<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=492489&amp;fmt=gif">
Group 403
Group 418

Cybersecurity

Connecting the edge to the Core to the Cloud with Open Networking

Modern technology has seen many new developments over the years with concepts like hyperconvergence, virtualisation, the cloud, and disaggregation entering the scene. However, the...

Educating Security Teams The Key to Business Resilience

Most businesses today are aware of the need for cybersecurity in an ever-changing digital environment. However, it’s not always obvious that cybersecurity involves more than...

Why Staying Up to Date is Vital for Your Business’ Security

Modern businesses are always poised for growth. A proactive business is ready to respond to any opportunity that may arise, but so are malicious actors. It may seem difficult to...

Business Cybersecurity – more important than ever

By Diane Pieterse Cybersecurity has become a top priority for businesses of all sizes. With cyberthreats evolving and becoming increasingly sophisticated, it is crucial to choose...

Don't let cyber-attacks take your business down

By Johannes Groenewald You may think that cybersecurity threats are not a significant concern for you or that cyberattacks only happen to big companies with large volumes of...

Is ChatGPT the new security risk?

While ChatGPT is an incredible and disruptive technology that appears to answer practically any question an individual might ask, it appears to leave C-suite executives and...

Don’t let your data get held to ransom

In today’s highly connected, online world, the danger of ransomware is becoming increasingly pervasive. What is ransomware, and how do we best defend against it? Connectivity is...

The ultimate guide to online retail security

By Alan Hawkins, General Manager: Cybersecurity and Software Online retailers have always been a compelling target for cyber criminals, as they collect, process, and store...

Addressing cloud security and privacy challenges

By Alan Hawkins, GM: Cyber-Security and Software Hyperscale public cloud providers have the economies of scale and in-house expertise to secure their data centres to an extent no...

Rapid response to threats and attacks is key to survival

Companies are facing a growing threat of cyberattacks every day, and the quality of their response can mean the difference between success and an utter catastrophe. This is why...

Top cyberattack trends in 2022

Although the accelerated adoption of new and innovative technologies is increasing efficiencies, it is adding a slew of dynamic cybersecurity challenges for businesses in every...

Consolidating your cybersecurity for better threat prevention

As technology infrastructure becomes increasingly complex and distributed, detecting and responding to threats has become harder and harder, and has led to security sprawl. From a...

Cybersecurity is a business problem, not an IT one

The threat landscape is constantly evolving, driving dramatic shifts in business environments as well as the nature of attacks that they face. The trend of distributed workforces...

Five elements that cannot be ignored in any cybersecurity strategy

By Leo Meyer, Business Development Manager In a rapidly evolving threat landscape, with determined and well-funded adversaries who are armed with sophisticated tools, there are...

Managed detection and response: stopping today’s advanced threats in their tracks

When it comes to cybersecurity, there is no silver bullet. Technology solutions on their own cannot hope to prevent every breach, and halting the most advanced and sophisticated...

Reduce cybersecurity complexity and effectively manage risks

Complexity has become an increasing problem for cybersecurity over the past few years. As adversaries have become more cunning, the threat landscape, and workforces more...

Cybersecurity—it's easier than SMBs think

By Diane Pieterse, Business Development Manager Cybersecurity threats are on the rise worldwide, with research from Check Point showing a 42% increase in weekly cyberattacks...

New end-to-end cybersecurity solution for SMB businesses

By Alan Hawkins, General Manager: Cybersecurity & Software "Tarsus Distribution has launched a portfolio of cybersecurity professional services to support resellers and system...

Why Your Cybersecurity Infrastructure Needs An Upgrade

By Johannes Groenewald, General Manager: Demand Factory As a business owner, you should be concerned with your cybersecurity as a priority to protect your precious business data...

Revolutionising the way IT security teams can tackle complex cyber-attacks

By Vanessa Lewis, Business Development Manager Today’s threat landscape is volatile and fast-growing, and an increasing number of organisations find themselves having to deal with...

MTR offers the most up-to-date threat hunting, detection, and response

Dean Steenkamp, Brand Manager: Sophos Today’s threats are becoming increasingly complex and sophisticated, and adversaries, more cunning and determined than ever. Threat actors,...

Security jargon demystified

Diane Pieterse, Business Development Manager: Check Point, Tarsus Distribution SMBs need to get the basics in place to protect their own business and others in the value chain –...

Perimeter, device and data security are crucial to business survival

By Alan Hawkins, General Manager: Cybersecurity and Software Combatting cybercrime is a constant worry for South African companies. Businesses that are breached struggle with...

SMBs need Endpoint Security Software more than ever before

As cybercriminals target endpoints in the evolving workplace, SMBs need to safeguard their people and their businesses with always-on always watching hardware-enforced protection...

Become a Trusted Security Adviser

Johannes Groenewald, GM for Demand Factory and Marketing, Tarsus Distribution Distributors, as providers of enterprise IT technologies, solutions and services need to understand...

It should be about enabling and empowering end-users

Finding a better balance between tighter security and creating better user experiences. "Hybrid work, a proliferation of ransomware variants and rampant social engineering scams...

Buckle up for more security breaches than ever before

“At a time in which African countries, and South Africa in particular, are embracing digital transformation, SMBs needs to invest extensively in improving the safety and security...

