Articles

Eliminating the man in the middle

Eliminating the man in the middle

The time is 12:53pm. You just got to your favourite coffee place to seal the deal with an exciting prospective client. Suddenly you remember that there’s a document on your company server that you need to quickly go through before your prospective client arrives. You...

read more
Only The Agile Will Survive

Only The Agile Will Survive

A lot has been said about the importance of a business being agile. Business agility is crucial as the ability to adapt to your environment in real time may result in a competitive advantage. This is not only true in regards to a business being able to adapt the...

read more
4 Cybersecurity Lessons Learnt In 2021

4 Cybersecurity Lessons Learnt In 2021

What a year it’s been and there’s certainly a lot to learn as we complete year 2 of the dreaded “new normal”. March 2020 marked the start of a drive for enterprise reinvention which has carried on in to 2021. Prior to, some business leaders might have figured it...

read more
What is Identity and Access Management (IAM)?

What is Identity and Access Management (IAM)?

Identity and Access Management in regards to cybersecurity refers to a framework of policies, processes, and technologies that enable organisations to define and manage the roles and access privileges of users and devices. As a cyber security best practice, IAM is a...

read more
The Endpoint of the new normal

The Endpoint of the new normal

Over the last year and a half, what has been dubbed the “new normal” has slowly but surely become the “normal”. It is now common place for sensitive corporate work to be tackled in the home. Work-issued devices such as laptops, phones printers etc continue to populate...

read more
Bringing Self-Defence to Cybersecurity

Bringing Self-Defence to Cybersecurity

The day-to-day challenges faced by the modern CISO are monumental. You are charged with keeping your organisation’s most valuable assets safe from an increasingly sophisticated and growing number of threats. Remote workforces and advancing technology create more...

read more
Why sharing is caring in Cloud Security

Why sharing is caring in Cloud Security

Over the years software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) have really taken off with many organisations utilising one or all of these deployment models. Naturally, these deployment models come with their own...

read more
DataGroupIT opens new Lagos & Nairobi office

DataGroupIT opens new Lagos & Nairobi office

DataGroupIT is proud to announce we have opened two new offices across West and East Africa. Our new offices are in Lagos and Nairobi and offer our regional clients greater access to our team of cybersecurity experts who are dedicated to securing your reputation. Take...

read more
A simple guide to adopting Zero-Trust

A simple guide to adopting Zero-Trust

Implementing cybersecurity best practice in your organisation should always be viewed as a journey and not an event. The on-going process requires regular revision, adaptation, and evolution. One of the most recent steps in improving organisational security approach...

read more
The role of automation in cybersecurity

The role of automation in cybersecurity

The old proverb, Fight fire with fire, is taking on new meaning in the battle CISOs and CIOs are waging against increasingly well-resourced and dangerous cybercriminals. These cybercriminal syndicates—often linked to state actors—have been rapid adopters of emerging...

read more
The rise of ransomware in 2021

The rise of ransomware in 2021

The level of espionage, stealth and tech jargon associated with cybercrime can easily lead one to believe that “it only happens in the movies”. That couldn’t be further from the truth. In 2021 the global spotlight is firmly on cyber-criminals or more specifically,...

read more