Security How to Create a Cyber Security Plan Technology is rapidly evolving, and with the advancement of both hardware and software that is…Turrito Networks23rd March 2022
Security 15 questions organisations are asking about POPIA 1. What is POPIA? The Protection of Personal Information Act is South Africa’s data privacy…Turrito Networks14th March 2022
Security Redstor and POPIA The Protection of Personal Information Act, South Africa’s data privacy law, was drafted in 2003,…Turrito Networks14th March 2022
Security Traditional Antivirus vs. EDR (Endpoint Detection and Response) Traditionally, antivirus has been sufficient to protect your organization’s endpoints. EDR is the next level…Turrito Networks10th February 2022
Security The Complete Guide to EDR As the intelligence of hackers continues to grow, so does the technology built to protect…Turrito Networks10th February 2022
Security What Is Endpoint Detection and Response (EDR)? Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is…Turrito Networks10th February 2022
MSP What is Network-as-a-Service (NaaS)? The flexible consumption model (FCM)—or as we know it—the everything-as-a-Service (XaaS) model, has steadily, but…Turrito Networks10th February 2022
Security Combatting Business Email Compromise Risks An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably…Turrito Networks10th February 2022
Security What are the risks to your business of a phishing attack? Whether you’re an SME or a large multinational company, the risks of being victim to…Turrito Networks10th February 2022
Security Predictions for 2022: Tomorrow’s Threats Will Target the Expanding Attack Surface According to FortiGuard Labs, 2022 is shaping up to be a banner year for cybercriminals, with…Turrito Networks10th February 2022
Connectivity The SD-WAN work-from-home conundrum Software-defined networking provides massive improvements against more traditional MPLS wide-area networks. But in the remote…Turrito Networks8th February 2022
Security 10 Assumptions About macOS Security That Put Your Business At Risk The users of these Macs are more often than not surprised to learn that their…Turrito Networks8th February 2022