Home
About
Contact Us

Home>blog
Mon, 15 Aug 2022/

Top 5 Benefits to Managed Network Services

Every organisation has a Local Area Network (LAN). It’s how your company connects to the network – the switches in the closet, the WiFi access points on the ceilings. Most LANs are set up without much forethought for design or with a plan for ongoing upkeep, monitoring, and maintenance. Sound familiar? Without a dependable LAN, end-user productivity is at risk. Our Managed LAN Solutions will keep your team working seamlessly and securely. Here are the top 5 benefits of a high-quality Managed Network Solution: 1. Hardware Refresh and Standardisation Have dusty, old hardware sitting around? Our Managed LAN service offering includes the right-sized hardware as a service. MULTi IT will replace your current hardware, and you can cancel any existing support contracts. We bring everything under our roof with 24/7/365 monitoring and have a process in place for updating and replacing hardware using a best-practices replacement schedule. It means forever having modern hardware and never having to think about updates or replacements. 2. Network Design Specific to Your Business Network design is a specialised skill set. In the past, businesses have managed their own LAN networks. But today, networks continue to grow in complexity. Many organisations don’t have this skill set in-house, so they turn external help from network experts. Designing a LAN is vital to creating a solution both adheres to best practices and meets a business’s unique needs. Our team works closely with yours to get a clear understanding of your goals and business requirements. From there, we’ll create and document a LAN design to be implemented. We pay close attention to WiFi access points because proper placement can mean the difference between a network that works occasionally and one that works by design to enable a predictable network to support your organisation’s productivity. 3. Predictability and Reliability Nobody wants their IT to be a guessing game. Why is the WiFi being funny again? Will I be able to connect today? Do we have enough bandwidth to run the programs and apps necessary to run the business? It’s much better to have a predictable environment at your fingertips. With a reliable network, business growth happens much more smoothly. If predictability is the core of stability, then proactive maintenance is a must. Scheduled firmware updates and documented change management are absolutely crucial to avoid unexpected downtime. Implementing MULTi IT Managed LAN Solutions offering is a simple and smart way to set your network up for success today and well into the future. Our team of experts will handle the day-to-day network upkeep so you can focus on growing your business. 4. Proactive Network Maintenance and Support Even the best design is subject to change. Hardware can malfunction, cables can fail or cause errors after exposure to interference, applications or users can misbehave and use too much bandwidth, or your needs can simply adapt over time. MULTi IT & Telephony Solutions network team actively monitors hardware and key metrics that impact the end-user experience. Some problems, like a failed switch, are immediately obvious. Other issues are more subtle, like a single access point getting unplugged or a backup using all the available bandwidth. These issues can harm productivity silently. Our goal is to help your business avoid unexpected downtime. MULTi IT prioritizes proactive maintenance activities, such as scheduled firmware updates and documented change management, all to strengthen your network capabilities. 5. Streamline your IT, Increase Productivity Technology makes the modern world go round – and it’s an essential part of your business. You rely on the ability to access programs and data at a moment’s notice, and you shouldn’t have to dedicate time to long-term maintenance. You have a business to run, after all. And you shouldn’t have to think about the details of managing technology. We offer an array of expert services to help teams transform technology into an ongoing operational expense that strengthens a business from the inside out. We believe that technology should allow you to grow on your terms, not get in the way. It should make you more productive. It should connect you and your team without fail. It should be secure. Our job is to help facilitate all of those things to make your business run more smoothly. Get in touch to discuss with us Today Johannesburg – +27(0)11 435 0450, sales@multi.co.zaCape Town – +27(0)21 879 1950, sales@multi.co.zaDurban – +27(0)31 331 0735, sales@multi.co.za Namibia – +264(0)84 000 8310, sales@multi.com.na
VIEW MORE
Wed, 10 Aug 2022/

