Eric van Zyl

Blue Turtle, a leading South African enterprise technology company offering targeted, tailor-made IT

Tech Confessions | Ivanti 19/08/2023

Tech Confessions | Ivanti Watch these jaw-dropping confessions about hidden assets and misused or unmonitored devices that can put your business at risk.

Harvard Business Review on LinkedIn: Why Kindness at Work Pays Off | 256 comments 19/08/2023

Harvard Business Review on LinkedIn: Why Kindness at Work Pays Off | 256 comments When anxiety is high and morale is low, kindness isn’t a luxury — it’s a necessity. | 256 comments on LinkedIn

Solar tax breaks in South Africa — what homeowners and businesses should know 29/05/2023

https://mybroadband.co.za/news/energy/491271-solar-tax-breaks-in-south-africa-what-homeowners-and-businesses-should-know.html?utm_source=newsletter

Solar tax breaks in South Africa — what homeowners and businesses should know Webber Wentzel partners Chetan Vanmali and Joon Chong outline the factors homeowners and businesses must consider to qualify for South Africa’s solar incentives.

Timeline photos 07/02/2023
07/02/2023

10 lessons from book “who moved my cheese”

1. Change is inevitable and it is better to accept it and adapt to it rather than resist it.

2. Anticipate change and be prepared for it.

3. Don't cling to old ways and habits that no longer serve you.

4. Embrace new opportunities and be open to new possibilities.

5. Learn to let go of past failures and move on.

6. Don't be afraid to take risks and try new things.

7. Stay positive and keep a sense of humor, even in difficult situations.

8. Learn to adapt to new circumstances and find new ways to achieve your goals.

9. Be proactive and take action, rather than waiting for change to happen.

10. Learn to appreciate the present moment and enjoy the journey, not just the destination.

"I hope you enjoy these highlights.Get access to the Hindi audiobook by clicking the link in the comments for a KUKU FM subscription.

https://www.positivebrains.in/2023/01/summary-of-book-who-moved-my-cheese.html

Microsoft : Microsoft cloud outage hits users around the world 25/01/2023

Microsoft : Microsoft cloud outage hits users around the world Jan 25 (Reuters) - Microsoft Corp MSFT.O on Wednesday said it had recovered all of its cloud services after a networking outage took down its cloud platform Azure along with services such as Teams and Outlook used by millions around the globe.

Where computing might go next 05/12/2022

Where computing might go next The future of computing depends in part on how we reckon with its past.

From fake links for online meetings to drones - SA businesses warned of cyberattacks | Business 05/12/2022

From fake links for online meetings to drones - SA businesses warned of cyberattacks | Business Next year is likely to see a record number of destructive cyberattacks affecting government and critical industries in South Africa, warns global cybersecurity firm Kaspersky's principal security researcher.

OPERA1ER hackers steal over $11 million from banks and telcos 10/11/2022

https://www.bleepingcomputer.com/news/security/opera1er-hackers-steal-over-11-million-from-banks-and-telcos/

OPERA1ER hackers steal over $11 million from banks and telcos A threat group that researchers call OPERA1ER has stolen at least $11 million from banks and telecommunication service providers in Africa using off-the-shelf hacking tools.

Warning over annoying spam calls in South Africa 07/07/2022

Warning over annoying spam calls in South Africa South Africa’s Information Regulator has issued a stern warning to marketing companies and other groups who abuse the Protection of Personal Information Act (POPIA).

Data breach exposes South African landlord and tenant information 16/05/2022

Data Breach - South African Landlord and Tenant information

Data breach exposes South African landlord and tenant information Averly suffered a data breach that compromised its clients’ personal information — including real estate agents, landlords, and tenants.

Council Post: Making Sense Of Cybersecurity Culture By Defining And Engaging It 27/04/2022

Cybersecurity - Focus on Humans

Council Post: Making Sense Of Cybersecurity Culture By Defining And Engaging It If you focus on creating and supporting the right security culture, you can minimize risk.

CHATBOT AFRICA & CONVERSATIONAL AI SUMMIT - 2ND EDITION 25/04/2022

CHATBOT AFRICA & CONVERSATIONAL AI SUMMIT - 2ND EDITION The Chatbot Africa & Conversational AI Summit is for everyone in CONVERSATIONAL AI, CHATBOT, VOICE AND CONVERSATION DESIGN IN AFRICA.

