A Warm Welcome

Hello and welcome to our blog. This is where we post our news and views, and where we share the articles we think you should be reading. Our goal is to make your life a bit easier by giving you a one-stop shop for all the news you need to read. We explore topics such as the latest Microsoft updates, ...

First Technology

First Technology in LinkedIn

New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data

A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled. [1] [1] Swati Khandelwal on Hacker News

Continue reading ›

First Technology

First Technology in LinkedIn

‘A cyber-attack could stop the country’

Superfast 5G mobile broadband could power smart cities and the internet of things, (IoT) but as more devices get connected, telecoms and security experts are warning that cyber-attacks could increase in number and severity. Our homes and cities are getting “smarter” – thermostats, video doorbells, sprinkler systems, street lights, traffic cameras, cars. all connected to the internet, collecting and transmitting useful data. [1] [1] By Matthew Wall on BBC News

Continue reading ›

First Technology

First Technology in LinkedIn

Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks

Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world. Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including medical devices such as insulin pumps and pacemakers, as well as point-of-sales and IoT devices. [1] [1] By Swati Khandelwal on The Hacker News

Continue reading ›

First Technology

First Technology in LinkedIn

The dynamic nature of trust in the digital age

Business thinker and author Rachel Botsman reveals how technology is impacting the way we trust, and the opportunities and consequences that presents. Trust: it seems a simple, universal concept. But try to define it and you quickly run into trouble. Explain to someone why you trust something and it’s difficult to get beyond ‘gut feel’ or other intangibles like ‘belief.’ [1] [1] By Maxine-Laurie Marshall on CIO

Continue reading ›

First Technology

First Technology in LinkedIn

Is your cloud provider lying to you? A guide for SMB’s.

Whatever industry you’re in, you tend to forget that what seems obvious to you is Greek to someone who isn’t in the same game.  In IT we’re probably guiltier than most, and even more so when it comes to ‘cloud computing’ as its definition differs depending on who you talk to. [1] [1] By Kevin Derman on Kaskade.Cloud

Continue reading ›

First Technology

First Technology in LinkedIn

Securities market participants face greatest financial cyber threat: BAE Systems

The securities markets — trading in stocks, bonds, equities, debt, derivatives, and the like — face the highest level of cyber threat of all financial markets, according to a new report from BAE Systems. “This is due to the large numbers of participants and infrastructures in that market, the complexities of their interactions, and inherent characteristics such as long chains of custody, unstructured communications and trusted practices — all of which combine to provide opportunities for APT [advanced persistent threat] groups…

Continue reading ›

First Technology

First Technology in LinkedIn

GreyEnergy: New malware campaign targets critical infrastructure companies

The hacking group which took down Ukrainian power grids is systematically targeting critical infrastructure in Ukraine and beyond in what security researchers believe could be cyber espionage and reconnaissance ahead of future attacks. Dubbed GreyEnergy by researchers at ESET, the group is believed to have been active over the last three years and to be linked to BlackEnergy, the attack group whose actions left 230,000 people in Ukraine without electricity in December 2015. [1] [1] By Danny Palmer on ZDNet

Continue reading ›

First Technology

First Technology in LinkedIn

SMB security pack: Policies to protect your business

Small and midsize businesses are increasingly being targeted by cybercriminals—but they often lack the resources and expertise to develop comprehensive security policies to help defend against threats. This set of policies will help your company establish guidelines and procedures to reduce the risks. [1] [1] On TechPro

Continue reading ›

Explore more content

simoneshapeshift-co-za in LinkedIn

Small and midsize businesses are increasingly being targeted by cybercriminals—but they often lack the resources and expertise to develop comprehensive security policies to help defend against threats. This set of policies will help your company establish guidelines and procedures to reduce the risks. [1] [1] On TechPro Read More

firsttechwc in Events

Thought Leadership Breakfast in partnership with Extreme Networks

On 17 March First Technology, in partnership with Extreme Networks, hosted an exclusive breakfast event at Shimmy Beach Club’s Heineken Lounge. The Impact of Wireless Technology While wireless technology has been around for a number of years, the advent of smartphones, tablets and high-speed wireless internet access has put the importance of this technology at the forefront of business growth. A ...

maryamzand in White Papers

Four Little-Known Ways WAN Optimization Can Benefit Your Organization

HIGH PERFORMANCE CONNECTIVITY PROVIDES COMPETITIVE ADVANTAGE "How WAN optimization ROI is achievable in as little as six months." Over the past nine years, WAN optimization has transformed from a point-product that solved isolated problems into a strategic cornerstone for application delivery. New acceleration capabilities boost user productivity and satisfaction while reducing time to market. WAN optimization can now ...