Your Trusted Partner In Cyber Security
Protect your business with enterprise-grade cybersecurity designed for small to medium-sized businesses in South Africa. Cyber Guard offers fully managed security services backed by Trend Micro’s industry-leading Worry-Free platform, delivering 24/7 protection across your endpoints, email, and cloud services.
Cyber Guard Managed Security Platform
Endpoint Security
Advanced protection for laptops, desktops, and mobile devices against malware, ransomware, and unauthorised access.
Email Security
Block phishing, spam, and business email compromise attacks on Microsoft 365 and Gmail.
XDR (Extended Detection & Response)
Correlate threats across endpoints and email with automated detection and guided response.
Co-Managed Protection
Work with a certified Trend Micro partner for shared visibility, faster response, and expert support.
Incident Response & Recovery
Our team of experts is on call to respond rapidly to cyber threats. We identify, contain, and eradicate attacks—then restore operations and harden systems to prevent recurrence.
Centralised Monitoring & Management
Simplify oversight across multiple devices and users through a unified management dashboard.
Automated Threat Remediation
Quickly isolate, rollback, and recover from incidents before they cause harm.
Security Reporting & Compliance
Stay audit-ready with regular security posture reports tailored to local regulations like POPIA.
Why Cyber Guard?
-
Month-to-month plans
Cyber Guard offers month-to-month security plans starting at just R99/user, giving your business powerful protection without long-term contracts
-
Financial warranty for breach-related losses
Enjoy peace of mind with our financial warranty for breach-related losses
-
Co-managed or Fully Managed Options
Choose between Co-Managed or Fully Managed options—whether you want to work alongside our experts or let us handle everything for you.

Incident Response & Recovery
Cyber Guard provides rapid, expert-led response in the event of a cyberattack. We cover the costs of engaging cybersecurity professionals to investigate, contain, and remediate the incident—ensuring your systems are restored and business operations resume quickly. If necessary, we also assist with legal consultation and customer notification in line with regulatory requirements.
Example:
Your business experiences a ransomware attack that disrupts operations. Cyber Guard deploys certified incident response experts to contain the threat, identify the source of the breach, and recover your critical systems and data. We guide you through communication, compliance, and recovery steps—minimizing financial and reputational damage.

Theft Of Funds
Protect Your Finances with Full Reimbursement for Stolen Funds and Legal Expenses.
Example:
You receive an email that appears to be from
a legitimate source, but it is actually a spoofed
email created by an attacker. You provide
your username and password as requested,
and the attacker uses this information to gain
unauthorised access to your bank account or
mobile wallet, resulting in the theft of funds.

Identity Theft
We cover the costs associated with identity theft, including lost income due to time taken off work to resolve the incident, and reasonable expenses such as reapplying for loans or credit lines, notarizing affidavits, making phone calls, and reissuing compromised identity documents. You’ll also receive up to six months of credit and identity theft monitoring to help safeguard your financial wellbeing.
Example:
Your personal email is hacked, or a company that stores your personal information experiences a data breach. As a result, your identity is stolen and used to open fraudulent accounts, apply for loans, make online transactions, or commit tax or medical aid fraud.

Data Restoration & Malware Recovery
Your policy covers the cost of hiring an IT expert to restore your data and software. If necessary, it also includes the replacement of damaged computer components.
Example:
While browsing the internet, your personal device becomes infected with malware that encrypts your files, photos, and software. Alternatively, using an infected USB stick or external hard drive could introduce malware that damages your system. As a result, you may need to reformat your hard drive, reinstall your operating system, and recover your data from a backup.

Cyberbullying & Cyberstalking Protection
Your policy covers the cost of removing harmful online content, recovering lost income, and pursuing legal action against the offender. It also includes support for managing and repairing your reputation, trauma counselling, and, if necessary, relocation expenses to transfer your child to another school.
Example:
Your child is subjected to bullying on social media and begins to experience emotional distress. Alternatively, you may receive threatening messages or have sensitive information about you posted online, resulting in emotional trauma or even job loss, as confirmed by a licensed psychologist.

Cyber Extortion Coverage
Your policy covers the cost of an IT expert to assess the legitimacy of a ransom demand and, where possible, assist in restoring your systems and data. If necessary, it also includes payment of the ransom and any other reasonable expenses incurred to resolve the incident.
Example:
You click on a link in an email or open a suspicious attachment, unknowingly installing ransomware on your device. Your files are encrypted, and you receive a ransom demand to restore access. In another scenario, you may be threatened with the public release of private photos or messages unless a ransom is paid.
Network Security Liability
Your policy covers the cost of hiring an IT expert to investigate how a security incident occurred. It also includes coverage for any legal expenses and settlement amounts that may arise as a result of the incident.
Example:
Your device is compromised by malware, which then spreads to another person’s system, causing damage to their data or devices. As a result, they take legal action against you to recover the damages they’ve suffered

Privacy & Data Liability
Cyber Guard covers the cost to investigate the breach and determine how the incident occurred. It also includes coverage for any legal expenses and settlement amounts resulting from claims made against you.
Example:
Your personal device or email account is hacked, and sensitive data belonging to other individuals is stolen. That information is then used fraudulently, leading to those individuals taking legal action against you for the damages they’ve incurred.

Third-Party Data Breach Liability
Cyber Guard will cover your legal costs if you need to take action against a company that failed to protect your personal information, leading to its theft or misuse.
Example:
A business or service provider that stores your personal data suffers a cyberattack. As a result, your information is stolen and used to commit identity theft, causing financial or reputational harm. You take legal steps to seek compensation from the responsible party.
Read Our Blogs
View all-
When Every Second Counts – Cyber Guard’s Incide...
Because how you respond to a cyberattack matters more than ever. In today’s digital world, cyberattacks are no longer isolated events — they’re daily threats targeting businesses, professionals, and families...
When Every Second Counts – Cyber Guard’s Incide...
Because how you respond to a cyberattack matters more than ever. In today’s digital world, cyberattacks are no longer isolated events — they’re daily threats targeting businesses, professionals, and families...
-
Recovering from Identity Theft
How Cyber Guard Helps You Reclaim Your Identity and Your Peace of Mind Identity theft is one of the fastest-growing cybercrimes worldwide — and South Africa is no exception. Every...
Recovering from Identity Theft
How Cyber Guard Helps You Reclaim Your Identity and Your Peace of Mind Identity theft is one of the fastest-growing cybercrimes worldwide — and South Africa is no exception. Every...
-
Protecting Your Money – Theft of Funds
How Cyber Guard Shields You from Online Financial Loss In today's hyper-connected world, cybercriminals no longer need to break into vaults to steal your money — they only need to...
Protecting Your Money – Theft of Funds
How Cyber Guard Shields You from Online Financial Loss In today's hyper-connected world, cybercriminals no longer need to break into vaults to steal your money — they only need to...