Resources
Glossary, guides, tools, and links to official frameworks to help you make informed technology decisions.
Free resources for South African businesses
Whether you are evaluating managed IT, planning a cloud migration, or preparing for compliance, having the right information at hand matters. Our resources include a glossary of common IT terms, free calculators and assessment tools, and links to authoritative frameworks and regulators so you can validate your understanding and stay aligned with best practice.
We also link to official sources – such as the Information Regulator for POPIA, ISO 27001 for information security, and the NIST Cybersecurity Framework – so you can go straight to the source when you need to.
Our resources
IT Glossary
Definitions of MSP, SOC, SLA, SIEM, EDR, POPIA, and 100+ common IT and business technology terms.
View →Free IT Tools
Calculators and assessments: downtime cost, bandwidth, MSP ROI, cloud costs, compliance readiness, IT health check, and more.
View →Blog & Guides
Practical articles on managed IT, security, cloud, compliance, AI, and technology strategy for South African businesses.
View →External resources & official frameworks
Links to regulators, standards bodies, and authoritative frameworks. These sources provide the definitive guidance for compliance, security, and governance.
Information Regulator (POPIA)
Official body for POPIA compliance, Information Officer registration, and data protection guidance in South Africa.
Visit Information Regulator (POPIA) → POPIA, data protection, complianceKing IV Report
South African corporate governance code. Covers IT governance, risk, and transparency.
Visit King IV Report → Corporate governance, IT governanceCybercrimes Act (South Africa)
South African legislation on cybercrime offences, reporting obligations, and investigation powers.
Visit Cybercrimes Act (South Africa) → Cybercrime, legislationFSCA
Financial Sector Conduct Authority. Regulates financial services providers in South Africa.
Visit FSCA → Financial services, regulationICASA
Independent Communications Authority of South Africa. Regulates telecoms, spectrum, and electronic communications.
Visit ICASA → Telecoms, spectrum, licensingSABS
South African Bureau of Standards. National standards body for certification and conformity assessment.
Visit SABS → Standards, certificationISO/IEC 27001
International standard for information security management systems (ISMS).
Visit ISO/IEC 27001 → Information security, ISMSISO/IEC 27002
Guidelines for security controls supporting ISO 27001. Practical implementation guidance.
Visit ISO/IEC 27002 → Security controls, implementationNIST Cybersecurity Framework
US framework for managing and reducing cybersecurity risk. Widely adopted globally.
Visit NIST Cybersecurity Framework → Cybersecurity, risk managementCIS Controls
Prioritised set of security controls from the Center for Internet Security. Practical, actionable safeguards.
Visit CIS Controls → Security controls, best practiceMITRE ATT&CK
Knowledge base of adversary tactics and techniques. Used for threat modelling and detection.
Visit MITRE ATT&CK → Threat intelligence, detectionOWASP
Open Web Application Security Project. OWASP Top 10, security guidance, and tools for developers.
Visit OWASP → Web security, application securityPCI Security Standards Council
PCI DSS and payment security standards. Essential for organisations handling cardholder data.
Visit PCI Security Standards Council → Payment security, PCI DSSCloud Security Alliance
Cloud security guidance, certifications, and best practices for cloud adoption.
Visit Cloud Security Alliance → Cloud securityCISA
US Cybersecurity and Infrastructure Security Agency. Advisories, guidance, and free resources.
Visit CISA → Advisories, guidanceCOBIT
IT governance framework from ISACA. Aligns IT with business objectives.
Visit COBIT → IT governanceITIL
IT Service Management framework. Best practices for delivering and supporting IT services.
Visit ITIL → IT service managementCWE
Common Weakness Enumeration. Taxonomy of software weaknesses and vulnerabilities.
Visit CWE → Software securityCVE
Common Vulnerabilities and Exposures. Catalogue of known security vulnerabilities.
Visit CVE → Vulnerabilities, patchingNeed help with your IT strategy?
Our team can help you navigate compliance, security, and technology decisions. From POPIA readiness to managed IT and cloud strategy, we work with South African businesses to deliver practical, outcome-focused solutions.
Get in touch