Kinyarwanda

Hardware and Devices

PBX Fraud

Private Branch Exchanges (PBX) are telephone systems used by small and medium businesses for internal and external communications. They are frequently targeted by criminals who exploit the technology by committing what is known...

Network & Computer Security

Before the advent of the internet, network and computer security was relatively simple as organisations needed to secure only the ‘perimeter’ to their systems. Computers were connected by networks and with the exception of...

Apple Mac Computers

Apple Macs are less vulnerable to attack by malware than Windows PCs. Many people, in fact, believe that Macs are immune to viruses and spyware, but this is definitely not the case. As the use of Macs increases for both business...

IT Support

This website is designed to help small and medium sized organisations to establish and maintain the appropriate levels of safety to safeguard IT systems, devices, business and employees against issues relating to online and...

Disposal

Your computers, tablets and smartphones are used to store and communicate data which – if in the wrong hands – could be used to compromise the safety and security of your organisation and its employees. This data could be...

Physical Security

Physical security is equally important as online security in protecting your computers, mobile devices, business and employees against crime and certain other issues. This page covers physically protecting your equipment and data...

Mobile Devices

Every organisation, however large or small, relies heavily on mobile devices – smartphones and tablets – to maintain efficient communication, both with customers and suppliers, and connection with the business itself. This...

BYOD

The practice of employees, contractors and other people working in your organisation using their own laptop computers, mobile devices and portable storage in their work is known as ‘Bring Your Own Device’ or BYoD. It is a...