Managed IT Service Providers React To Microsoft Partner Program Changes 23/04/2022

Managed IT Service Providers React To Microsoft Partner Program Changes Microsoft will be resetting its partner program (Microsoft Partner Network) and changing it significantly. Read more about the change here.

CYBERSECURITY: US claims South Africa targeted in Russia’s global hack attack campaigns 03/04/2022

Russia’s global hack attack - SA targeted in campaigns to compromise critical infrastructure

CYBERSECURITY: US claims South Africa targeted in Russia’s global hack attack campaigns The US is hunting down four alleged hackers it believes are involved in campaigns to compromise critical infrastructure worldwide. South Africa is apparently on the hackers’ list of targets.

Russia, Ukraine and the Danger of a Global Cyberwar | SecurityWeek.Com 25/02/2022

Danger of a Global Cyberwar - Risk in all IT & Security

"overriding impression given by Marcus Willett is that both sides (this excludes any action or opportunity taken by China, Iran or North Korea) will do everything possible to avoid the actuality of a Russia/Ukraine cyberwar spreading to the wider world. But ‘unintended consequences’ is a risk in all IT and security – and unintended consequences are hard to predict or control."

Russia, Ukraine and the Danger of a Global Cyberwar | SecurityWeek.Com The big difference between the Russia of the USSR and the Russia of today has been the emergence of cyber as an accepted theater of war. It is this role of cyber that SecurityWeek discussed with Marcus Willett.

FNB warns of new ‘remote’ scams targeting customers in South Africa 19/02/2022

‘Remote’ scams targeting customers in South Africa

FNB warns of new ‘remote’ scams targeting customers in South Africa FNB is warning consumers of ‘remote access’ scams currently targeting its customers in South Africa, tricking them into compromising the security of their information and financial credentials.

Experts Warn of Hacking Group Targeting Aviation and Defense Sectors 16/02/2022

Hacking Group Targeting Aviation and Defense Sectors

Experts Warn of Hacking Group Targeting Aviation and Defense Sectors Researchers warn of a hacking group that has been targeting aviation, aerospace, transportation, manufacturing, and defense industries for years.

Microsoft warns of multi-stage phishing campaign leveraging Azure AD 31/01/2022

Microsoft - Threat analysts uncovered large-scale, multi-phase phishing campaign

Microsoft warns of multi-stage phishing campaign leveraging Azure AD Microsoft's threat analysts have uncovered a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices onto the target's network and use them to distribute phishing emails.

View: Will the next 9/11 be a cyber attack? 31/01/2022

Global Risk Report 2021 - cyber security failure among the greatest threats facing humanity within next decade.

"WEF report states, “…attackers could trigger a breakdown in the systems that keep societies functioning.” Nuclear Power plants, Banking operations, Intensive Care Units, Cold Storages with COVID vaccinations among others - all potential targets for hackers."

View: Will the next 9/11 be a cyber attack? The World Economic Forums Global Risk Report for 2021 placed cyber security failure among the greatest threats facing humanity within the next decade.

GDPR Fines Surged Sevenfold to $1.25 Billion in 2021: Study | SecurityWeek.Com 25/01/2022

GDPR non-compliance fines increased sevenfold in 2021

GDPR Fines Surged Sevenfold to $1.25 Billion in 2021: Study | SecurityWeek.Com Fines issued for GDPR non-compliance increased sevenfold in 2021, from €158.5 million (approximately $180 million) in 2020 to just under €1.1 billion (approximately $1.25 billion) in 2021

In Order to Have Good Security Culture, Behaviour Comes First 25/01/2022

Security Culture - raise awareness among users of the importance of cybersecurity and the part they have to play in it

In Order to Have Good Security Culture, Behaviour Comes First In our efforts to raise awareness among users of the importance of cybersecurity and the part they have to play in it, we sometimes go about things in a long-winded manner.

9 key security threats that organizations will face in 2022 25/01/2022

2022 - Predicted Security Threats

Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches and more...

9 key security threats that organizations will face in 2022 Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches are just some of the threats to watch for next year, Check Point Software says.

Phishing impersonates shipping giant Maersk to push STRRAT malware 25/01/2022

Phishing - Impersonating Maersk emails

If the recipient opens the attached document, it becomes a powerful remote access trojan that can steal information and even fake ransomware attacks.