Cybersecurity Tips for Remote Workers

s a business leader, you were pushed into some difficult decisions during the pandemic. Sending workers home to work remotely seemed a little like baking a cake without baking soda. While the idea was a good one, your security approach may have been just a little flat. Cybersecurity for remote workers is a top concern for small to medium-sized businesses. Managing an organisation’s cybersecurity gets harder with each laptop, smartphone, and printer that has access to company files. In fact, employee negligence accounts for 40% of all security breaches.   The unfortunate truth is that, like most small to medium-sized businesses, you’ve had to make do as best you could and don’t have the finances and resources to tighten your cybersecurity strategies for remote workers. There are many steps you can take with your current resources, however, so take heart and read on. How Do You Keep Security When Employees Work Remotely? Many elements of keeping your network secure when working remotely are the same as working in the traditional office setting. Here are a few” 1. Cybersecurity Training The best way to keep your network safe is to train employees to spot and avoid potential threats. Cybersecurity training is flexible enough to be done online in a remote setting and is a great place to share your new remote-themed Acceptable Use Policies. 2. Multifactor Authentication Multifactor authentication combines something an employee has, like a cell phone, with something s/he knows, like a password. It’s one of the most effective cybersecurity tips for staff working remotely, and easy to implement across your workforce. 3. Identity and Access Management Identity and access management allows you to assign permissions to your employees, limiting them in what they can access based on what they need to perform their job functions. This has an additional benefit of limiting the files a bad actor could access by hacking an employee. 4. Uniform Cybersecurity Platform for Remote Workers Choose a cybersecurity strategy and make it consistent across every device your employees are using. Take advantage of  AI based platforms, and make sure they address email filtering, anti-spam applications, and malware prevention. 5. Look! Up in the Sky! It’s Super Cloud Backup! Since employees are most likely already connected via cloud, one of the most common sense cybersecurity tips for working remotely is to make sure your network has cloud backup and data recovery solutions as part of its Business Continuity Plan. If your network should suffer a data loss, a cloud-based backup strategy will help you get back to “business as usual” quickly. What Are Security Best Practices for Remote Workers? As with keeping your network secure, you will find that standard security best practices aren’t that different, no matter where your employees call “the office.” Let’s recap! 1. Don’t Let Employees Access Your Network from Personal Devices  It’s tempting for your remote teams to combine work-related software, applications, and data with their personal devices. Most personal devices do not have high-level security features living on them, so this practice is a cybersecurity vulnerability. You can secure their private devices, however, with an adjusted BYOD policy to include things such as multifactor authentication, single sign-on, and other device protections. 2.  Use Only Secure Wi-Fi Connections Remind employees that they should never access work-related applications from a public Wi-Fi connection. Remember that each unprotected connection is a cybersecurity threat. Add additional security levels like a VPN and data encryption. 3.  Log Off and Shut Down Every time your employees step away from the equipment they are using for work, make sure they log off or turn the device off. This ensures that even if the device is stolen, a bad actor can’t gain access to the network. 4. Update, Upgrade, and Patch Ensure that your employees update security patches as they become available. In addition, make sure all applications are upgraded to the newest versions, and keep an audit of equipment to track life cycles for timely replacement of devices and machines. 5. Oh, Those Pesky Passwords! Remember the rules for strong password creation and employ them for every one that has access to the network. Need help? Check out password generating sites that will have you creating complex passwords for each application. Cybersecurity Tips for Remote Workers: Measure Your Own Strategies Now MULTi IT understands that sometimes, you just want to do things on your own. Of course, we are ready to talk if you need us, but if you want to get a better understanding of how to protect your remote workforce first, contact MULTi IT & Telephony Solutions now. Get in touch to discuss with us Today Johannesburg – +27(0)11 435 0450, sales@multi.co.zaCape Town – +27(0)21 879 1950, sales@multi.co.zaDurban – +27(0)31 331 0735, sales@multi.co.za Namibia – +264(0)84 000 8310, sales@multi.com.na
VIEW MORE
Tue, 26 Jul 2022/

