15 questions organisations are asking about POPIA Security 15 questions organisations are asking about POPIA 1. What is POPIA? The Protection of Personal Information Act is South Africa’s data privacy…Turrito Networks14th March 2022
Redstor and POPIA Security Redstor and POPIA The Protection of Personal Information Act, South Africa’s data privacy law, was drafted in 2003,…Turrito Networks14th March 2022
Traditional Antivirus vs. EDR (Endpoint Detection and Response) Security Traditional Antivirus vs. EDR (Endpoint Detection and Response) Traditionally, antivirus has been sufficient to protect your organization’s endpoints. EDR is the next level…Turrito Networks10th February 2022
The Complete Guide to EDR Security The Complete Guide to EDR As the intelligence of hackers continues to grow, so does the technology built to protect…Turrito Networks10th February 2022
What Is Endpoint Detection and Response (EDR)? Security What Is Endpoint Detection and Response (EDR)? Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is…Turrito Networks10th February 2022
What is Network-as-a-Service (NaaS)? MSP What is Network-as-a-Service (NaaS)? The flexible consumption model (FCM)—or as we know it—the everything-as-a-Service (XaaS) model, has steadily, but…Turrito Networks10th February 2022
Combatting Business Email Compromise Risks Security Combatting Business Email Compromise Risks An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably…Turrito Networks10th February 2022
What are the risks to your business of a phishing attack? Security What are the risks to your business of a phishing attack? Whether you’re an SME or a large multinational company, the risks of being victim to…Turrito Networks10th February 2022
Predictions for 2022: Tomorrow’s Threats Will Target the Expanding Attack Surface Security Predictions for 2022: Tomorrow’s Threats Will Target the Expanding Attack Surface According to FortiGuard Labs, 2022 is shaping up to be a banner year for cybercriminals, with…Turrito Networks10th February 2022
The SD-WAN work-from-home conundrum Connectivity The SD-WAN work-from-home conundrum Software-defined networking provides massive improvements against more traditional MPLS wide-area networks. But in the remote…Turrito Networks8th February 2022
10 Assumptions About macOS Security That Put Your Business At Risk Security 10 Assumptions About macOS Security That Put Your Business At Risk The users of these Macs are more often than not surprised to learn that their…Turrito Networks8th February 2022
8 new ways to empower Frontline Workers and transform the way they work with Microsoft 365 Cloud 8 new ways to empower Frontline Workers and transform the way they work with Microsoft 365 Companies at the forefront of digital transformation recognize how critical it is to enable all…Turrito Networks8th February 2022