Phishing impersonates shipping giant Maersk to push STRRAT malware A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim's devices.

WATCH: 10-meter S***m whale approaches diver for help 09/12/2021

WATCH: 10-meter S***m whale approaches diver for help Between Shell's seismic surveys and mining currently underway along the West Coast, our oceans have been making local and international headlines.

Prediction Season: What's in Store for Cybersecurity in 2022? | SecurityWeek.Com 08/12/2021

What's in Store for Cybersecurity

Prediction Season: What's in Store for Cybersecurity in 2022? | SecurityWeek.Com While it might be overwhelming, focusing on these predictions for 2022 will help you strengthen your security posture and minimize your organization’s risk exposure.

When criminals go corporate: Ransomware-as-a-service 17/10/2021

Ransomware-as-Service

Criminals Going Corporate

When criminals go corporate: Ransomware-as-a-service Pen-testers, rogue developers, dodgy hosters, etc. etc.

08/10/2021
15/09/2021

Critical aspects of transforming the way your current workloads and workflows are automated.

A critical survival component of any workload automation solution is the ability to integrate into various new and legacy systems to design critical application service jobs to deliver an organisation’s application and business service requirements at an accelerated rate. Creating consistency across the development, test and production environments is a key capability, giving an organisation’s developers the ability to embed their workflow automation during the application development life cycle. Applications can now be delivered in more reliable approach, with errors being diagnosed and resolved in a rapid manner. Consideration of incorporating the need for orchestrating in ephemeral environments is an important factor for any containerisation strategy that organisations are embarking on, to orchestrate workflows dynamically, allowing organisations to run what they need when they need it.

Hackers breach South Africa’s courts — systems crippled and people’s banking details compromised 12/09/2021

SA Courts - Hackers crippled systems and people’s banking details compromised

An anonymous Gauteng lawyer has told Rapport that “millions of pieces of personal information” were leaked in the recent ransomware attack suffered by the Department of Justice and Constitutional Development.

Hackers breach South Africa’s courts — systems crippled and people’s banking details compromised A Gauteng lawyer has warned that “millions of pieces of personal information” were leaked in a recent ransomware attack on the Department of Justice.

Cybersecurity Seen as Rising Risk for Airlines After 9/11 | SecurityWeek.Com 12/09/2021

after 9/11

Rising Risk for Airlines

"After remaking their security procedures following the 9/11 attacks to stop airline hijackings, carriers are now faced with rising threats targeting computers and electronic equipment critical to their operations and safety.

The embrace of digital technology has created new opportunities for trouble, with hackers able to pe*****te systems through suppliers' software, online services or WiFi offered to passengers."

Cybersecurity Seen as Rising Risk for Airlines After 9/11 | SecurityWeek.Com After remaking security procedures following the 9/11 attacks, airlines are now faced with rising threats targeting computers and electronic equipment critical to their operations and safety.

20/08/2021

Password Safety

Pick n Pay transforms IT services with 4me, Blue Turtle 19/08/2021

Blue Turtle Technologies deploy 4me, next-generation ESM solution for Pick n Pay.

With the 4me platform, Pick n Pay is looking to speed up the transition from a pure IT service management (ITSM) model to an all-encompassing SaaS-based ITSM and ESM platform, and streamline the collaboration between support teams, external service providers and consumers of the IT services.

Pick n Pay transforms IT services with 4me, Blue Turtle With the 4me platform, Pick n Pay is looking to speed up the transition from a pure IT service management model to an all-encompassing SaaS-based ITSM and ESM platform.

17/08/2021

Critical aspects of transforming the way your current workloads and workflows are automated.

Incorporating workload orchestration within your DevOps life cycle has and will always be a critical aspect to development of application workflows to reduce costs while improving the quality of development jobs through continuous integration (the practice of integrating new code into shared repositories in order to build, test and release applications at the click of a button. The advantage is identifying bugs early and resolving this in the beginning stage of the development life cycle. This leads enterprises into scaling and simplifying their data pipelines from ingestion, processing all the way to analytics while maintaining a complete 360-degree view of their data pipelines as it progresses through each stage.