Data Security Threats with a Remote Workforce

Remote workers cover many job areas, from data entry to graphics designers, HR personnel, management, and nearly every job in between. Your sales force can be remote as well, with the freedom to connect with more potential customers and a wider sales field. With each remote worker, however, comes potential cyber threats that you must include in your overall comprehensive IT strategy. What are the most common data security threats with a remote workforce? Securing a remote workforce means protecting your business from these threats:  Personal Use of Company Issued Equipment  When you issue computers, laptops, cell phones, and other devices to your remote workers they may use the equipment for personal reasons. A break from work might involve a quick check of personal email, social media, or even a browsing session or online shopping. Their work-issued cell phone will be closer to them than their personal phone, and they may even text or email using this device.  Pro Tip for Data Security Threats with a Remote Workforce: Keep data safe with a remote workforce by implementing a “no play” policy on company-issued devices. Tweak your Acceptable Use Policy for your remote workforce to ensure compliance to your office rules while workers are working from home. Leaving Work Issued Equipment Unsecured  Your remote employees may not think about security. After all, they are in a “safe” space, so security isn’t at the front of their minds. They may bypass security features, leave their devices unattended in a car or coffee shop, or leave the device signed into the company network when not working.  Pro Tip for Data Security Threats with a Remote Workforce: Require frequent sign-ins, including password re-entry, whenever the device is inactive.  Using Personal Equipment for Work   Your work-issued devices may be different from what your remote workforce is used to using. It’s tempting to download work-related software, applications, and data onto personal devices. Since most personal devices do not contain the high-level security features your on-site devices do, this could lead to a data breach. Part of securing your remote workforce will be auditing devices and making sure the employee is using work-issued equipment.  For workers choosing to use their own equipment, you can adjust your BYOD policy to meet new challenges. Need help creating a new BYOD policy? Contact us today to assist with a template for your business. Pro Tip for Data Security Threats with a Remote Workforce: Discourage work use of personal devices by assigning devices closest to what the employee currently uses and making these devices user-friendly.  Using Public Wi-Fi: Big Data Security Threats with a Remote Workforce One of the perks of working remotely is the ability to take your work with you wherever you go. Most buildings have public Wi-Fi, either unsecured or offering free passwords for customers and clients to use. Your remote workforce may start their morning at a coffee shop, stop at the library for research, or stay connected while picking their kids up from school before working in an airport while waiting for their plane to take them to their hotel, where they may continue to work. Each public Wi-Fi they connect to is a potential data breach in the making. Many of these offices, shops, hotels, and restaurants do not routinely change passwords. Once a hacker has the password, he or she can continue to gather information from unsuspecting patrons for months at a time.  Pro Tip for Data Security Threats with a Remote Workforce: Securing a remote workforce includes adding additional security levels, such as encryption or a VPN. It may be helpful to offer a hotspot feature on mobile phones and devices so your employees are consistently using a safe Wi-Fi connection.  Remote Workers May Procrastinate when Installing Updates and Patches  Those warnings and alerts can become so annoying, employees may disable them altogether. There never seems to be a “right time” to stop working and let the computer patch or update security software.  Pro Tip for Data Security Threats with a Remote Workforce: Make sure warnings and alerts cannot be bypassed or disabled. Plan for these patches to automatically update after midnight when the employee is least likely to be on the device.  Data Security with a Remote Workforce Doesn’t Have to be Complicated   MULTi IT & Telephony Solutions knows a few things about remote workforces. We have several remote teams ourselves. When it comes to data security threats with a remote workforce, MULTi IT & Telephony Solutions has the answers you need.  We have the solutions to keep your data safe with a remote workforce. Let MULTi IT & Telephony Solutions help you develop strategies to protect your small to medium-sized business from potential data breaches from your valuable remote employees.  Get in touch to discuss with us Today Johannesburg – +27(0)11 435 0450, sales@multi.co.zaCape Town – +27(0)21 879 1950, sales@multi.co.zaDurban – +27(0)31 331 0735, sales@multi.co.za Namibia – +264(0)84 000 8310, sales@multi.com.na
VIEW MORE
Fri, 08 Jul 2022/