How can SMB protect themselve from the growing threat of supply chain attacks

“Supply chains are fundamental to modern businesses, from courier services to construction companies, from small accounting firms to gardening services, every business has a...

Your Enterprise Cybersecurity Solutions Guide

Tarsus Distribution works with you to help protect your business with an advanced and integrated portfolio of enterprise security products and services, infused with AI and a...

Frequently Asked Questions About Cybersecurity

The world is more connected than ever. The way we communicate has evolved from smoke signals into the click of a button. With all of this positive change comes malice. In this...

Managing cybersecurity in a hybrid environment

The hybrid work model is not compatible with traditional cybersecurity strategies. Companies that do not overhaul their approach to securing their data and systems risk exposing...

Security Technology Solutions From Tarsus Distribution

We live in a time when much of our lives, personal and professional, reside online. We do our banking, music purchases, bill paying, social planning, and even parts of our job, in...

Micro Focus media release

The last 18 months have seen an alarming uptick in network security attacks and intrusions in both the public and private sectors. These threats will continue to increase and pose...

4 practical ways to strengthen SMB cybersecurity across a hybrid workforce

Alan Hawkins, GM: Software and Security, Tarsus Distribution Resetting security for the new world of work Covered In This Article Focus on end-user education Enforce multifactor...

The Future of IT Service and Support

Let’s be honest, the way we work has changed significantly over the past two years. Though some businesses are slowly but surely headed back to the office, many have adapted to...

How Remote Connectivity Changes the Way We Work

Today, remote connectivity software is used to maintain, control, and repair devices remotely, and thousands of people around the world receive remote support every day for all...

How Secure is Remote Access Software?

Remote access software can make work outside of the conventional office space a breeze. From collaboration to IT maintenance, remote access is the answer. But just like everything...

What Is TeamViewer Tensor & How Do I Use It?

In a nutshell, TeamViewer Tensor is a cloud-based enterprise connectivity platform enabling large-scale IT management framework deployments quickly and easily. In this article, we...

Ivanti Unified Endpoint Management – Managing All Your Devices, Simplified

Unified Endpoint Management (UEM) represents the latest evolutionary stage of mobile device management, monitoring, and security. UEM emerged as a result of three main driving...

Cybersecurity In 2021 – What Every Business Needs To Know

As the way we do business becomes increasingly digital, cybersecurity remains a top concern for today’s organisations. The pandemic has made digital transformation a business...

Patch Management - Preventing Cyber-Attacks and Optimising System Performance

In a world where remote working is now the norm, businesses have become more vulnerable to cyberattacks, system failures, and a host of IT-related issues as multiple employees...

How Secure is your Device?

In previous articles, we've discussed physical network infrastructure security for business in detail, as well as securing data on online platforms such as the Cloud, Dropbox,...

Cybersecurity Trends & Threats We Think You Need To Watch Out For In 2021

As organisations take their first steps toward their “new normal”, malicious actors are ramping up their efforts. To combat today’s cybersecurity threats, both emerging and...

Eaton Cybersecurity With Doc From The Eaton Toy Force

We have to face some cybersecurity challenges in the rapidly evolving landscape of malware, phishing and hackers. In the face of these threats, traditional security approaches are...

Security With Sophos Managed Service Provider

One dashboard to rule them all! The Sophos Managed Service Provider (MSP) utilises a vast portfolio of industry-leading solutions that secure clients against modern cyber threats...

Work From Home: Cyber Security – It’s Vital To Get The Basics Right

Alan Hawkins, General Manager, software & security, Tarsus Distribution COVID-19 has reshaped our workplaces and many companies are announcing that employees won’t be coming back...

The Importance of Cybersecurity in the Digital World

In today’s digital world, cybersecurity solutions have become essential. The rise of the Internet of Things (IoT) along with constant progression in AI and other technology has...

How To Reduce Your Cybersecurity Risk With Network Cards

With cyber-attacks and cybersecurity risks continuing to be one of the biggest risks to data security, network cards offer an effective way to monitor and secure individual UPS...

How To Enhance Your Electrical Distribution System’s Performance

With the right tools, it becomes far easier to enhance your current electrical distribution system performance, allowing you to reduce downtime, increase productivity and reduce...

Mobile Security Needs To Provide Protection Against Known Attacks

Now, more than ever, businesses must enable workers to access business resources and data from their mobile devices. Even with a unified endpoint management, enterprise mobility...

Prevent Cyber Threats With Check Point

83% of IT managers say malware threats are now harder to stop compared to last year. Why? Because cybercriminals connect multiple techniques in their advanced attacks, but most...

Online Shopping & Streaming Phishing Multiplies

Kaspersky experts have reported on the rapid growth of phishing attacks with websites that imitate online shopping and streaming platforms. Comparing the numbers for Q1 2019 and...

Kaspersky Supports Healthcare with Free Product Licenses

Kaspersky announces free availability of its core endpoint security products for medical organisations, in order to help them stay protected from cyberthreats during the pandemic....

80% Of Businesses Already Use IoT Despite Security Risks

A new Kaspersky report — With superpower comes super responsibility: benefits and challenges of IoT in business — has revealed that the use of Internet of Things (IoT) business...

Questions To Ask Before Choosing Your Anti-Malware Solution

Security vendors such as Kaspersky Lab report that they process as many as 360,000 new malicious file variants a day, making it clear that everyone who uses a computer for...