top of page
Specops
Jul 13, 2023
Six ways to apply the principle of least privilege to your Active Directory
Learn how implementing least privilege access in Active Directory enhances cybersecurity and protects sensitive information.
17
CyberHub
Jul 11, 2023
Cyber Resilience in Africa: Empowering SMBs to Safeguard Against Cyber Attacks with MSPs.
In today's interconnected world, cybersecurity has become an increasingly critical concern for businesses of all sizes. Small and...
3
CyberHub
Jun 29, 2023
Navigating Data Privacy Regulations in Africa: A Guide for MSPs with Webroot DNS Protection
In today's digital age, data privacy has become a critical concern for businesses and individuals alike. In Africa, as the data privacy...
6
CyberHub
Jun 20, 2023
6 Essential Email Security Solutions Every MSP Should Offer: A Comprehensive Guide with Mailprotecto
Email security is a top concern for businesses everywhere in today's networked world, including the African continent. It is essential...
7
CyberHub
Jun 6, 2023
The Rising Threat of Ransomware Attacks: Addressing the Prevalence in Africa and Safeguarding Client
Ransomware attacks have become a pressing concern worldwide, with Africa experiencing an alarming surge in recent years. Managed Service...
31
CyberHub
May 30, 2023
Understanding Hackers: How Experts Are Helping Businesses Stay Secure
In today's interconnected digital landscape, the threat of cyberattacks looms larger than ever, posing significant risks to businesses of...
16
Specops
May 25, 2023
What IT Teams should do about security concerns around the new Google Authenticator sync feature
Act Now: Safeguard User Privacy. Advise Delay on New Feature Activation until Google Implements Encryption.
20
CyberHub
May 23, 2023
Introducing Easy NAC: Empowering MSPs and MSSPs with Enhanced Network Access Control
In today’s increasingly interconnected world, ensuring robust network security is paramount. As CyberHub, a leading cybersecurity...
30
CyberHub
May 17, 2023
Building Cyber Resilience with Webroot: A Closer Look at NIST Guidelines and Best Practices.
Cybersecurity is an ever-evolving field, and as technology advances, so do the threats that businesses face. This is particularly true in...
21
CyberHub
May 11, 2023
CyberHub Announces Partnership with GoldPhish
We are thrilled to announce our latest vendor partnership! CyberHub has recently partnered with GoldPhish, a leading provider of...
13
CyberHub
May 4, 2023
Strengthen Your Cybersecurity Offering:
Partner with CyberHub Africa and Webroot to protection against evolving cyber threats.
16
CyberHub
Apr 28, 2023
Building a Strong Security Ecosystem: Why MSPs and MSSPs Should Partner with CyberHub
CyberHub Africa offers MSPs and MSSPs access to top cybersecurity solutions, cost savings, marketing support, and compliance.
17
Tyler Moffitt
Mar 8, 2023
Discover 2022’s Nastiest Malware
For the past year, hackers have been following close behind businesses and families just waiting for the right time to strike. In other...
11
Brandon Lee
Feb 15, 2023
Active Directory and domain controller security best practices
Windows Servers in the environment housing the Active Directory Domain Services (AD DS) role are some of the most sought-after targets...
21
Mailprotector
Feb 14, 2023
Select the Best Phishing Protection Solution for Your Users
The average business email compromise (BEC) attack can cost a company hundreds of thousands of dollars, if not more. And according to the...
123
Tyler Moffitt
Feb 10, 2023
Global SMB Ransomware Survey: Fighting More… with Less
Small and medium-size business (SMB) leaders have a lot on their minds. The looming recession and inflation have created financial...
14
Bobs Business
Jan 25, 2023
Why cybersecurity is important for small businesses
Today it’s not uncommon to see in the news that organisations as large and varied as Adidas and the NHS have become victims of...
30
Lori Ann Kruse
Jan 18, 2023
4 Facts About Ransomware Groups that Use Lateral Movement
“It is a fairly open secret that almost all systems can be hacked, somehow,” said the famous Internet Security Researcher David Kaminsky....
6
Blackpoint Cyber
Jan 5, 2023
A Toolset to Protect You Every Step of the Way
Adding Tools to Your Cybersecurity Cart The IT industry is inundated with tools and vendors for you to choose from. Many companies offer...
21
Rosemarie O'Connor
Nov 28, 2022
7-Types-of-Cybersecurity
Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic...
11
bottom of page