The Quiet Hero of Service Delivery
People of Vox: Spotlight on Luntu Nqunqa This is the story of a Quiet Hero – someone who doesn’t look for the spotlight but is...
Protect Your Kids from Online Predators
Some practical thoughts to guide parents and grandparents It can’t happen in my home… can it? Just because your children are playing online games in...
Real Risks of Critical Infrastructure Cyber Attacks
No longer only in the movies... There are very real cyberthreats lurking today, including critical infrastructure cyber attacks, and all organisations need to protect themselves....
Cyber Attacks on Small Businesses
Cyber attacks on small businesses are on the rise - why SMEs are more vulnerable to cyberattacks, and how to stay safe When we think...
How To Manage Your Digital Footprint
Protect your personal data – how much key information are you really exposing? Wherever there are people, there are those who decide to prey on...
Costs of a Data Breach to Your South African Business
Money, reputation, customers: A cyberattack is costly in multiple ways It’s estimated that cyberattacks will cost the South African economy R2.2 billion in 2025. That’s...
Microsoft Family and Personal Licences Unlock the Power of Ai
The speed at which artificial intelligence (AI) has transformed from being a niche technology into a mainstream tool these past few years is astonishing. The...
Please Call “Someone” – Understanding The Role of ISPs in How We Connect
There was a time where calling was simpler. Dial. Ring. Hope. Kind of like the lotto, except at least one family member always acted like…
Enabling People Through Technology
People of Vox: Spotlight on Natalie van der Merwe “Technology is best when it brings people together.” ~ Matt Mullenweg As the Vox Head of...
Your Company’s Telephony Needs: the Right Choice
Considering the differences between traditional and hosted PBX Even in today’s digital business world, Voice remains a key element in the overall communications offering, and...