Friday, July 11, 2025
No menu items!

Fortinet Security

Social Engineering Attacks to be Aware of This Tax Season

As South Africans prepare to file their tax returns from 7 July, cybercriminals are also gearing up. Tax return time becomes open season for cybercrime, and this year is expected to be worse due to many people working from...

Why Ransomware is the Greatest Threat to Your Organisation

Ransomware is getting nastier and more expensive all the time and it has affected almost every industry and geography. No one is immune from the threat. In a global ransomware survey conducted by Fortinet, 67% of organizations report suffering a ransomware attack. Even...

FirstNet Technology Services Broadens its Security Offering with EDR Solution from Fortinet

FirstNet Technology Services, a First Technology Group company, has broadened its security portfolio offering to include endpoint detection and response (EDR). As a long-time Fortinet partner, FortiEDR was the natural choice. This is according to Dave Campbell, Product Manager: Cloud...

iOCO Brings Fortinet’s Secure SD-WAN to Local Financial Services Institution

iOCO, the ICT services business of the JSE-listed EOH Group, has been chosen to assist a large financial services company in the implementation of its software-defined wide-area networking (SD-WAN) rollout. This has allowed the firm to take a bold...

3 Things to Consider When Implementing an Effective Zero Trust Access Strategy

The most secure network is one that has no connections. Of course, that idea is not only impractical, it defeats the purpose of a network. The reality is that no network is an island, and as businesses become more...

iOCO Offers Africa-Focused SD-WAN Solution to IT Landscape

After a year-long due diligence process, EOH, a JSE-listed technology services firm, through its IT services company, iOCO, has chosen to extend its partnership with Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, in order to...

7 Techniques Cybercriminals Could Use to Steal Your Private Data

Cyber threats do not rest and they continue to evolve as bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise. The most important thing is to know how exactly cybercriminals...

7 Steps to Deal with a Data Breach

As data breaches continue to make their way into the public news cycle, individuals and organizations alike are looking for ways to protect their financial and personal information. When it comes to this type of threat, two things are...
- Advertisement -spot_img

Latest News

Nvidia Surpasses $4 Trillion Market Cap, Outpacing Apple & Microsoft

Nvidia has officially surpassed a market capitalization of $4 trillion, making it the first company in history to reach this...
- Advertisement -spot_img