Eric van Zyl
Nearby computer & electronics services
7500
7560
Blue Turtle, a leading South African enterprise technology company offering targeted, tailor-made IT
Tech Confessions | Ivanti Watch these jaw-dropping confessions about hidden assets and misused or unmonitored devices that can put your business at risk.
Harvard Business Review on LinkedIn: Why Kindness at Work Pays Off | 256 comments When anxiety is high and morale is low, kindness isn’t a luxury — it’s a necessity. | 256 comments on LinkedIn
Solar tax breaks in South Africa — what homeowners and businesses should know Webber Wentzel partners Chetan Vanmali and Joon Chong outline the factors homeowners and businesses must consider to qualify for South Africa’s solar incentives.
10 lessons from book “who moved my cheese”
1. Change is inevitable and it is better to accept it and adapt to it rather than resist it.
2. Anticipate change and be prepared for it.
3. Don't cling to old ways and habits that no longer serve you.
4. Embrace new opportunities and be open to new possibilities.
5. Learn to let go of past failures and move on.
6. Don't be afraid to take risks and try new things.
7. Stay positive and keep a sense of humor, even in difficult situations.
8. Learn to adapt to new circumstances and find new ways to achieve your goals.
9. Be proactive and take action, rather than waiting for change to happen.
10. Learn to appreciate the present moment and enjoy the journey, not just the destination.
"I hope you enjoy these highlights.Get access to the Hindi audiobook by clicking the link in the comments for a KUKU FM subscription.
https://www.positivebrains.in/2023/01/summary-of-book-who-moved-my-cheese.html
Microsoft : Microsoft cloud outage hits users around the world Jan 25 (Reuters) - Microsoft Corp MSFT.O on Wednesday said it had recovered all of its cloud services after a networking outage took down its cloud platform Azure along with services such as Teams and Outlook used by millions around the globe.
Where computing might go next The future of computing depends in part on how we reckon with its past.
From fake links for online meetings to drones - SA businesses warned of cyberattacks | Business Next year is likely to see a record number of destructive cyberattacks affecting government and critical industries in South Africa, warns global cybersecurity firm Kaspersky's principal security researcher.
OPERA1ER hackers steal over $11 million from banks and telcos A threat group that researchers call OPERA1ER has stolen at least $11 million from banks and telecommunication service providers in Africa using off-the-shelf hacking tools.
Warning over annoying spam calls in South Africa South Africa’s Information Regulator has issued a stern warning to marketing companies and other groups who abuse the Protection of Personal Information Act (POPIA).
Data Breach - South African Landlord and Tenant information
Data breach exposes South African landlord and tenant information Averly suffered a data breach that compromised its clients’ personal information — including real estate agents, landlords, and tenants.
Cybersecurity - Focus on Humans
Council Post: Making Sense Of Cybersecurity Culture By Defining And Engaging It If you focus on creating and supporting the right security culture, you can minimize risk.
CHATBOT AFRICA & CONVERSATIONAL AI SUMMIT - 2ND EDITION The Chatbot Africa & Conversational AI Summit is for everyone in CONVERSATIONAL AI, CHATBOT, VOICE AND CONVERSATION DESIGN IN AFRICA.
Managed IT Service Providers React To Microsoft Partner Program Changes Microsoft will be resetting its partner program (Microsoft Partner Network) and changing it significantly. Read more about the change here.
Russia’s global hack attack - SA targeted in campaigns to compromise critical infrastructure
CYBERSECURITY: US claims South Africa targeted in Russia’s global hack attack campaigns The US is hunting down four alleged hackers it believes are involved in campaigns to compromise critical infrastructure worldwide. South Africa is apparently on the hackers’ list of targets.
Danger of a Global Cyberwar - Risk in all IT & Security
"overriding impression given by Marcus Willett is that both sides (this excludes any action or opportunity taken by China, Iran or North Korea) will do everything possible to avoid the actuality of a Russia/Ukraine cyberwar spreading to the wider world. But ‘unintended consequences’ is a risk in all IT and security – and unintended consequences are hard to predict or control."
Russia, Ukraine and the Danger of a Global Cyberwar | SecurityWeek.Com The big difference between the Russia of the USSR and the Russia of today has been the emergence of cyber as an accepted theater of war. It is this role of cyber that SecurityWeek discussed with Marcus Willett.
