Pages
- About Us
- Anti-Virus
- Archiving and Versioning
- AV/Patch & Monitoring
- Azure Sentinel
- Backup Documents
- Backup for Office 365
- Backup Services
- Bare Metal Recovery
- Blog
- Clients
- Co-managed IT
- Contact Us
- Cookie policy
- Dark Web Monitoring
- Dark Web Monitoring
- Disaster Recovery
- Disclaimer
- Email Archiving
- Email Security
- Fast Backup, Rapid Restore
- Firewall Features
- Free POPIA Assessment
- Hardware as a Service (Haas)
- Home
- Hosting Services
- Managed Backup Services
- Managed Firewall Service
- Managed Server
- Meet The Team
- Microsoft 365 Business
- Microsoft Office 365
- Office 365 Security
- Outsourced IT
- Password Management
- Pay Now
- POPIA Jumpstart
- Privacy Policy
- Remote Network Monitoring
- Remote Support
- Remote Support & IT Monitoring Service
- Resources
- Security-Focused Storage
- Server Backup
- Site Map
- Support Options
- T3 Service
- Techtron Security Service
- Terms & Conditions
- Thank You
- Threat Dashboard
- Tutorials
- Work with Us
- Workstation Backup
Posts by category
- Category: Azure
- Category: Cybersecurity
- Category: MS Teams
- Category: News\Blog
- Subscribe Now
- 6 Reasons to Use Remote Monitoring to Keep an Eye on Your Systems
- Data Backup Essentials – What Every Company Must Know
- 4 Common IT Mistakes That Small Companies Make
- Ransomware Information and Protection
- Zimbra Connector For Outlook (ZCO): Setting Up Out Of Office Assistant
- Can VoIP Save Your Company Money?
- 6 IT Policies to Help Protect Your Company
- Service Agreements or Ad Hoc?
- 6 Ways to Keep Your WordPress Site Secure
- 5 Ways to Secure Your Company’s Wireless Router
- The Latest Office 365 Editions: What Business Owners Need to Know
- How to Keep Your Company’s Network Secure
- How to Choose the Right IT Support Partner for Your Business
- 4 Reasons to Use a Cloud-based Data Backup Solution
- Sample Internet & Email Usage Policy
- 3G Failover now available
- Protection of Personal Information Act
- Can You Rely on Microsoft Security Essentials to Protect Your Computer?
- I need help configuring my router
- My ADSL Line is not working
- How to setup ActiveSync on an Android Device
- Countdown to End-of-Support for Windows XP begins
- Afrihost ADSL Network Upgrades
- HP Partner Program 2013
- Another Happy Client 🙂
- No Standards in IT
- Seven benefits of virtual desktop infrastructure
- Improvements to our Client Access Portal
- Client Satisfaction
- Raid Considerations for Exchange 2010
- Experienced Support Engineer Required
- Creating Strong Passwords
- Techtron Becomes Dell Registered Partner
- Techtron Becomes MSPAlliance Member
- Remote Backup Server Upgrade
- Competitive Benchmarks – NSS Labs
- IT Advise to our clients is FREE- don’t be afraid to ask for it!
- Bringing In The Decade
- Techtron Cape Argus Cycle Tour Team Fund Raising Initiative
- Techtron Achieves Gold Partner Status with Secure Data – Feb 2009
- Techtron Now offers Managed Firewall to all clients – Oct 2008
- Techtron Now offers Remote Backup to all clients – May 2008
- Techtron Now offers Remote Support to all clients – 10 Oct 2007
- Techtron & FoneIT Merger – 1 Sept 2007
- Remote IT Support Tipping Point
- Trend Micro wins Best Secure Virtualisation Solution
- Cloud Email Powered By Zimbra
- Technology explained: Capped vs Uncapped
- Domains vs Workgroups
- Category: Office 365
- How To Setup Out Of Office In Outlook
- SharePoint vs. File Server/Share
- How to setup Multi-Factor Authentication (MFA)
- How to Use the Outlook Report Message add-in
- Recommended SharePoint Naming Conventions
- Check for unsupported characters by Sharepoint/OneDrive and fix
- Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers
- Outlook for Windows client to store email signature in the cloud
- Modernizing SharePoint Managed Metadata Services (MMS)
- Microsoft Teams is it secure?
