What we have learnt from 2020, is that tried and tested business plans are being re-evaluated and even redesigned, so the highly competitive IT service provider segment needs to set their sights on partnering with the right companies to ensure that some form of a “pre new normal” status quo is maintained. However, it is a two-way street and IT service providers will also have...
Read More
Data loss has financial implications, whether as a result of lost productivity or fines due to breaches of regulations like the Protection of Personal Information Act (PoPIA). In an already challenging economy, businesses simply cannot afford to not protect their data. However, the ‘new normal’ hybrid model of both office-bound and remote working, coupled with tighter budgets than ever, can make this difficult to achieve....
Read More
In the last five years data management has evolved from a closed environment, where each department would store and manage its own data, to data being managed in disparate silos across an entire organisation. This is largely a result of modernisation through cloud, converged and hyper-converged infrastructure. Today organisations across all industries are generating more data than ever before, in various locations across the business...
Read More
The Protection of Personal Information (PoPI) Act, which came into force on 1 July this year, has compelled organisations to take a closer look at their data management in terms of how it is stored, what data is stored and for how long this data must be stored. Essentially, this is the impact that the PoPI Act has had on businesses from an information management...
Read More
Resellers and managed service providers may seem to be in competing lines of business, but in reality, the opposite is true. As the world moves increasingly toward Everything-as-a-Service (XaaS) the role of the reseller will undergo a shift. However, they do not need to pit themselves against service providers. There is a symbiotic relationship that can be leveraged, with resellers bringing sales knowledge and the...
Read More
To streamline processes, maximise resources and optimise data usage in the business, backup and Disaster Recovery (DR) processes now include Machine Learning (ML) and Artificial Intelligence (AI) functionality. Operational data is where AI and ML have the potential to shine. Designed to track performance statistics, rates of change, speed of access, bottlenecks and so much more, combining ML and AI to operational data is the...
Read More
Staying home, sanitising, seeing your partner 24/7, and multitasking whilst trying to home school children has become the new normal. But so too has working from home, and everyone is online, possibly with less secure connections than required. There has also been a huge uptake of cloud-based services in order to support a mobile workforce. This means that digital transformation has seen rapid growth, but...
Read More
From laptops and PCs to mobile phones and tablets, wearables to smart TVs, the number of connected devices has grown exponentially – and this is only on the consumer side. There is also a plethora of sensors in everything from cars to fridges, manufacturing equipment to heavy machinery. These connected devices are collectively known as the Internet of Things (IoT) and they are driving data...
Read More
Ransomware is no laughing matter. Don’t let ransomware make your organization a victim. The five steps outlined below can help you maintain a constant state of recovery readiness. By keeping your backups safe and ready for rapid restoration, you can save time and keep your business out of harm’s way — and out of the news. A complete ransomware strategy includes both reducing the risk...
Read More
There’s no honour amongst thieves; an adage that couldn’t be truer in current times where unscrupulous cybercriminals target vulnerable organisations that are scrambling to find some form of operational normalcy amidst pandemic related protocols and regulations. With a significant amount of critical information such as production data being moved into the cloud, it has added a layer of vulnerability to companies’ security posture. Moreover, it...
Read More