Outsourced IT for businesses with up to 200 users. Call us today on +27 21 673 6756

Library

IT Security : The secure endpoint

  • Posted by tid_support
  • On 21 July 2017
  • 0 Comments
  • cyber threats, cyber warfare, firewall, monitoring, NotPetya, Petya, ransomware, WannaCry
Cyber security: An ever-evolving threat landscape that is only just beginning to take shape. Not long ago, endpoint security was all about viruses and email worms.  In hindsight, those were the happy days.  Few threats from yesteryear were financially motivated with the exception of industrial espionage.  Today business faces a significantly more comprehensive and sinister […]
Read More
 

Configuration management – the DevOps victim

  • Posted by tid_support
  • On 28 March 2017
  • 0 Comments
  • agile, agility, bimodal, configuration management, continuous delivery, devops
  Configuration management The quest for corporate agility   This article is written from the perspective of discussing the main obstacles to business agility.  More specifically, business that pursue competitive advantage objectives by means of responsiveness to customer demand, find themselves facing an interesting dilemma. The issue is twofold.  On the one hand there is […]
Read More
 

Agility as an IT Driver

  • Posted by tid_support
  • On 6 March 2017
  • 0 Comments
  • agility, IT driver, strategy
Agility allows business to respond quickly.  As a business driver for IT, it is normally combined with Time to Market.  Agility and Time to Market are typical in business with growth strategies.  They are less likely to be found in Pension Schemes, local government and hospitals than they are to be found in general market […]
Read More
 

SME IT Security : The basics

  • Posted by tid_support
  • On 21 February 2017
  • 0 Comments
  • byod, encryption, monitoring, security, shared responsibility model
Securing your business In this article, the second in our series, we look beyond the fundamentals of security in your business and cover the basics of corporate information security and digital asset protection.  We cover 4 additional subjects and continue developing our insight into keeping our business information as secure as is practically possible.  The […]
Read More