Our blog

Gist is looking for new IT Technician to add to their Technical department

Requirements: Recognized IT qualification Valid Driver’s Licence 3-5 years’ experience Immediately available or soonest Strong Communication skills Action / result orientation Customer orientation and focus Able to work under stress and pressure  Duties: Strong Knowledge of Computers, have a broad understanding of hardware and software ...

Business opportunities of the expanding digital universe

Like the physical universe, the digital universe is large – by 2020 containing nearly as many digital bits as there are stars in the universe. It is doubling in size every two years, and by 2020 the digital universe – the data we create and copy annually – will reach 44 zettabytes (44 trillion gigabytes). In this video Vernon Turner explains how all of this data can help make your organization more competitive! ...

Tired of wasting valuable time on IT?

These 4 issues unnecessarily use up valuable time of your employees that could be used more productively. Gain insight into how outsourcing your IT department at Gist could prevent these sinkholes in the future.      Manual Chores Installations, updates, patches... Are you implementing technology, or fiddling with it? In a survey of workers at more than 3,700 companies, resp ...

Phishing: A Common Form of Identity Theft in Businesses

Identity theft is a fast-growing criminal activity involving unauthorised use of personal details of individuals, usually for financial gain. A recent study showed that: 76% of South Africans believe that identity theft is more likely than ever before; 2 in 3 (67%) feel it is more difficult to control their personal information as a result of smartphones and the Internet; South Africans are engaged with the topic of security (78% acknowle ...

Why consider outsourcing your IT department?

Today most businesses recognize how crucial it is to leverage information technologies, no matter what industry you're in. The pace of technological innovation makes it hard to effectively run your own IT systems. New systems and software have to work properly with the old. And just when you get things right, the technologies you’re using start becoming obsolete. In other words, keeping up with the pace of technological innovation and managing your ...

The business advantages of cloud computing.

There is more to cloud computing than just getting your compute resources, storage capacity or application as a service within minutes. The true power of cloud is what the technology – implementing rapidly deployed services in the cloud – can mean for your business. According to South African research firm World Wide Worx, there was a 10% jump in SMEs in South Africa using cloud technology between 2014 and 2015 – bringing the tally to 39%. &nb ...

Cloud Computing: The Hidden Environmental Benefits

The IT ecosystem represents around 10% of the world’s electricity consumption. Cloud computing has enormous potential to positively impact the world of IT—not only businesses’ performance but also their carbon emissions. If 80% of world enterprise adopted cloud computing and powered down local servers we would see around a 4.5 megaton reduction in greenhouse gas emissions (a 2% decrease). Seems little, but this equates to 1.7 million ...

TIPS on what to do with your e-waste!

What is e-waste? Electronic waste, or e-waste, is a term for electronic products that have become unwanted, non-working or obsolete, or have reached the end of their useful life. Because technology advances at such a high rate, many electronic devices are being replaced after a few short years of use. E-waste makes up 5 – 8 percent of municipal solid waste in South Africa and is growing at a rate three times faster than any other form of waste. Only b ...

Top 6 ways to protect from ransomware!

What makes ransomware so effective? One reason—fear. Within the first five months of 2016 alone, 50 new ransomware families have already been seen, which is more than the numbers seen in 2014 and 2015 combined. Understanding the most common ways it attacks gives you the prioritized steps you can take to provide the best protection. Read our blog on the most common causes of ransomware. There is n ...

2 alarming ransomware trends

Ransomware attacks are not only proliferating, they’re becoming more sophisticated. Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals. See here how these e-mails may look like! In newly identified instances of ransomware, some cyber criminals aren’t using e-mails at all. ...