Resources
Why South African Businesses are investing in Cybersecurity Companies
South African businesses have seen a massive mentality shift towards cybersecurity over the last few years. Global threats, digitalisation, metaverse era, the overall shift to remote workforces has made them more vulnerable and increased exposure to the cyber world...
Cybersecurity concerns around the Russia-Ukraine conflict
To any of those worrying about the cybersecurity situation happening over between Ukraine and Russia, Nclose’s Co-Founder & Technical Director, Martin Potgieter, weighed in his speculation and opinion of what is currently and could potentially happen. Who is...
Beware of the Social Engineer
Social engineering is a technique used by cybercriminals that focuses on psychological manipulation to gain access to critical information or obtain critical information from a user. What makes social engineering so dangerous is cybercriminals use a variety of attack...
Nclose: How we can help you avoid security debt
Regardless of your size or whether you are an organisation with a cybersecurity partner or not, having a solution that protects your organisation’s virtual assets and/or critical information is critical in today's age. With the world moving in such a digitalised...
Why Cybersecurity companies are misunderstood
So, you might be a business thinking or looking to put aside resources into partnering up with a cybersecurity service provider. You’ve done research and have an idea of the services you are looking for, what you want to protect, and how you want to protect it....
What happens when cybercriminals are successful?
Cybercriminals have more targets now that organisations have adopted a remote style of work. The unfortunate outcome is that organisations must adopt remote work in some shape or form, or risk losing significant income, time, convenience and potential competitive...
How to Mitigate the Risks of working Remotely
With every passing year the need for hardcopy paperwork and physical presence in the office environment is becoming less and less of requirement. The trajectory in which the world of work is heading is from the comfort of one’s home or from anywhere around the world...
Purple Teaming – Maximising Value From Your Pentest Engagement
The world of cybersecurity is constantly developing, with new security assessment methods cropping up all the time. As a result, some of the best methods can go by unnoticed, or can be misunderstood. The purple team is one of these. In this article, we’ll clarify what...
What are MDR services?
Managed detection and response (MDR) assumes that attacks are always in progress. A team of highly skilled investigators and their analytical tools proactively hunt for unseen threats in real time. MDR services in any organisation maximise the likelihood of exposing...
What is a real MSSP
Can the real MSSP please stand up? What does the managed cyber security services provider (MSSP) really do? Are they a reactive machine that steps in when systems alert? Or are they a proactive resource that can translate investment into value? The answer is – both....
Cyber security skills shortages
The technology sector has long been battling the skills gap, both in South Africa and abroad. Skills are rare, in high demand, and difficult to retain. According to a report by ESG entitled ‘The Life and Times of Cybersecurity Professionals 2020 around 70% of...
Five steps to a happier (and safer) internet
Fake news, hate speech, phishing, fraud and hacking – the internet isn’t safe, but it can be manageable Safer Internet Day (SID) was launched in 2004 as part of the EU SafeBorders project and has, since then, grown to become a global phenomenon designed to help people...
Nclose, Nview unveil rebrand to stay abreast of change
Nclose, a South Africa-based international cybersecurity defence, offence and protection specialist, has unveiled its new corporate identity, redesigned logos for the company and its Nview service, and new websites. These changes come at a time when the company is...
Building a proactive security posture using analytics
You can only manage what you can see. Many clients still manage their IT and cybersecurity environments without clear metrics or SLAs in place. Without data to understand and contextualise risks, trends, improvements, or issues, improving your security posture is an...
Nclose moves to secure Microsoft 365 environment in SA
Nclose managed services rolls out dedicated Microsoft 365 security capabilities Cybersecurity defence, offence and protection specialist Nclose has launched dedicated Microsoft 365 managed security service within its Managed Security Services division, to help...
Lean and focused: Nclose grows internationally off next-generation business approach
SA IT security specialist extends reach across EMEA, Indian Ocean Islands South African IT security specialists Nclose are seeing solid growth and – despite the lockdown – have just recorded their best quarter ever, thanks to the company’s unique focus on customer...
In-house SOCs hidden costs and considerations
Security Operations Centres (SOCs) have an important role to play in the large enterprise. But for mid-to-large enterprises, an in-house SOC may come with more cons than pros. “Not all organisations need to build their own SOC, and doing so could incur unexpected...