top of page

Data Privacy Across Africa: Protecting Personal and Sensitive Information for Your Clients
Safeguarding Data, Empowering Trust: Ensuring Privacy Across Africa Data privacy is becoming an increasingly important priority for...
CyberHub
Mar 5
2

6 ways to get the most from Data Privacy Week
6 ways to get the most from Data Privacy Week Data Privacy Week (Jan. 27-31) is an excellent opportunity to reflect on the importance of...
Jody Grenert
Jan 29
1

7 cyber safety tips to outsmart scammers
Welcome to the wild west of the digital world where cyber scammers lurk around every pixelated corner. Cybercrime isn’t just a futuristic...
CyberHub
Nov 12, 2024
2

What’s the Best Office 365 Backup? A Comprehensive Checklist
Microsoft 365 is the bedrock of your organization, with all your business-critical data on Office 365. Losing important data or suffering...
Teresa Gracias
Sep 19, 2024
14

Announcing new EDR capabilities for Webroot Endpoint Protection
Webroot Sr. Product Marketing Specialist
David Rote
Aug 22, 2024
53


7 Tips on Keeping Your Data Private When Using AI
In recognition of its profound impact, July 16 is celebrated as Artificial Intelligence (AI) Appreciation Day. AI is one of the defining...
Nicole Beaudoin
Jul 16, 2024
6

Understanding Brute Force Attacks: The Persistent Threat in Cybersecurity
Brute force attacks illustrate how persistence can pay off. Unfortunately, in this context, it’s for bad actors. Let’s dive into the...
Tyler Moffitt
May 13, 2024
9

To fish or not to phish?
Esteffan, as the Digital Marketing Manager at GoldPhish, passionately spearheads the effort to safeguard the digital realm.
Esteffan Coetzee
May 6, 2024
19

Howzit! Announcing Our New AWS Backup Data Center in South Africa
OpenText proudly launches its latest datacenter in South Africa, fortifying its global data protection initiative and offering local storage
Teresa Gracias
May 2, 2024
67

Enhancing Email Security: A Guide to SPF, DKIM, and DMARC
Explore email security essentials: SPF, DKIM, DMARC. Strengthen defenses with insights in our latest blog.
CyberHub
Jan 29, 2024
31

Mastering Email Security: Navigating the Core Foundations
Communication is at the heart of every business, ensuring the security of your emails is not just a choice but a necessity. Email has...
CyberHub
Jan 22, 2024
25

Business Email Compromise (BEC) Scams
Expose the threats of BEC scams and fortify defenses with GoldPhish. Learn to combat cybercriminals in GoldPhish's latest blog post.
Esteffan Coetzee
Nov 29, 2023
15

Hybrid password attacks: How they work and how to stop them
Hybrid attacks: blend methods, use multi-factor auth, block weak passwords. Strengthen cybersecurity with Specops Password Policy.
Specops
Nov 9, 2023
18

Password reuse: A hidden danger you can’t ignore
Password reuse: A hidden danger that can compromise your organization's security. Protect with effective strategies.
Marcus White
Oct 25, 2023
14

Enhancing Cybersecurity Resilience: The Dual Role of MSPs and Security Awareness Training
Managed Service Providers (MSPs) are vital in modern cybersecurity, offering expertise and services to enhance business defences against...
CyberHub
Oct 17, 2023
7
![[New research] Do longer passwords protect you from compromise?](https://static.wixstatic.com/media/8c92bd_4f9dd676fa4149e29842276a6e99a5cc~mv2.png/v1/fill/w_292,h_219,fp_0.50_0.50,q_95,enc_auto/8c92bd_4f9dd676fa4149e29842276a6e99a5cc~mv2.webp)
[New research] Do longer passwords protect you from compromise?
The Specops Breached Password Protection Database Now Tops Over 4 Billion Unique Compromised Passwords We’re sharing some new findings...
Specops Software
Oct 16, 2023
11

Empowering African MSPs: Defend Against BEC Attacks with Mailprotector
Defend your clients from BEC threats with Mailprotector: advanced filtering, real-time intelligence, and anti-phishing measures.
CyberHub
Oct 10, 2023
3

The Human Element in Cybersecurity: A Critical Imperative for South African Businesses
Protect your African business from cyber threats by fostering a cybersecurity culture that empowers employees to be vigilant and proactive.
CyberHub
Oct 3, 2023
12

Enhancing Email Security with Mailprotector: Authentication Protocols Explained
This comprehensive guide is designed with Managed Service Providers (MSPs) and businesses in mind. We will unravel the complexities of...
CyberHub
Sep 19, 2023
18

Fortify African Financial Institutions: Protect Assets with Webroot Endpoint Defence
In recent years, the digital landscape has transformed the way financial institutions operate across Africa. While these advancements...
CyberHub
Aug 10, 2023
8
bottom of page