‘Remote’ scams targeting customers in South Africa
FNB warns of new ‘remote’ scams targeting customers in South Africa FNB is warning consumers of ‘remote access’ scams currently targeting its customers in South Africa, tricking them into compromising the security of their information and financial credentials.
Hacking Group Targeting Aviation and Defense Sectors
Experts Warn of Hacking Group Targeting Aviation and Defense Sectors Researchers warn of a hacking group that has been targeting aviation, aerospace, transportation, manufacturing, and defense industries for years.
Microsoft - Threat analysts uncovered large-scale, multi-phase phishing campaign
Microsoft warns of multi-stage phishing campaign leveraging Azure AD Microsoft's threat analysts have uncovered a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices onto the target's network and use them to distribute phishing emails.
Global Risk Report 2021 - cyber security failure among the greatest threats facing humanity within next decade.
"WEF report states, “…attackers could trigger a breakdown in the systems that keep societies functioning.” Nuclear Power plants, Banking operations, Intensive Care Units, Cold Storages with COVID vaccinations among others - all potential targets for hackers."
View: Will the next 9/11 be a cyber attack? The World Economic Forums Global Risk Report for 2021 placed cyber security failure among the greatest threats facing humanity within the next decade.
GDPR non-compliance fines increased sevenfold in 2021
GDPR Fines Surged Sevenfold to $1.25 Billion in 2021: Study | SecurityWeek.Com Fines issued for GDPR non-compliance increased sevenfold in 2021, from €158.5 million (approximately $180 million) in 2020 to just under €1.1 billion (approximately $1.25 billion) in 2021
Security Culture - raise awareness among users of the importance of cybersecurity and the part they have to play in it
In Order to Have Good Security Culture, Behaviour Comes First In our efforts to raise awareness among users of the importance of cybersecurity and the part they have to play in it, we sometimes go about things in a long-winded manner.
2022 - Predicted Security Threats
Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches and more...
9 key security threats that organizations will face in 2022 Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches are just some of the threats to watch for next year, Check Point Software says.
Phishing - Impersonating Maersk emails
If the recipient opens the attached document, it becomes a powerful remote access trojan that can steal information and even fake ransomware attacks.
Phishing impersonates shipping giant Maersk to push STRRAT malware A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim's devices.
WATCH: 10-meter S***m whale approaches diver for help Between Shell's seismic surveys and mining currently underway along the West Coast, our oceans have been making local and international headlines.
What's in Store for Cybersecurity
Prediction Season: What's in Store for Cybersecurity in 2022? | SecurityWeek.Com While it might be overwhelming, focusing on these predictions for 2022 will help you strengthen your security posture and minimize your organization’s risk exposure.
Ransomware-as-Service
Criminals Going Corporate
When criminals go corporate: Ransomware-as-a-service Pen-testers, rogue developers, dodgy hosters, etc. etc.
Critical aspects of transforming the way your current workloads and workflows are automated.
A critical survival component of any workload automation solution is the ability to integrate into various new and legacy systems to design critical application service jobs to deliver an organisation’s application and business service requirements at an accelerated rate. Creating consistency across the development, test and production environments is a key capability, giving an organisation’s developers the ability to embed their workflow automation during the application development life cycle. Applications can now be delivered in more reliable approach, with errors being diagnosed and resolved in a rapid manner. Consideration of incorporating the need for orchestrating in ephemeral environments is an important factor for any containerisation strategy that organisations are embarking on, to orchestrate workflows dynamically, allowing organisations to run what they need when they need it.
SA Courts - Hackers crippled systems and people’s banking details compromised
An anonymous Gauteng lawyer has told Rapport that “millions of pieces of personal information” were leaked in the recent ransomware attack suffered by the Department of Justice and Constitutional Development.
Hackers breach South Africa’s courts — systems crippled and people’s banking details compromised A Gauteng lawyer has warned that “millions of pieces of personal information” were leaked in a recent ransomware attack on the Department of Justice.
after 9/11
Rising Risk for Airlines
"After remaking their security procedures following the 9/11 attacks to stop airline hijackings, carriers are now faced with rising threats targeting computers and electronic equipment critical to their operations and safety.
The embrace of digital technology has created new opportunities for trouble, with hackers able to pe*****te systems through suppliers' software, online services or WiFi offered to passengers."
Cybersecurity Seen as Rising Risk for Airlines After 9/11 | SecurityWeek.Com After remaking security procedures following the 9/11 attacks, airlines are now faced with rising threats targeting computers and electronic equipment critical to their operations and safety.
