121 Summary Worksheet - Wild Africa Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

1. Name: Chantalle Oosthuizen 3.

Profession: Data Security


1-2-1 Worksheet
2. Company : Wild Africa Technology 4. Date: 10 July 2023

5. USP’s
Our company has been in business for 9 months focusing on cyber security & password
management. We are in proud partnership with Malwarebytes est. 2006 & Keeper Security
est. 2011. Cybersecurity is a critical aspect of protecting businesses from financial loss and
maintaining their credibility. Our team provides robust security solutions that safeguard your
business environment and prevent any potential breaches or attacks. We understand the
importance of maintaining trust with our clients and we strive to provide comprehensive
cybersecurity measures to help achieve that goal.

6. Good clients
• Small and medium-sized businesses (SMBs): SMBs often have limited resources and
may lack dedicated IT teams. They require affordable and comprehensive cybersecurity
solutions that can protect their sensitive data and critical systems.
• Enterprises: Large organizations with extensive IT infrastructure and multiple departments
often require more advanced and complex cybersecurity solutions. They may have in-house
IT teams but seek external expertise to enhance their security posture.
• Government agencies: Governments at the local, state, and national levels require robust
cybersecurity measures to safeguard sensitive information, infrastructure, and services.
Cybersecurity companies can assist in securing networks, defending against threats, and
ensuring compliance with regulations.
• Financial institutions: Banks, credit unions, and other financial organizations handle vast
amounts of sensitive customer data and monetary transactions. They require stringent
security measures to protect against financial fraud, identity theft, and other cyber threats.
• Healthcare providers: The healthcare industry deals with sensitive patient data, making it
a target for cybercriminals. Hospitals, clinics, and other medical facilities rely on
cybersecurity companies to implement safeguards and ensure compliance with data
protection regulations such as POPIA.
• Educational institutions: Schools, colleges, and universities collect and store personal
information on both students and staff. They need to protect this data from unauthorized
access, as well as defend against attacks that can disrupt systems and hinder learning
processes.
• Technology companies: Organizations in the technology sector, including software
development firms and IT service providers, require robust cybersecurity measures to
protect their intellectual property, technology infrastructure, and customer data.
• Manufacturing and industrial sectors: Critical infrastructure, such as power plants and
factories, needs cybersecurity solutions to defend against potential attacks that could
disrupt operations, compromise safety, or steal valuable intellectual property.
It's worth noting that cybersecurity is a concern for virtually all industries, as any organization that
uses technology, networks, or stores digital information can be vulnerable to cyber threats. As
such, cybersecurity companies can have a broad client base, serving businesses across various
sectors.

7. Conversation starters / triggers

We get constant phishing mails.


We do not have a reliable antivirus/ don’t even know if we have one or if we are protected against
cyber security breaches.
Employees visit malicious websites unconsciously.
We are asked to change our passwords I do not know if I have and active antivirus or one at all.
The websites/emails/notifications seemed legitimate.
8. Goals
At our company, our primary goal is to educate and support our clients in maintaining optimal
functionality within their business environment while ensuring significant protection against cyber-
attacks. We understand the stress and concerns regarding cybersecurity and aim to alleviate those
worries for our clients.
We firmly believe that cyber security is a necessity for businesses today, regardless of size or
industry. To demonstrate this, we provide affordable solutions tailored to our clients' needs. Our
services are designed to fit within their budgetary constraints while offering comprehensive
protection against potential threats.
It's important to note that we do not replace or take over the role of the current IT technician or
manager employed by our clients. Instead, we work collaboratively with their existing IT staff to
enhance the IT infrastructure and security measures. Our approach promotes synergy and
cooperation, combining our expertise in cyber security with the in-house knowledge of our clients'
IT professionals.
By adopting this collaborative approach, we ensure that our clients benefit from a strong and
cohesive cybersecurity framework without disruption to their existing IT operations. We provide the
necessary guidance, tools, and expertise to bolster their security measures, ultimately reducing the
risk of cyber-attacks and safeguarding their business operations.
Our team is committed to keeping up with the latest threats and industry trends, enabling us to
provide proactive and up-to-date cybersecurity solutions. Through ongoing education, regular
assessments, and 24/7 monitoring, we strive to address potential vulnerabilities and maintain a
secure environment for our clients.
Overall, we are dedicated to empowering our clients and helping them navigate the complex world
of cybersecurity. Our collaborative approach, affordable solutions, and commitment to education
ensure that our clients can function optimally within their business environment, without
compromising on their protection against cyber-attacks.

9. Accomplishments

First Malwarebytes Managing Service Provider in Southern Africa.

10. Strengths
• Trustworthy
• Integrity
• Innovation
• Collaboration
• Excellence
• Client-centric approach
• Privacy & confidentiality
• Highly responsive

11. Best clients


Many different types of companies work with highly sensitive information and require robust
cybersecurity measures.
• Hospitals, Logistics companies, schools, colleges, universities, lawyers/attorneys’ offices,
debt collectors’ offices, surveillance companies & real estate agents.
While the industries mentioned above are examples of those working with highly sensitive
information, it's important to note that almost any organization, regardless of the sector, may have
sensitive data that requires protection.
12. Needed in chapter
• Physiotherapist
• Electrician
• Plumber
• Wedding Planner
• Real Estate Agents
• Mechanics

13. Memory Hook


• Cyber Security Solutions
• Simplify Password Management
• Affordability
• Feeling of assurance, knowing that your business is secured.
• Be in control of your business’s cyber security.

14. Phrases to listen for

• I don’t know what cyber security is.


• We receive constant trash emails.
• They stole money from my credit card, Takealot account, etc.
• I know of someone who has been a victim of hacking.
• Purchases have been made from my bank accounts or credit cards
• My employees open everything and anything they receive.

15. Quality referrals

SME’s that think that cyber security is unaffordable or a luxury to have.

16. Not a good referral

Companies that are not loyal or truthful towards paying for services rendered.
Businesses or employees who spend time on the dark web or illegal activities.

17. Can I help?

As technology rapidly evolves, cyber criminals are also constantly finding new ways to exploit
vulnerabilities. It's crucial for businesses to stay ahead of the curve and prioritize cyber security
measures to protect themselves and their customers.
To ensure that businesses are cyber secure and up to date with the newest trends:
• Stay informed
• Conduct regular security assessments
• Implement layered defense strategy
• Foster a strategy of security awareness
• Implementing strong access controls

18. Follow up 1-2-1 Plan to take action from your 1-2-1 & set goals of contacts you will ring & help that you can give. MAKE IT HAPPEN.

You might also like