot Endpoint Protection
- Jul 16
7 Tips on Keeping Your Data Private When Using AI
- May 13
Understanding Brute Force Attacks: The Persistent Threat in Cybersecurity
- May 6
To fish or not to phish?
- May 2
Howzit! Announcing Our New AWS Backup Data Center in South Africa
- Jan 29
Enhancing Email Security: A Guide to SPF, DKIM, and DMARC
- Jan 22
Mastering Email Security: Navigating the Core Foundations
- Nov 29, 2023
Business Email Compromise (BEC) Scams
- Nov 9, 2023
Hybrid password attacks: How they work and how to stop them
- Oct 25, 2023
Password reuse: A hidden danger you can’t ignore
- Oct 17, 2023
Enhancing Cybersecurity Resilience: The Dual Role of MSPs and Security Awareness Training
- Oct 16, 2023
[New research] Do longer passwords protect you from compromise?
- Oct 10, 2023
Empowering African MSPs: Defend Against BEC Attacks with Mailprotector
- Oct 3, 2023
The Human Element in Cybersecurity: A Critical Imperative for South African Businesses
- Sep 19, 2023
Enhancing Email Security with Mailprotector: Authentication Protocols Explained
- Aug 10, 2023
Fortify African Financial Institutions: Protect Assets with Webroot Endpoint Defence
- Jul 26, 2023
Cloud-Based vs. On-Premise Cybersecurity Solutions: Weighing the Pros and Cons
- Jul 17, 2023
Enhancing Email Security Why Microsoft Outlook Needs an Additional Email Filter Solution
- Jul 13, 2023
Six ways to apply the principle of least privilege to your Active Directory