Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Amazon set to take another shot at the smartphone market - Jeff Bezos

      Amazon set to take another shot at the smartphone market

      22 March 2026
      MTN and Vodacom dwarf South Africa's listed tech sector

      MTN and Vodacom dwarf South Africa’s listed tech sector

      20 March 2026
      SA firm opens Africa's largest space hardware factory

      SA firm opens Africa’s largest space hardware factory

      20 March 2026
      OpenClaw fever grips China

      OpenClaw fever grips China

      20 March 2026
      OpenAI plans desktop 'super app'

      OpenAI plans desktop ‘super app’

      20 March 2026
    • World
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
      Nvidia targets $1-trillion in AI chip sales as inference demand surges - Jensen Huang

      Nvidia targets $1-trillion in AI chip sales as inference demand surges

      17 March 2026
      Peter Thiel's secretive Rome conference draws Church attention

      Peter Thiel’s secretive Rome conference draws Church attention

      16 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Simple safeguards to stay secure in today’s world

    Simple safeguards to stay secure in today’s world

    By Altron Document Solutions4 December 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Every day we hear about another hack or security attack. Sadly, identity theft and data breaches are not just things that happen to other people or other businesses. Altron Document Solutions gets you up to speed on the risks and the easy, simple steps you can take to safeguard yourself and your business.

    Are you as secure as you think?

    When was the last time you changed your computer/device passwords? Do you have a different password for each? And what about your printer – is it secure? It may be hard to believe this, but less than 2% of printers in use today are intrusion-proof. Most people do not change the default password at installation, giving hackers easy access to embedded system data, network information, and even the ability to download files to the printer.

    The key is to think of all of your devices at home and at work as minicomputers:

    • Change the default password immediately upon printer installation and use complex, lengthy passwords;
    • Ensure your printer has the latest security features such as offered by Xerox ConnectKey technology;
    • Make passwords different for every device you use including each app or website login; and
    • Don’t forget to update your passwords regularly.

    Looking for a secure printer? You’re going to want to check out the Xerox VersaLink C405 colour multifunction printer.

    Take your security with you

    Think about all the information available on your phone — contacts, texts, e-mails, stored logins for social media, banking details and more. In addition to strong passwords, you can guard against data invasion by:

    • Turning off sharing: Turn off Wi-Fi, Bluetooth and GPS when not in use to limit your “detectability” by hackers. And be careful when connecting to public networks.
    • Keeping your software updated: Update your desktop and mobile antivirus software regularly and check in with your company about your work phone’s mobile device management software. Be extra careful whenever downloading software from the Web – especially on any work devices.
    • Saving data securely: Save and back up data to the cloud or a secure server, never your device.

    Add more peace of mind with these protective steps for your computer:

    • Ensure hard drives are secure: Make sure any information that is on a hard drive is encrypted. This not only guards against attacks but can be helpful for recovery if you need it.
    • Protect against spam and viruses: Make sure you — and your employees — know how to detect and deal with suspicious e-mails, so you avoid viruses.
    • Purge old files regularly: Archives are important, but avoid the urge to be an electronic packrat. Know what to delete and when — and do it regularly.
    • Consider your trash: Leverage trade-in programmes for proper disposal of obsolete technology (such as computers, printers and hard drives) to ensure these items do not get harvested for sensitive information.

    Does your printer security walk the talk?

    There’s a lot of talk in office technology circles about who provides the most secure products. Proof of superior security is in the Xerox platform.

    Xerox makes security a top priority because we know it needs to be for you and your business. Every Xerox ConnectKey technology-enabled device such as the VersaLink C405 colour all-in-one printer is armed with a comprehensive four-point approach to printer security to prevent intrusion.

    McAfee Embedded Security powered by Intel Security lets you connect safely with your ConnectKey printers and multifunction printers so you can protect them the way you shield your PCs from viruses and malware.

    Treat your printed documents sensitively

    Because your printer is on your network, it can be an entry point for people looking to steal your information. Follow the above steps to secure your network, but go one step further and protect your printer, too:

    • Abandoned documents: Don’t leave documents sitting in the printer input or output trays – use secure print technology that safely stores the document at the device until you are there to release the job and collect it. And if you do print sensitive material, don’t throw it in the trash, send it to the shredder ASAP.
    • App availability: Control which apps can be accessed from your multifunction printer with Xerox ConnectKey technology that lets you whitelist trusted apps.
    • Data on printer hard drives: Your printer has a hard drive, too. Make sure it is encrypted and your printer scrubs data after printing documents.
    • Scanned data: Scanned data can live on your network. Leverage technology that automatically deletes this information after a scanned document is e-mailed, stored or printed.
    • Printer and document access: Many printers today are embedded with technology that allows you to control who has what type of access. This not only secures sensitive data but can save you money by reducing wasteful printing.

    About Altron Document Solutions
    Altron Document Solutions (ADS) is Africa’s leading document management technology and services company and the largest Xerox distributor in the world. It is the authorised Xerox distributor in 26 sub-Saharan African countries offering the complete range of Xerox document equipment, software solutions and services. ADS forms part of JSE-listed Allied Electronics Corporation (Altron).

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    ADS Altron Altron Document Solutions Altron DS
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticlePieter de Villiers on building Clickatell into a $1-billion tech giant
    Next Article Major cybersecurity threats to watch out for in 2021: ESET

    Related Posts

    MTN and Vodacom dwarf South Africa's listed tech sector

    MTN and Vodacom dwarf South Africa’s listed tech sector

    20 March 2026
    Households still under big pressure, Altron Fintech index shows

    Households still under big pressure, Altron Fintech index shows

    13 March 2026
    The data sovereignty paradox - Altron Digital Business

    The data sovereignty paradox

    27 February 2026
    Company News

    How South African executives can crack the AI ROI code

    20 March 2026
    Africa's first Nvidia RTX Pro GPU servers have landed

    Africa’s first Nvidia RTX Pro GPU servers have landed

    19 March 2026
    How Acer Africa is bridging the digital divide through local innovation

    How Acer Africa is bridging the digital divide through local innovation

    19 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Amazon set to take another shot at the smartphone market - Jeff Bezos

    Amazon set to take another shot at the smartphone market

    22 March 2026
    MTN and Vodacom dwarf South Africa's listed tech sector

    MTN and Vodacom dwarf South Africa’s listed tech sector

    20 March 2026
    SA firm opens Africa's largest space hardware factory

    SA firm opens Africa’s largest space hardware factory

    20 March 2026
    OpenClaw fever grips China

    OpenClaw fever grips China

    20 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}