Telkom ADSL copper shutdown

Telkom has announced that it is withdrawing its prepaid fixed copper-line service after migrating 96% of these customers to wireless products. Today, wireless technology has been proven to be more reliable than copper infrastructure (which are easily impacted by adverse weather conditions and cable theft in South Africa). Now, thousands of South African businesses fear going without internet connectivity and phone lines to keep their business going. Don’t panic yet! Keep reading to learn more about Telkom’s strategy to eliminate copper-line connectivity and our solution to keep your business running efficiently and affordably. Alternative Solutions Wondering how South African businesses will manage without copper-line connectivity? See below for Telkom’s strategy to migrate voice and DSL customers to LTE and fibre-based services. SmartVoice Because Telkom shut down its copper-based prepaid voice service, it will now target their post-paid fixed-line segment. According

Read the full article…

Microsoft Office 2010 is ending as of October 2020

The time is near, the support for Microsoft Office 2010 is ending as of October 2020. This will mean that Microsoft will no longer provide support for your Office 2010 software. You will no longer receive security updates, which help to protect your PC from harmful viruses, spyware, and other malicious software. You will no longer receive phone or chat technical support, and no further updates to support content. In fact, most online help content will be retired. You will also no longer be able to download Office 2010 from the Microsoft website. You may very well be asking the question, “Why is Microsoft doing this?” Microsoft Office 2010, like most Microsoft products, has a support lifecycle during which Microsoft provide new features, bug fixes, security fixes, and so on. This lifecycle typically lasts for 10 years from the date

Read the full article…

6 common threat vectors and how to protect against them

Data loss can lead to costly downtime, lost productivity, and even long-term reputational damage. But do you know which are the most common threat vectors? Let’s find out. Hardware failures – the king of all threat vectors They can occur at any time, all you can do is minimize the risk. To reduce downtime and sometimes even prevent it use backups and data replication, clustered configurations, dual power supplies, mirrored disks and RAID disk arrays and UPSs. Human error Accidents happen. It’s not a matter of if somebody will make a mistake. It’s rather a matter of when he will make it. That’s why regular backups take such important part in reducing cost of data loss caused by careless or malicious employees. Data corruption Data corruption is basically effect of a common system errors or bugs. It happens due to

Read the full article…

New #DataRegulations, 5 things you need to know

JOHANNESBURG – South Africans set to have some data relief after Icasa implements new data regulations on the 28 February. February 19, 2019 New data regulations by Icasa close to being implemented by mobile operators. Photo: Supplied Independent Communications Authority of South Africa (Icasa) is close to implementing the amended End User and Subscriber Services Charter (EUSSC) regulations which are effective from the 28 February.  South Africans will have some data relief after the new EUSCC regulations come into effect, this means customers who do not comply with the new data regulations by the 1 March might find themselves not being able to access any data. Here are the five things you need to know: End User and Subscriber Services Charter (EUSSC): relates to the new data regulations which include data transfer, data rollover, out of bundle usage and depletion

Read the full article…

POPI Compliance: Don’t let POPI cost you or your clients their business here are tips to get a head start!

POPI applies to almost all organisations across every industry and sector of society, and the consequences for non-compliance are significant (fines up to R10 million or jail sentence up to 10 years). If it affects you, you will need to start to thinking about compliance now. Our supplier created a microsite designed to help you understand the POPI Act, quantify the requirements, and offer solutions. POPI states that ‘appropriate, reasonable technical and organisational steps’ to prevent personal information from being unlawfully handled, and that international standards (like GDPR) and laws should be considered. IT Security as a Solution for Compliancy | The 3 Pillars of IT Security 1. The Fundamentals: Endpoint Protection The ever-increasing cyber threats such as ransomware, phishing or social engineering present risk to your data and a successful attack can bring about both a data and financial

Read the full article…

ESET Holds Itself To Higher Standards When It Comes To The Health Of IT Infrastructure, And It’s Easier Than You May Think

Just how healthy is your PC? And by healthy we’re referring to a clean, smooth-running system that is protected completely. Much like a properly cared for engine safeguards your vehicles performance, with regular services to maintain general upkeep and avoid problems before they arise, your computer systems need the same amount of care and caution for optimal performance. The ESET Team share some mandatory tips for optimal PC health: Think Before You Click