Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      South Africa's stablecoin silence is becoming a policy failure

      South Africa’s stablecoin silence is becoming a policy failure

      6 February 2026
      Makro bets on refurbished tech as consumers hunt value

      Makro bets on refurbished tech as consumers hunt value

      6 February 2026
      Bitcoin faces another reckoning

      Bitcoin faces another reckoning

      6 February 2026
      MTN Group in talks to buy out IHS Towers

      MTN Group in talks to buy out IHS Towers

      5 February 2026
      Taxi industry bets on digital payments to modernise operations

      Taxi industry bets on digital payments to modernise operations

      5 February 2026
    • World
      AI won't replace software, says Nvidia CEO amid market rout - Jensen Huang

      AI won’t replace software, says Nvidia CEO amid market rout

      4 February 2026
      Apple acquires audio AI start-up Q.ai

      Apple acquires audio AI start-up Q.ai

      30 January 2026
      SpaceX IPO may be largest in history

      SpaceX IPO may be largest in history

      28 January 2026
      Nvidia throws AI at the weather

      Nvidia throws AI at weather forecasting

      27 January 2026
      Debate erupts over value of in-flight Wi-Fi

      Debate erupts over value of in-flight Wi-Fi

      26 January 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
      Watts & Wheels S1E3: 'BYD's Corolla Cross challenger'

      Watts & Wheels: S1E1 – ‘William, Prince of Wheels’

      8 January 2026
    • Opinion
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Simple safeguards to stay secure in today’s world

    Simple safeguards to stay secure in today’s world

    By Altron Document Solutions4 December 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Every day we hear about another hack or security attack. Sadly, identity theft and data breaches are not just things that happen to other people or other businesses. Altron Document Solutions gets you up to speed on the risks and the easy, simple steps you can take to safeguard yourself and your business.

    Are you as secure as you think?

    When was the last time you changed your computer/device passwords? Do you have a different password for each? And what about your printer – is it secure? It may be hard to believe this, but less than 2% of printers in use today are intrusion-proof. Most people do not change the default password at installation, giving hackers easy access to embedded system data, network information, and even the ability to download files to the printer.

    The key is to think of all of your devices at home and at work as minicomputers:

    • Change the default password immediately upon printer installation and use complex, lengthy passwords;
    • Ensure your printer has the latest security features such as offered by Xerox ConnectKey technology;
    • Make passwords different for every device you use including each app or website login; and
    • Don’t forget to update your passwords regularly.

    Looking for a secure printer? You’re going to want to check out the Xerox VersaLink C405 colour multifunction printer.

    Take your security with you

    Think about all the information available on your phone — contacts, texts, e-mails, stored logins for social media, banking details and more. In addition to strong passwords, you can guard against data invasion by:

    • Turning off sharing: Turn off Wi-Fi, Bluetooth and GPS when not in use to limit your “detectability” by hackers. And be careful when connecting to public networks.
    • Keeping your software updated: Update your desktop and mobile antivirus software regularly and check in with your company about your work phone’s mobile device management software. Be extra careful whenever downloading software from the Web – especially on any work devices.
    • Saving data securely: Save and back up data to the cloud or a secure server, never your device.

    Add more peace of mind with these protective steps for your computer:

    • Ensure hard drives are secure: Make sure any information that is on a hard drive is encrypted. This not only guards against attacks but can be helpful for recovery if you need it.
    • Protect against spam and viruses: Make sure you — and your employees — know how to detect and deal with suspicious e-mails, so you avoid viruses.
    • Purge old files regularly: Archives are important, but avoid the urge to be an electronic packrat. Know what to delete and when — and do it regularly.
    • Consider your trash: Leverage trade-in programmes for proper disposal of obsolete technology (such as computers, printers and hard drives) to ensure these items do not get harvested for sensitive information.

    Does your printer security walk the talk?

    There’s a lot of talk in office technology circles about who provides the most secure products. Proof of superior security is in the Xerox platform.

    Xerox makes security a top priority because we know it needs to be for you and your business. Every Xerox ConnectKey technology-enabled device such as the VersaLink C405 colour all-in-one printer is armed with a comprehensive four-point approach to printer security to prevent intrusion.

    McAfee Embedded Security powered by Intel Security lets you connect safely with your ConnectKey printers and multifunction printers so you can protect them the way you shield your PCs from viruses and malware.

    Treat your printed documents sensitively

    Because your printer is on your network, it can be an entry point for people looking to steal your information. Follow the above steps to secure your network, but go one step further and protect your printer, too:

    • Abandoned documents: Don’t leave documents sitting in the printer input or output trays – use secure print technology that safely stores the document at the device until you are there to release the job and collect it. And if you do print sensitive material, don’t throw it in the trash, send it to the shredder ASAP.
    • App availability: Control which apps can be accessed from your multifunction printer with Xerox ConnectKey technology that lets you whitelist trusted apps.
    • Data on printer hard drives: Your printer has a hard drive, too. Make sure it is encrypted and your printer scrubs data after printing documents.
    • Scanned data: Scanned data can live on your network. Leverage technology that automatically deletes this information after a scanned document is e-mailed, stored or printed.
    • Printer and document access: Many printers today are embedded with technology that allows you to control who has what type of access. This not only secures sensitive data but can save you money by reducing wasteful printing.

    About Altron Document Solutions
    Altron Document Solutions (ADS) is Africa’s leading document management technology and services company and the largest Xerox distributor in the world. It is the authorised Xerox distributor in 26 sub-Saharan African countries offering the complete range of Xerox document equipment, software solutions and services. ADS forms part of JSE-listed Allied Electronics Corporation (Altron).

    • This promoted content was paid for by the party concerned


    ADS Altron Altron Document Solutions Altron DS
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticlePieter de Villiers on building Clickatell into a $1-billion tech giant
    Next Article Major cybersecurity threats to watch out for in 2021: ESET

    Related Posts

    Businesses boost efficiency as Altron helps teams embed Copilot into daily operations - Altron Digital Business

    Businesses boost efficiency as Altron helps teams embed Copilot into daily operations

    27 November 2025
    Watch | The Altron, UKG blueprint for smarter workforce management

    Watch | The Altron, UKG blueprint for smarter workforce management

    21 November 2025
    The quiet power behind modern work: how Copilot transforms every role, every day - Altron Digital Business

    The quiet power behind modern work: how Copilot transforms every role, every day

    20 November 2025
    Company News
    Vox Kiwi Wireless: fibre-like broadband for South African homes

    Vox Kiwi Wireless: fibre-like broadband for South African homes

    5 February 2026
    NEC XON achieves an African first with full Fortinet accreditation - Ian Kruger

    NEC XON achieves an African first with full Fortinet accreditation

    5 February 2026
    Clickatell: Agentic AI turns automation into consequence

    Clickatell: Agentic AI turns automation into consequence

    5 February 2026
    Opinion
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026
    Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

    Why Elon Musk’s Starlink is a ‘hard no’ for me

    26 January 2026
    South Africa's new fibre broadband battle - Duncan McLeod

    South Africa’s new fibre broadband battle

    20 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    South Africa's stablecoin silence is becoming a policy failure

    South Africa’s stablecoin silence is becoming a policy failure

    6 February 2026
    Makro bets on refurbished tech as consumers hunt value

    Makro bets on refurbished tech as consumers hunt value

    6 February 2026
    Bitcoin faces another reckoning

    Bitcoin faces another reckoning

    6 February 2026
    MTN Group in talks to buy out IHS Towers

    MTN Group in talks to buy out IHS Towers

    5 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}