- Every Possible Reason to Migrate to Windows Server 2019, in a Nut-Shell
- New Feature: Enhanced scheduling experience in Teams
- Essential Settings for EOP and Office 365 ATP security
- The Latest Office 365 Editions: What Business Owners Need to Know
- What are the Differences Between Azure Active Directory and Azure Active Directory Domain Services?
- Category: Productivity
- Category: security
- Security Solution Overview
- Construction giant gains competitive edge with zero-trust approach to security
- Free CYBERSECURITY Handbook
- Free Cyber Security Training
- 6 Ways to Keep Your WordPress Site Secure
- Biggest Monitoring Mistake Companies Make
- Cybercriminals Actively Targeting Work-From-Home Employees By All Possible Means
- New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks
- Top 10 ways to secure Office 365 and Microsoft 365 Business plans
- Security Best Practices While Working From Home
- 5 Common Phishing Techniques
- Zoom security bug lets attackers steal Windows passwords
- South Africa’s new data privacy laws – Update
- Massive increase in South African network attacks
- Windows 7 Has Reached its EOL – But it Hasn’t Been Laid to Rest… Yet
- Here’s Why You Need a Scary Good Archiving System in Place
- “123456” Once Again Claims Top Spot For Worst Password of The Year
- Cyber Security – How Safe is Your Business?
- Demonstrating Compliance with Data Security Regulations Can Be Easy if You’re Prepared
- Do You Know Who Has Access to Your Systems?
- Stay Ahead of Hackers by Changing Your Passwords
- Strong Security Starts with Strong Passwords
- Data Backup Essentials – What Every Company Must Know
- Unsecured Adobe Server Exposes Data for 7.5 Million Creative Cloud Users
- Multiple Security Flaws Found In Cisco Aironet Access Point Software
- ‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’
- New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild
- Multiple Gaming And Photo Apps On Play Store Found to be Infected With Android Malware
- Why Techtron Recomends Microsoft Security
- D-Link router models affected by remote code execution issue that will not be fixed
- VPN users: If you’re on Fortinet, Palo Alto, Pulse Secure, patch now, warns spy agency
- Windows 7 end of Life
- Critical Vulnerability in Windows OS – using Remote Desktop
- Category: Uncategorized
- How To Enable TLS 1.3 on Microsoft Edge Internet Explorer
- How to Set Up Out of Office Replies in the Microsoft Outlook Web Version
- Kennametal embraces Microsoft cloud strategy to drive business innovation
- Azure Sentinel – What is it and why should I care?
- Skype for Business Online is retiring
- We Just Survived The Craziest Tech-Ade of Our Time
- Sample Internet & Email Usage Policy
- Three Microsoft products you can use offline
- What you need to know about workplace chat apps
- Cybersecurity in South Africa
- Cloud Computing for the Win
- Protecting Your Privacy on Social Media Networks
- 5 Things to Look for When Choosing a New IT Service Provider
- The Top 5 Benefits of Remote Network Monitoring
- Why Your Business Needs IT Support
- Self-Service Automated Password Reset Solution
- Password security is your security
- Onsite backup or offsite backup?
- New year, new computer care
- 3 tips to keeping your PC safe
- Hello world!
- The importance of clearing your cache and cookies
- Should you outsource your small business IT services?
- How to create the perfect password
- Warning Signs That Your Computer Is Infected by Malware
- How to Safely Dispose of Old Computers
- 4 Cloud Security Mistakes for Your Business to Avoid
- 4 Cloud Security Mistakes for Your Business to Avoid
- Does limiting employee internet access work?
