top of page
Search

We are the first Fortinet Operational Technology Specialised partner in South Africa
Securicom is the first ever Fortinet Operational Technology Specialised partner in South Africa.
-
Mar 15, 20231 min read
83 views
0 comments

The greatest asset can be the greatest threat
As ransomware attacks become more frequent and targeted to specific individuals, a company's greatest asset can pose the greatest risk.
-
Mar 10, 20233 min read
118 views
0 comments

ContraForce and Securicom Announce Strategic Partnership
Dallas, Texas and Johannesburg, South Africa – January 24, 2023 – ContraForce and Securicom are pleased to announce the launch of their...
-
Jan 30, 20232 min read
102 views
0 comments

Twenty three: The year of better security
With the new year, comes new goals for both individuals and businesses alike. One that businesses can easily check off is improving their...
-
Jan 25, 20232 min read
56 views
0 comments

Are we playing a losing game?
Ransomware is a type of malware that encrypts a victim's files and demands a ransom payment in exchange for the decryption key. It has...
-
Jan 13, 20232 min read
58 views
0 comments


Fortinet released a critical vulnerability in FortiOS .
What is the situation? Fortinet released a critical vulnerability in FortiOS that may allow remote unauthenticated attackers to execute...
-
Dec 13, 20222 min read
50 views
0 comments


Continuous check-ups for better cybersecurity
The cybersecurity industry is an ever-changing environment with new technologies and threats surfacing nearly daily. To stay abreast of...
-
Aug 16, 20222 min read
53 views
0 comments


Supporting Women in Digital Business
Securicom is proud to be involved in the 2022 MTN Women in Digital Business Challenge. The MTN SA Foundation allocated a R1 million...
-
Jul 18, 20222 min read
47 views
0 comments


Offering the best by partnering with the best
At the Fortinet Security Day South Africa, Securicom was awarded the Best Certified Partner of the Year 2021. It is an honour to receive...
-
Jun 13, 20222 min read
57 views
0 comments


Investing in skilled engineers
Technology can only go so far in protecting your cybersecurity landscape. Artificial intelligent technologies play an important role in...
-
May 17, 20223 min read
63 views
0 comments


Taking an unique approach to Managed Security
We’ve established the importance of Managed Security, and how it differs from, but also compliments a managed service. Now, it begs the...
-
Apr 21, 20223 min read
46 views
0 comments


When data is held ransom
Ransomware attacks are one of the most common cybersecurity threats. It can have a devasting impact on a business. During a ransomware...
-
Mar 28, 20223 min read
50 views
0 comments

Managed Service vs Managed Security
By now you should know a little more about Managed Security (read our article explaining the concept here), and you might be asking...
-
Mar 8, 20222 min read
47 views
0 comments

What is Managed Security?
In simple terms, Managed Security is an approach to cybersecurity in which all security systems are monitored, threats detected and...
-
Feb 18, 20222 min read
59 views
0 comments


Don’t get tangled in the dark web
The dark web is a hotbed of criminal activity. It is where sensitive business and personal information, guns, illicit drugs and even...
-
Nov 3, 20202 min read
58 views
0 comments


Can you spot a phish?
We are seeing more South African companies falling victim to Ransomware attacks – including small businesses. Most of the time,...
-
Oct 3, 20202 min read
58 views
0 comments

Experian Credit Bureau Data Breach, Hit By A Fraudster.
South Africa has just been hit by one of the largest-ever data breaches after Experian, one of the country’s biggest credit bureaus, was...
-
Aug 27, 20201 min read
57 views
0 comments


Don’t get left in the dark
Let us work with you to ensure effective protection against the three primary cyber-attack vectors: e-mail, endpoint and the web. Get...
-
Aug 15, 20191 min read
52 views
0 comments


Get Cyber Safe.
Fourth Industrial Revolution, IOT, Cyber Security, Ransomware, Targeted Attacks, Data Leaks, Compliancy. This often leaves us with more...
-
May 9, 20191 min read
51 views
0 comments
bottom of page