+27 11 475 2407 info@aves.co.za

Strategic Partners

It’s an ecosystem

Every business is built from the ground up. With our strategic ecosystem of technology and industry partners, we can help you start cyber-proofing the one you’re building.

Good governance is key to keeping strategic customers

(Article) 4 min read.
Without the principles of good governance, all businesses are at putting their success and long-term sustainability at risk. High levels of good governance are becoming a must in a world where IT investments are supporting overall business objectives.

OT Security is key to bringing expansion plans to fruition

(Article) 4 Min
Effective control and security of operational technology (OT) and industrial control systems are inextricably linked with good corporate governance. Companies could use compliance with legislation and corporate governance requirements to overcome key growth barriers when looking to expand into new territories and to attract outside investors.

Employees’ social media profiles can put company data at risk

(Article) 6 min read.
Even for companies that have robust IT Security solutions in place, protecting networks and data is growing increasingly complex as security gaps emerge where they are least expected. With the emphasis on technology to protect data assets from threats from the outside, internal threats – such as a company’s employees – are often overlooked.

The search is on for specialised, industry-specific cyber solutions

(Article) 3-min read.
Industries have different risk profiles and are vulnerable to different types of cyber threats. Smart cyber risk management need specialised cyber solutions.

Top six cyber security trends to watch in 2020

(Article) 4-min read.
The cyber security threat landscape is always shifting, making it easy for businesses to become vulnerable to emerging threats. Here are our top six trends business executives should look out for in 2020.

Time to add a cyber incident response plan to your business plan

(Article) 4-min read.
Upfront cyber incident response plans play a critical role in an organisation’s ability to contain and recover from security breaches.

MSIL/Samas.A Threat Notice

SAMSAM (Version 4), also known as MSIL/Samas.A, is a ransomware strain that shares analyses of vulnerabilities on the dark web that cyber actors then use to deploy the ransomware on a network.

Worldwide ransomware attack infects users in over 100 countries

#Ransomware featured in the top news this weekend when the exploit-encryptor-worm WannaCrypt (nicknamed #WannaCry) spread across the world by piggy-backing off the Windows exploit #EternalBlue. Researchers in our security network reported that around 100,000 users saw their computers encrypted in a matter of minutes over the last 72 hours.

The CIO/IT Manager 101 Enablement Workshop

22-24 October 2019, Johannesburg
*Seats are limited*


Use the tabs below to filter partners within each business practice.

Pin It on Pinterest