Beyond SolarWinds: 7 Next Steps for Business Cybersecurity

What is SolarWinds, and why is it making headlines? It was recently revealed that SolarWinds, a prominent software company, experienced a major cybersecurity breach that impacted multiple high-level targets like Microsoft and multiple U.S. government agencies. The decision to attack a company that, among other products, sells remote monitoring software was like setting a bomb: waiting until the right moment, the shrapnel hit many targets at once. Organisations around the world are suffering from this attack, and there’s still more compromised systems to be found. Next steps for small business cybersecurity post-SolarWinds So what can you, as a regular person with a small business, do? We’ve complied seven steps you can take to feel more secure in your organisation’s protection: No more compromising on cybersecurity Cybersecurity is no longer an accessory, upgrade, or option for organisations that are serious about growth and maintaining integrity within their industries. Your IT cannot simply be, “I’ve budgeted for a few computers this year, so security is covered.” Fixing or replacing a computer isn’t the same as proactively testing for weakness in your armour.   And antivirus isn’t the “first defence” like it was in the past — it’s the last thing you want to alert you, because antivirus alerts mean someone is already in your system. It’s the equivalent of not having locks on your door but having an intruder alert set up in your bedroom. Acknowledge that your organisation can be compromised Let’s all say it together: “my organisation can be compromised.” Breathe. There, the difficult first step is out of the way.   Now, what do we mean when we say that? It means that no matter what excuses you have in your head, there’s opportunities for hackers. You should always be prepared for the worst (while hoping for the best). You’re no SolarWinds, you’re too small to be on anyone’s radar? Different hackers hit different targets — some hacks or hackers specialize in small businesses because they’re easier to hack. You have a cybersecurity plan in place? Well, it still has opportunities for hacks.   Yes, even a good cybersecurity plan has opportunities for hackers. But the best plans include mitigating factors that can help make your plan stronger. Your strategy should be set up in layers of security. Opportunities on one layer are blocked by other layers. And if the worst does come to pass, you’re protected with a mixture of encryption and backup. Talk to an IT Services Provider and see if they can help The best team to help you sort through all the complications of cybersecurity is an IT Services Provider that has a cybersecurity focus. Not all providers are alike, so make sure you scout out a few. If you’re in the Johannesburg, Cape Town, Durban or Windhoek areas, MULTi IT & Telephony Solutions might be a good fit and we’d love to chat. If you’re not, you can ask other businessowners and see if they have recommendations. Or just open up Google and take a look at some of the local providers and their websites. Plan (and don’t dread) your cybersecurity budget IT has costs attached, and a new cybersecurity strategy may have larger up-front project costs. What many companies don’t understand is that IT is an investment — a worthwhile investment, but an investment, nonetheless. There’s value to it that you may not initially put a sticker price on, like increased productivity via a streamlined system using products like Microsoft Teams, reduced downtime with a stronger system and regular backups, the peace-of-mind knowing you’re protected from things like ransomware attacks.  One of the biggest impacts of this year in cybersecurity is that compliance and security can actually help an organisation to make money. Showing that you have firm IT policies that are enforced through a certification or documentation improves your organisation’s reputation for doing things right, and that helps you to gain more business. Having help from your Managed Services Provider will also take the pressure off your organisation to try and figure everything out. Remember that compliance, security frameworks, and protection are a team exercise. You cannot shoulder all of this yourself. It is better to have someone that can translate everything that you need so that you can properly budget for change. A Managed Services Provider (MSP) can help you navigate technology in a superior fashion. Know your industry and its IT security compliance requirements If you’re in a particular industry, you know that you might be holding very sensitive information. In some cases, you may have a legal obligation to protect this information. Your IT provider should offer compliance consulting to make sure your business is protected.   Health care organisations need to conform to HIPAA regulations. New York insurance, banking and financial services need to follow The New York Department of Financial Services (NYDFS) cybersecurity regulations. Organisations that handle or accept contracts from the Department of Defence need to deal with the new Cybersecurity Maturity Model Certification (CMMC). The consequences can be very high — in the case of CMMC, failure to meet these controls, provide a certification, or maintain the certification allow agencies within the government to immediately terminate a contract.  Make sure you stay on top of industry regulation and avoid being caught by surprise. Understand that your policy is a living document A trap we’ve seen organisations fall into is that they’ve agreed with everything else on this list, made strides to start a strong cybersecurity platform, and then… let it fall by the wayside, as time passes and other important things come down the pipeline. It’s just policy. It’s just a document in a folder somewhere. It’s outdated, anyway.  Don’t fall into this trap! If you get to this point, you’re so close. Don’t throw it all away in the final stretch. Your cybersecurity policy should be an integral part of your organisation. It shouldn’t be ignored, and it shouldn’t be bent. It should be referred to on a regular basis, and it should be reviewed and updated when needed. Know your vendors If nothing else, the SolarWinds breach exposes something we’ve known for a long time. Organisations need to maintain a list of vendors and start asking their vendor’s questions. For example: Does the vendor have compliance needs? How are they meeting those needs?Do they know what compliance your organisation needs to meet?What reports do they have available? When you call a vendor, they shouldn’t be upset that you’re performing due diligence to protect your organisation. They should be helpful in allowing you to achieve your goal for cybersecurity. Remember that just because an organisation is not required to maintain a specific level of compliance doesn’t mean that they don’t have to follow a security framework. The bottom line The SolarWinds hack is alarming, but there are still concrete options for your business to protect yourself from incidents like this. We hope this helps enlighten the steps you can take, or at least gets you to begin thinking about cybersecurity. If you’re curious to see what MULTi IT & Telephony Solutions could do for your organisation, check out our approach to IT services and cybersecurity, and feel free to contact us. Get in touch to discuss with us Today Johannesburg – +27(0)11 435 0450, sales@multi.co.zaCape Town – +27(0)21 879 1950, sales@multi.co.zaDurban – +27(0)31 331 0735, sales@multi.co.za Namibia – +264(0)84 000 8310, sales@multi.com.na
VIEW MORE
Tue, 05 Jul 2022/

