• Bicycles Secure Your Bicycle
  • Home Protection Protect Your Home
  • Secure Your Business Secure Your Business
  • Secure Your Bicycle

    The DataDot Bicycle Theft Deterrent and Recovery System is an EASY TO USE pen application which allows the fitment of over 2000 microdots to your bicycle to ensure that its identity is protected. It is available for the recommended retail price of R250.00 excluding delivery and fitment per kit.

    Buy Now

  • Protect Your Home

    Home burglary can be expensive, inconvenient and even frightening. That's why it's essential to take appropriate measures to protect your valuable belongings. DataDot Theft Deterrent and Recovery Solution is a popular choice for those who wish to protect household items such as cell phones, tablets, TVs, computers and cameras. Technologically advanced, easy to apply and cost effective, DataDot is the number one option for your theft prevention needs.

    Buy Now

  • Secure Your Business

    Commercial crime costs South Africa millions each year and it's not about to stop! All businesses are affected by theft with more often than not disasterous consequences. In addition a struggling economy increases the temptation to steal. Despite efforts to secure assets the number of incidents are increasing and often take a long time to be discovered.

    Buy Now

10 Cyber Security Tips from DataDotSA

10 Reliable Cyber Security Tips for Businesses and Employees

NEVER UNDERESTIMATE the Threat of Cybercrime.

Johan Gericke – our DataDotSA IT Manager - looks at 10 cyber security tips to help keep your business safe.  The growing ability of cyber criminals to customize, hide and disguise make it very hard to spot and to distinguish between legitimate and dishonest activities. Computer and Internet Security has now become the responsibility of all of us. The tips below will help to keep yourself, your colleagues and your business safe.

  1. DON’T BE TRICKED INTO GIVING AWAY CONFIDENTIAL INFORMATION
    Do not respond to e-mails or phone calls requesting confidential company information — including employee information and financial results.
    Beware of unauthorized persons calling you and pretending to be an employee or one of your business partners.
    Double check who you are talking to and report any suspicious activity to your IT Department. Protect your personal information just as closely.
  2. DON’T USE AN UNPROTECTED COMPUTER
    When dealing with sensitive information make sure you access it from a secure computer. Working at Internet cafés or on shared machines at home put the information you are viewing at risk.
    Confirm with your IT Department that your computer has the latest approved security patches, antivirus and firewall applications. You should also work in user mode, not administrator mode, whenever possible.
    Keep your personal computer safe with a Virus Removal Tool.
  3. DON’T LEAVE SENSITIVE INFORMATION LYING AROUND THE OFFICE
    Do not leave printouts containing private information on your desk. Lock them in a drawer or shred them. Sensitive documents on your desk can be read by visitors.
    Keep your desk tidy and documents locked away. It makes the office look more organized, and reduces the risk of information leaks.
  4. LOCK YOUR COMPUTER AND MOBILE PHONE WHEN NOT IN USE
    Make sure your computer and mobile phone are locked or shutdown when you are not using them. Important documents must stay safe and secure whilst being worked on. Locked phones and computers keep your data safe from prying eyes.
  5. STAY ALERT AND REPORT SUSPICIOUS ACTIVITY
    Always report any suspicious activity to your IT team. As an employee part of your job is to stop cyber-attacks and to make sure your data is not lost or stolen.
    The success of a business depends on keeping information safe. In the case of something going wrong, the faster your IT Department knows about it, the faster they can deal with it.
  6. PASSWORD-PROTECT SENSITIVE FILES AND DEVICES
    Always password-protect sensitive files on your computer or smartphone.
    Lost items such as phones, USB flash drives and laptops are regular occurrences. Protection of devices with the use of strong passwords means you make it very difficult for someone to break in and steal data.
  7. ALWAYS USE HARD-TO-GUESS PASSWORDS
    Passwords, like “mycomputer” or “dog” are obvious as are character sequences on the keyboard, like “asdfg” and “12345.” It is far more beneficial to use complex passwords that include upper and lower case, numbers, and punctuation.
    Try to use different passwords for different websites and computers. Should one account get hacked, your others are not compromised.
  8. BE CAUTIOUS OF SUSPICIOUS EMAILS AND LINKS
    DO NOT BE CURIOUS! Always delete suspicious emails and links. By opening or viewing these emails and links the security of your computer can be compromised and unwanted problems are created without your knowledge.
    Remember, if something looks too good to be true, it probably is.
  9. DO NOT PLUG IN PERSONAL DEVICES WITHOUT THE OK FROM YOUR IT DEPARTMENT
    Personal devices include USB flash drives, MP3 players and smartphones. These devices may have code on them waiting to launch as soon as you plug them into a computer.
    Talk to your IT Department about your devices and let them make the decision.
  10. DON’T INSTALL UNAUTHORIZED PROGRAMS ON YOUR WORK COMPUTER
    Malicious applications can be mistaken for legitimate ones such as games, tools or even antivirus software. Their aim is to fool you into infecting your computer or network.
    If you like an application and think it will be useful, contact IT to look into it for you before installing.

 

Computers are going to be around for years to come, and that means that the threats are here to stay too.

 

Did you know.........
Microdots can be applied to any item of value to uniquely identify an asset?

Apart from providing currently over 3.9 million vehicles with their own DNA - microdots, or as we like to call them DataDots, can be applied to any asset of value. This means that if the valuable item or asset is stolen and recovered it can be linked back to the owner provided the owner has registered on our DataDot app.


Executive Committee

Craig Wahl

Craig Wahl

Craig is an admitted attorney with experience in Business and Labour Law. After being admitted he worked as a Legal Advisor for SEESA, a business consultancy in East London and George. He joined DataDot Technology SA in 2013 and currently is the CEO of the company.
Derek Menday

Derek Menday

Derek was General Manager of Sales at Cargo Benoni prior to joining AVIS as National Sales Director in 1989. He joined DataDot Technology SA in 2003 and is currently an Executive Director, Executive Committee Member and a Shareholder of the company.
Chad Thomson

Chad Thomson

Chad started his career within the Commercial Security Sector. A change into commerce in 2000 saw him as Managing Director to African Independent Insurance Brokers after which he joined DataDot and currently holds the position of General Manager National Operations.
Chris Naude

Chris Naude

Chris is a Qualified Chartered Accountant. Prior to joining Datadot in 2016 he worked at Questus Chartered Accountants and Profert and Vrystaat Mielies in Potchefstroom. He currently holds the position of General Manager - Business Analysis and is the Company Secretary.