From the Editor’s Desk

How can AI benefit my small business?

While many business owners are still trying to figure out exactly what artificial intelligence (AI) means for them, there is already a large percentage of small businesses that are using AI tools and vastly improving efficiency and saving hundreds of millions of rands. Sound too good to be true?

How AI can benefit a small business

VoIP for small businesses is the way to grow

Any business with a concern about efficient and cost-effective solutions for telecommunications has been informed that Voice over Internet Protocol (VoIP) telephone systems are the best choice in today’s Internet-driven society. It also allows small businesses to scale, making it easier for them to grow.

VoIP for small businesses is the way to grow

How secure are hybrid work models?

By the end of this year, 39% of global knowledge workers will work hybrid. This number increased from 37% in 2022, according to Gartner. Given these numbers, it’s easy to understand that collaborative work, which is time spent working with your colleagues using digital tools (like email, IM, phone calls and video conferencing platforms), is increasing. Research shows that collaborative work rose by about 50% between 2011 and 2021 and now consumes 85% or more of our working weeks. But how secure is it?

How secure are hybrid work models?

How the POPI Act impacts business?

South Africa’s comprehensive Protection of Personal Information (POPI) Act is now in effect. It is one of the world’s most sweeping regulations around personal information and carries hefty fines for businesses that break the law. In short, the POPI Act outlines how businesses, websites and government departments can process the personal information of their customers or citizens.

How the POPI Act impacts business

What is cybersecurity mesh and how secure is it?

The 2023 state of ransomware report compiled by security company Sophos noted that 78% of South African organisations were hit by ransomware in the past year. Keeping track of emerging digital threats is of utmost importance in the never-ending struggle to secure data from vulnerabilities. The need for a system that allows network operators to defend themselves against digital adversaries cannot be overemphasised. Therefore, a cybersecurity strategy is essential to achieve this.

What is cybersecurity mesh and how secure is it?