Home » IT » Page 7

IT

MTN Group Launches ‘Voice’ Brand Film to Empower Youth in Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Cloudmania Scoops the Microsoft Partner of the Year Award

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Dropping Fossil Fuels a “Great Threat to Africa”, Ramaphosa Says

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

AfDB Approves $2-Million Technical Grant to Boost Electricity Reforms

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

The Cybersecurity Wave: Importance and Impact of Cybersecurity in Today’s Digital World

Cyberattacks continue to be a threat to organizations across the world, but using powerful cybersecurity solutions can help you defend your organization against these malicious attacks. Without proper security management, your organization is an easy target for cybercriminals. Poor configuration of cloud services combined with how easy it is for cybercriminals to launch an attack poses a great threat to organizations. On top of this, cybercriminals often target entities outside of their jurisdiction, making it difficult for governing bodies to draft effective cybersecurity policies. Unlike years ago, simply installing an antivirus solution across your systems isn’t enough to protect your network of devices. Cyberattacks can arise from any level of the organization. From IT admins...

Eskom CEO Says Stage 6 Load-shedding Could Strike on Tuesday

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Apple to Launch a Bunch of New Devices Soon, Including iPhone 14

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

AfDB Approves Establishment of the African Pharmaceutical Technology Foundation

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Nomanini Launches New App for Retailers in Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Sophos Webinar: Navigating the Cybersecurity Triple Threat

As we move into 2022, ransomware shows no signs of slowing down – that’s no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It’s up to IT professionals to proactively deal with these trends to meet the challenges already on the horizon and beyond. Sophos and IT News Africa have collaborated to host a free webinar on 29 June 2022 to discuss the varied methods cyber attackers use to penetrate the networks of an entire organization. The webinar will review how Sophos’ EDR and MTR can help organizations detect these invasions before they escalate and, ultimately, eliminate the threat. It will also look at threat response, and why i...

Health Cabinet Secretary Calls for More Investment in Health-tech in Kenya

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.