Blood service hit by cyberattack 01/08/2021

Western Cape Blood Bank hit by Cyber Attack

Blood service hit by cyberattack The Western Cape Blood Service announced that its information systems have been hit by a cyberattack.

Turn Off, Turn On: Simple Step Can Thwart Top Phone Hackers | SecurityWeek.Com 30/07/2021

Secure your Smartphone

"Regularly rebooting smartphones can make even the most sophisticated hackers work harder to maintain access and steal data from a phone."

https://www.securityweek.com/turn-turn-simple-step-can-thwart-top-phone-hackers

Turn Off, Turn On: Simple Step Can Thwart Top Phone Hackers | SecurityWeek.Com Regularly rebooting phones can make even the most sophisticated hackers work harder to maintain access and steal data from a phone.

29/07/2021

Cyber Security Tips for Small Businesses

Plan for Attack
You need to work with an experienced IT consultant or in-house IT staff on a plan for a data breach. Because such attacks are so prevalent, it’s best to prepare for the worst.

Having a backup in place could help to get your business back up and running in the event of data loss.

Passwordless: FIDO2 Security Key Sign-In for Windows & Apps 27/07/2021

Passwordless Authentication

FID02 Security Key Sign-in for Windows and Apps

Passwordless: FIDO2 Security Key Sign-In for Windows & Apps How to setup and enable a FIDO2 security key to be used to sign into Windows 10 and applications (cloud and on-prem). Questions? Ask me on Twitter ...

Certified Pre-Owned 27/07/2021

Active Directory

"TL;DR Active Directory Certificate Services has a lot of attack potential!"

"While several aspects of Active Directory have received thorough attention from a security perspective, Active Directory Certificate Services has been relatively overlooked."

Certified Pre-Owned Active Directory Certificate Services has a lot of attack potential!

Want your business to be the top-listed Computer & Electronics Service in Cape Town?
Click here to claim your Sponsored Listing.

Cloud Migration, Dev-Ops, ITSM, Quality Management, Cyber Security and IOT Solutions

Focused on enabling business strategies, increase certainty, improves performance, enable agility and enhance convenience thereby creating real value for our customers.

Videos (show all)

Telephone

Address


Cape Town

Opening Hours

Monday 09:00 - 17:00
Tuesday 09:00 - 17:00
Wednesday 09:00 - 17:00
Thursday 09:00 - 17:00
Friday 09:00 - 17:00

Other Information Technology Companies in Cape Town (show all)
Dom Long-Innes Dom Long-Innes
5 Willow Road
Cape Town, 7806

Expert tech support for Constantia & surrounds. Swift solutions from dawn till dusk. Local expertise.

DFA Solutions DFA Solutions
Suite 7, Burlington Arcade, Cnr Main & Lester Road, Wynberg
Cape Town, 8001

DFA SOLUTIONS' services include consultation, project management, cybersecurity management, support services as well as the procurement of IT related products.

Realm Digital Realm Digital
Block A, Bonitas Park, South Gate, C/O Carl Cronje & Fountain Road
Cape Town, 7530

Helping companies solve problems, unlock value and achieve their vision #YouImagineWeBuild

RunnerStack RunnerStack
Cape Town, 8001

Information Systems Engineering Pty Ltd Information Systems Engineering Pty Ltd
Unit G15 Old Castle Brewery, Beach Road
Cape Town, 7925

ISE is a Value Added WiFi Distributor focusing on WLAN Design with structured Implementation.

Slide Slide
Cape Town

Enlight Technologies Enlight Technologies
Cape Town, 7530

Crèer Web Design Crèer Web Design
Cape Town, 7945

Specialists in website design & social media management.

Geduldt and Brothers Geduldt and Brothers
20 Aloe Road
Cape Town, 7785

For all your I.T needs

Timeline - NeuroSpicy technology Timeline - NeuroSpicy technology
6 Aliwal Road
Cape Town, 7708

Bespoke NeuroSpicy insights and technology | A brand of BMEC Technologies

Open Xchange Africa Open Xchange Africa
Unit 9, Bateleur Office Park, Pasita Street, Bellville
Cape Town, 7530

Open Xchange Africa is a Black owned African Digital Payments Company providing a World Leading, Loc

Sithe Studio Sithe Studio
25 Thomas Street, Delft South
Cape Town, 7100

PC Doctor - Software, Hardware, Business Service & Designs