You can log a ticket for assistance here.
Latest News & Blog
WE’RE HIRING
AnonIT is lookig for a Junior IT Technician & Administrator to join the team. Location/Pretoria. We’re looking for an individual with an...
RSAWEB – RANSOMWARE ATTACK!
RSAWeb Network Down Due to Ransomware Attack RSAWeb, a South African IT service provider, suffered a ransomware attack on February 1, 2023,...
What is Two-Factor Authentication?
Two-Factor Authentication: An Extra Layer of Security for Your Social Accounts In today's digital age, social media has become an integral part of...
Impressive Ticket Resolution ’22
Impressive Ticket Resolution and Dedicated Customer ServiceAnonIT Solutions has had an incredible year in 2022, with a total of 4551 tickets...
Cyber Security & AnonIT
Cybercrime is a constant threat that businesses have to be aware of and take steps to protect themselves from. One of the most prevalent forms of...
You’ve Gone Phishing?!
Phishing isn't going away, it's evolving. And the User?With our current attention span -9 seconds - and email overload, not every employee could...
You Can’t Go Back! #TBYC
Once You Click, You Can't Go Back... Remember: Think Before You Click. #TBYC[dsm_icon_divider use_icon="on" font_icon="||fa||400"...
Phishing Attacks Up 61% !!
[EYE OPENER] Phishing attacks increased by 61% compared to 2021. So far, 255 million attacks this year!!Security Magazine wrote this week about...
What Protects You from Phishing Attacks?
We often say "Think before you click" - and that's great advice! However, people always click before they think. Why? This is because it is not just...
CISA – CYBERSECURITY AWARENESS MONTH
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) kicked off Cybersecurity Awareness Month a few days ago, following a...
What is Phishing?
Phishing is an attempt to obtain sensitive information such as usernames, passwords, credit card details, etc. by impersonating a trusted entity...
Phishing and Malicious Emails
...Are Still the Primary Initial Attack Vector According to new data from Acronis, as cybercriminals continue to develop their techniques, they...
Darkverse emerging from Metaverse
ARN just reported. However, security he provider Trend Micro warned in a recent research report that cybercriminals could abuse the technology for...
2022 Microsoft Vulnerabilities Report
Now in its ninth year, the Microsoft Vulnerabilities Report provides a unique analysis of the vulnerability landscape in the Microsoft ecosystem. ...
Cyber Security – General Overview
Although cyber attacks are rapidly growing in volume and sophistication, the fact of the matter is that organizations are still struggling to fight...
A Decade of Technology – 2015
Continuing our 10 year anniversary celebrations, this month we take a look at 2015. It’s been a great year for tech and the gadget obsessed amongst...
You and the Cybercrimes Act
The Cybercrimes Act The Cybercrimes Act was signed into law in South Africa on the 26th May 2021 and comes into effect the beginning of July...
A Decade of Technology – 2014
Continuing our 10 year anniversary celebrations, this month we take a look at 2014. The biggest story for 2014, was the stepping down of Bill Gates...
A Decade of Technology – 2013
Continuing our 10 year anniversary celebrations, this month we take a look at 2013. The year when Hotmail was not so hot anymore. In February,...
A Decade of Technology – 2012
Continuing our 10 year anniversary celebrations, this month we take a look at 2012. One of the most note-worthy events of 2012 happened on 15 August...