The Tantrums Before Teams: How Microsoft Teams Voice is Changing the Game

Picture, if you will, a distant time in the past that has almost been forgotten. A time before Covid-19, War or socially distancing. We’re talking about the year 2017 — the year Microsoft released Microsoft Teams, its business communication platform.   And for many businesses, what was before Teams? Slack? Skype? Skype for Business? Google Hangouts? Maybe even… back-and-forth emails with the occasional phone call to spice things up? The horror. We can’t recall much of that anymore, but if we push ourselves, we can remember the tantrums we threw when things didn’t work. A Windows update broke Slack, or the latest Skype removed functions that were essential to our workflow.  These things happened with our phone systems as well — phone calls didn’t work, the system had to be rebooted or replaced. Phones broke all the time! It’s important to know that Teams has come a long way, replacing multiple functions for businesses and adding services that are efficient and promote progress. The one issue for businesses with all these different communications tools is the office phone. While we continue to be more virtual in practice and application, nothing beats having a phone to make a phone call. Wouldn’t it be nice if we were able to add that to an application we already use? This could eliminate the extra cost associated with purchasing another phone, another line, another system. Enter Microsoft Teams Voice. Teams Voice: what you get, what you’ll need, and what you might be worried about Here’s what you get:  A license add-on to Office 365 Your own phone number The ability to transfer old phone numbers into this all-in-one system If you still want a desk phone, you can still have one!  The ability to not have a desk phone at all! Answer from computer or cell phone through the Teams App Conferencing for audio  What you’ll need:  A good internet connection. This sounds silly, but at the same time, most businesses need a good internet connection in this age. We must keep in mind that most technology and communication need that connection. If you already have a voice solution, it is probably using internet anyway, but with a lot more equipment. A great Managed Services Provider. With all these systems now in one location, it’s good to have a trusted organisation that can manage this for you. No one person can understand every single facet of the offering from Microsoft without having support. Willingness to adapt. Businesses will continue to change, scaling up and down with the times. This means that technology will continue to change, and platforms like Microsoft will continue to adjust.  What you might be worried about:  Downtime. You might be worried that there will be more downtime with Teams. But there are failover options in case Office 365 goes down. The phones keep working, and your organisation can keep functioning despite the low percentage of downtime that can occur rarely through the year. Faxing. Teams Voice currently does not provide faxing services, but that’s because of the wide variety of services that do. And if you still have a hard fax line, we’d encourage you to switch to a digital faxing service. While faxing is still an important form of communication, especially in certain industries, purchasing and maintaining a line becomes time and resource consuming.  Losing your number. This is 100% not an issue. Your phone number can be ported over into this service, making for a single place to store and use these services.  In Summary Reviewing Microsoft Teams Voice with a trusted provider like MULTi IT & Telephony Solutions to see if it is right for your organisation. It’s a great start to make things more efficient, help cut unneeded costs, and develop better processes. Your organisation should always have someone that is focused on making sure you stay ahead in the changing times.  Get in touch to discuss with us Today Johannesburg – +27(0)11 435 0450, sales@multi.co.zaCape Town – +27(0)21 879 1950, sales@multi.co.zaDurban – +27(0)31 331 0735, sales@multi.co.za Namibia – +264(0)84 000 8310, sales@multi.com.na
VIEW MORE
Thu, 02 Jun 2022/

