Another day in IT – another crisis … Some ransomware, data breach, insider threat or new TLA (three letter acronym) that poses a risk to your corporate information systems and assets. So the question becomes: WHO’S RESPONSIBLE? Principle 12 of the King IV report states that: “the Governing Body (of an organisation)
We are privileged to be working with T-Systems, the technology arm of Deutsche Telekom, having established a strategic alliance that will focus primarily in the African healthcare space. Our SCP solution ( www.pfortner.co.za/scp ) ensures that patient information is shared between doctors, suppliers and hospitals without compromising the privacy or integrity of the data.
If you haven’t invested in the Cybersecurity space yet – you WANNACRY After the breakout of this ransomware attack, CYBER is the flavour of the year. My mother’s neighbour is asking about malware and worms and not the usual type that affected her prize winning roses… Previously, IT Security guys were not well
We have seen a steady increase in the number of threats coming through, yet existing algorithms like BGP don’t seem to have evolved to mitigate them. In recent years we’ve seen algorithms like SSL die out for this reason. Another problem is that on the Layer 3 level, we’ve basically relied on the other layers
Reading a recent article in the Harvard Business Review about Customer Lifetime Value, got me thinking about how we currently define Customer Lifetime Value (CLV) and how a rethink of CLV is needed. Let’s start with the current definition of Customer Lifetime Value: it is the total revenue flowing from a customer over the entire
Partnering for success. Growing a business requires access to market. Market means people and to be successful it helps to meet and talk to the decision makers. For a start-up or micro enterprise this is challenging at best. But, there is a hope. Six degrees of separation is the idea that all living things and