Password Safety
Blue Turtle Technologies deploy 4me, next-generation ESM solution for Pick n Pay.
With the 4me platform, Pick n Pay is looking to speed up the transition from a pure IT service management (ITSM) model to an all-encompassing SaaS-based ITSM and ESM platform, and streamline the collaboration between support teams, external service providers and consumers of the IT services.
Pick n Pay transforms IT services with 4me, Blue Turtle With the 4me platform, Pick n Pay is looking to speed up the transition from a pure IT service management model to an all-encompassing SaaS-based ITSM and ESM platform.
Critical aspects of transforming the way your current workloads and workflows are automated.
Incorporating workload orchestration within your DevOps life cycle has and will always be a critical aspect to development of application workflows to reduce costs while improving the quality of development jobs through continuous integration (the practice of integrating new code into shared repositories in order to build, test and release applications at the click of a button. The advantage is identifying bugs early and resolving this in the beginning stage of the development life cycle. This leads enterprises into scaling and simplifying their data pipelines from ingestion, processing all the way to analytics while maintaining a complete 360-degree view of their data pipelines as it progresses through each stage.
Western Cape Blood Bank hit by Cyber Attack
Blood service hit by cyberattack The Western Cape Blood Service announced that its information systems have been hit by a cyberattack.
Secure your Smartphone
"Regularly rebooting smartphones can make even the most sophisticated hackers work harder to maintain access and steal data from a phone."
https://www.securityweek.com/turn-turn-simple-step-can-thwart-top-phone-hackers
Turn Off, Turn On: Simple Step Can Thwart Top Phone Hackers | SecurityWeek.Com Regularly rebooting phones can make even the most sophisticated hackers work harder to maintain access and steal data from a phone.
Cyber Security Tips for Small Businesses
Plan for Attack
You need to work with an experienced IT consultant or in-house IT staff on a plan for a data breach. Because such attacks are so prevalent, it’s best to prepare for the worst.
Having a backup in place could help to get your business back up and running in the event of data loss.
Passwordless Authentication
FID02 Security Key Sign-in for Windows and Apps
Passwordless: FIDO2 Security Key Sign-In for Windows & Apps How to setup and enable a FIDO2 security key to be used to sign into Windows 10 and applications (cloud and on-prem). Questions? Ask me on Twitter ...
Active Directory
"TL;DR Active Directory Certificate Services has a lot of attack potential!"
"While several aspects of Active Directory have received thorough attention from a security perspective, Active Directory Certificate Services has been relatively overlooked."
Certified Pre-Owned Active Directory Certificate Services has a lot of attack potential!
Click here to claim your Sponsored Listing.
Cloud Migration, Dev-Ops, ITSM, Quality Management, Cyber Security and IOT Solutions
Focused on enabling business strategies, increase certainty, improves performance, enable agility and enhance convenience thereby creating real value for our customers.
Videos (show all)
Category
Contact the business
Telephone
Website
Address
Cape Town
Opening Hours
Monday | 09:00 - 17:00 |
Tuesday | 09:00 - 17:00 |
Wednesday | 09:00 - 17:00 |
Thursday | 09:00 - 17:00 |
Friday | 09:00 - 17:00 |
5 Willow Road
Cape Town, 7806
Expert tech support for Constantia & surrounds. Swift solutions from dawn till dusk. Local expertise.
Suite 7, Burlington Arcade, Cnr Main & Lester Road, Wynberg
Cape Town, 8001
DFA SOLUTIONS' services include consultation, project management, cybersecurity management, support services as well as the procurement of IT related products.
Block A, Bonitas Park, South Gate, C/O Carl Cronje & Fountain Road
Cape Town, 7530
Helping companies solve problems, unlock value and achieve their vision #YouImagineWeBuild
Unit G15 Old Castle Brewery, Beach Road
Cape Town, 7925
ISE is a Value Added WiFi Distributor focusing on WLAN Design with structured Implementation.
6 Aliwal Road
Cape Town, 7708
Bespoke NeuroSpicy insights and technology | A brand of BMEC Technologies
Unit 9, Bateleur Office Park, Pasita Street, Bellville
Cape Town, 7530
Open Xchange Africa is a Black owned African Digital Payments Company providing a World Leading, Loc
25 Thomas Street, Delft South
Cape Town, 7100
PC Doctor - Software, Hardware, Business Service & Designs