MULTi IT Upgrades our Core Systems

We at Multi IT & Telephony Solutions believe technology is key to performance. As your trusted IT partner we make sure our technology does what it should: move your business forward and offer the world's leading support and IT Services. With this MULTi is partnering with ConnectWise to offer a truly unified solution to bring value to our clients like never before. ConnectWise is the world's leading software platform for IT solution providers, and after having carefully evaluated many IT platforms we wanted to bring the best possible tools to our clients to drive their business forward through technology. With more than 35 years of experience as a managed service provider, MULTi IT & Telephony Solutions builds bespoke, tailored IT solutions for SMBs in various industries throughout Southern Africa. ChallengeSolutionResultsOperating in various locations and countries in Southern Africa, MULTi IT requires a unified solution for all departments and locations to communicate effectively and deliver unmatched services and support to our clientsMULTi IT is deploying the full suite of ConnectWise programs, including Manage, the worlds leading IT PSA tool, Automate, the worlds leading RMM tool and ITBoost, the worlds leading IT Documentation Solution. To streamline operations.After implementing ConnectWise successfully in Namibia, MULTi IT noticed a 25% increase in resolution time and a 40% decrease in problem reoccurrence. The collaborative, seamlessly synched environment has given the MULTi IT team everything we need to be more productive, more efficient, and ready to support our clients. Rapid resolution ensures customer satisfaction The ConnectWise platform is a brilliant service. It just works quietly 24/7, without aggravation, the way it should be. If there’s an infrastructure problem on Saturday evening, you don’t wait for it to have an impact on Monday morning—it gets fixed Saturday evening. ConnectWise Managed provides responsiveness for user support. If we breach our service desk SLAs, we’re in trouble. With our ConnectWise Manage platform, 85% of tickets are resolved within half an hour on first contact. ConnectWise’s ease of use and great customer experience make people more likely to report issues right away, before the problem grows, which also minimises frustration. Prompt, reliable patching for desktops and servers helps prevent many issues from arising in the first place. The AI capability of the Automate platform has been invaluable—we can take a proactive maintenance approach to fix problems that haven’t occurred yet. We have customers running years-old infrastructure with no server issues at all. With MULTi IT resources and platforms we can keep those investments viable. Cost-efficient service delivery helps clients grow With the ConnectWise platform, powering our services, MULTi IT & Telephony Solutions can focus more on our customers and helping them achieve their businesses objectives more easily. We can do more engaging with our clients and focusing on their business needs. ConnectWise has been a strong contributing factor to MULTi IT & Telephony Solutions success. MULTi IT solves uniquely African problems with ConnectWise To meet the needs of our customers, we have to manage and support a broad range of technologies and services. The ConnectWise platform gives us industry leading platforms and tools that matter to our customers. We’ve also found that we can spend less time monitoring and managing technology, and more time engaged with customers. The reliability of MULTi IT & Telephony Solutions ConnectWise-powered services helps keep client conversations productive. Instead of talking about infrastructure problems, we’re talking about how to increase your IT operational maturity and achieve digital transformation, because the service just works. Looking ahead MULTi IT & Telephony Solutions is currently working to expand its presence in security. As our key partner, the fact that ConnectWise provides a strong security offering as part of an integrated platform is quite valuable. ConnectWise Endpoint Security incorporates industry-leading capabilities at a good price point. As MULTi IT & Telephony Solutions continues to grow and evolve, its ConnectWise relationship provides a strong platform for success. “Having a really strong partner lets us focus on internal core-value services like digital transformation and the journey to cloud, so we can explore new ways to help our customers drive competitive advantage with IT and move their business forward through technology. The ConnectWise Unified Platform ConnectWise is an IT software company empowering Technology Solution Providers to achieve their vision of success in their As-a-Service business with intelligent software, expert services, an immersive IT community, and a vast ecosystem of integrations. The unmatched flexibility of the ConnectWise platform fuels long-term growth for our Partners. With an innovative, integrated, and security-centric platform, ConnectWise enables MSPs like MULTi IT & Telephony Solutions to drive business efficiency with business automation, IT documentation, and data management capabilities, and increase visibility with fully integrated remote monitoring, security, and backup disaster recovery technologies.  Want to know more? There are so many exciting features of our upgraded system that we would love to share with you. Please feel free to get in touch with us to discuss further. Johannesburg – +27(0)11 435 0450, sales@multi.co.zaCape Town – +27(0)21 879 1950, sales@multi.co.zaDurban – +27(0)31 331 0735, sales@multi.co.za Namibia – +264(0)84 000 8310, sales@multi.com.na
VIEW MORE