Securicom
2:40

Pandemic highlights need for cyber risk management in SMEs

The lack of cyber risk management is a factor in the higher incidence of cyber related fraud amongst small businesses during the lockdown
3:50
Jul 30, 2020

What to do when your info is found for sale

Research by cyber security company, Digital Shadows suggests that there are over 15 billion stolen username and password credentials doing the rounds on the dark web.
4:40
Jul 6, 2020

Don’t get tangled in the dark web

The dark web is an underground network of untraceable websites and online activities, says Securicom.
6:00
Jun 23, 2020

Dodge ransomware – learn to spot a phish

Increasingly, ransomware is a product of phishing scams and phishing, the fraudulent process of acquiring information.
3:20
Jun 3, 2020

Employees are the first line of defense against cyber crime – use them

uSecure – a new managed service offering from Securicom – transforms user behaviour and reduces the human error risk to cyber attacks.
2:40
May 20, 2020

Securicom is designated a Fortinet Expert

Fortinet Inc has elevated Securicom’s channel partner status to Fortinet MSSP Expert.
2:00
Oct 8, 2018

Richard Broeke takes the helm as Managing Director of Securicom

Specialist managed IT security services' company, Securicom has announced Richard Broeke as the new Managing Director.
3:00
May 15, 2018

Securicom reduces data centre footprint with Cloudistics

Douw Gerber at Securicom, value added distributor for Cloudistics in Africa, says about a third of the equipment running in a typical data centre consumes electricity without doing any computing.
4:20
May 9, 2018

The cloud is nice, but local is "lekker'

When it comes to enterprise data in the cloud, keeping it local is "Lekker" says Douw Gerber at Securicom.
4:00
Mar 14, 2018

Securicom brings world first Cloudistics to SA

Securicom is proud to announce the introduction of Cloudistics, a cloud software appliance technology, to the South African market.
3:00
Oct 25, 2017

Mobile security in the enterprise - there's a missing puzzle piece

A mobile management solution holds little ground without a policy in place. Companies are neglecting to define what resources can be accessed and have not identified what devices are already accessing the network, says Michael Morton, a mobile security specialist at Securicom.