- Data loss could kill your business
- 5 Simple steps to spring clean your machine
- Techtron services are now available in Gauteng
- Workplace privacy
- Five frequently asked IT support questions
- Why POPI and GDPR are so important
- How IoT devices increase your risk and how to mitigate it
- 7 IT Security Risks in Small Businesses
- How to See Who’s Connected to Your Wi-Fi Network
- Blog post: 7 Reasons Why it is Crucial to Back Up Your Data
- How To Manage Email Messages in Microsoft Outlook Using Rules
- BYOD: The good, the bad and the uncertain
- 5 of the most common IT problems in SME’s
- How To Stop Spam Emails
- How To Choose a Web Host
- Which server does your business need?
- How to troubleshoot your printer
- How to boot into safe mode?
- IT support and how it benefits your business
- Google’s Cloud IoT Core is now available
- Firewall Management Practices: Top Practices
- Firewalls and the era of sophisticated attacks
- Security measures to protect your servers
- South Africa is a hot spot for cyber attacks
- What You Need To Know About Managed Servers
- Intel Computers security flaw places all phones and computers at risk
- Is your personal information safe?
- The PoPI Act and what it means for you
- IoT Technology breaks ground to save the Rhino
- Social media life after death
- A Look Back on Cybersecurity in 2017
- Huawei Routers Exploited to Create New Botnet
- What Is the difference between a Managed Application Server and Managed File Server?
- Firewalls – Are they still important in 2018
- The Benefits of Managed Servers to Mid-Sized Businesses
- What Are Managed Servers and Why Should You Care?
- How to choose the Best Server for a small or mid-size business
- The 5 Major Benefits of Using Offsite Backup
- Celebrating Women in IT
- 30 Million South Africans at risk due to Data Leak
- South Africa’s top tech innovators
- Why tech-support is important
- Protecting against Wi-fi Cracks!
- “KRACKS” in the Wi-fi!
- Adaptive Security Architecture
- 4 Emerging Security Technologies
- PnP Bitcoin Trial
- Edge Computing – The Imminent Computing Future
- Techtron helps improve effectiveness and efficiencies for on-the-go employees with Mobile Device Management
- ICT develops young minds
- Backup and Sync App
- Fast-Moving Cyberattacks
- 4 ways to protect your business from data loss
- Cryptocurrency: what you need to know
- South Africa and Disruptive Tech
- ICT is Key to SA Growth and Development
- Techtron earns distinction through demonstrated technology success and customer commitment
- 4 Common IT Mistakes That Small Companies Make
- Avoid becoming a victim: How not to get hacked!
- Fake Dropbox Email Phishing Scam Alert – May 2017
- Ransomware Attack – Windows Patch (WannaCry)
- Should you upgrade to Windows 10
- My ADSL Line is not working
- Client Satisfaction
- Improvements to our Client Access Portal
- Seven benefits of virtual desktop infrastructure
- No Standards in IT
- No overseas access to Afrihost Control Panel
- Android — How to Setup Exchange ActiveSync
- Iphone — Setup Exchange Active Sync Email Account
- Windows 10 — File Explorer Opens and Closes Immediately due to Quick Access
- Raid Considerations for Exchange 2010
- Creating Strong Passwords
- Techtron Becomes Dell Registered Partner
- Techtron Becomes MSPAlliance Member
- IT Advise to our clients is FREE- don’t be afraid to ask for it!
- Techtron Achieves Gold Partner Status with Secure Data – Feb 2009
- Techtron Now offers Managed Firewall to all clients – Oct 2008
- Techtron Now offers Remote Backup to all clients – May 2008
- Techtron Now offers Remote Support to all clients – 10 Oct 2007
- Techtron & FoneIT Merger – 1 Sept 2007
- Remote IT Support Tipping Point
- Cloud Email Powered By Zimbra
- Technology explained: Capped vs Uncapped
- Domains vs Workgroups
- How to use the Out of Office Assistant in Outlook
- Category: Windows