top of page
Technologies Group Pty Ltd
Archive
Tags


0 min read
2019 Cyber Security: Prevent, Detect & Respond
Malware, spyware and key loggers are three ways cyber criminals use to obtain sensitive information from unsuspecting consumers.
2 min read


YOUR Solutions Architect
www.jectech.co.za Every business requires predictable and reliable support services. JEC Technologies Group can provide sustainable...
1 min read


Multi-Factor Authentification
With data breaches and security being on the forefront of your business, we at Jectech would like to enhance your security by using...
1 min read


Preparing for a Data Breach
Keeping in the view of IT Security and following our last post on “Every 40 Seconds, A Company Gets Hit By A Ransomware! Are you next?”...
1 min read


Every 40 Seconds, A Company Gets Hit By A Ransomware! Are you next?
In 2017's Biggest Cyber attack were from Wannacry to Petya and Fireball, could have all been avoided with solution that helps in managing...
2 min read


LEARN, CONNECT & BE INSPIRED BY OFFICE 365
Microsoft 365, a holistic workplace solution that empowers everyone to work together in a secure way. For Business For Enterprise For...
1 min read


JEC Technologies Pty Ltd Becomes a Microsoft Authorized Education Partner
JEC Technologies Pty Ltd earns distinction through commitment to academic customers. Simple Quantifiable Value, today JECTECH announced...
2 min read


Why FTTB is not FTTH
“The internet is no longer a ‘nice to have’, but a ‘need to have’. In a sense, it has become a utility such as electricity and water. We...
2 min read
bottom of page







