How to avoid being scammed this Black Friday

How to avoid being scammed this Black Friday

Black Friday 2020 could be bigger online than in-store this year, thanks to concerns about the risk of Covid-19 in crowded shops, and an increase in the number of people now comfortable with shopping online. But for first-time online shoppers and those who might...

Nclose, Nview unveil rebrand to stay abreast of change

Nclose, Nview unveil rebrand to stay abreast of change

Nclose, a South Africa-based international cybersecurity defence, offence and protection specialist, has unveiled its new corporate identity, redesigned logos for the company and its Nview service, and new websites. These changes come at a time when the company is...

Office 365 Security Controls

Office 365 Security Controls

Nclose was at the ITWeb Virtual Security Summit 2020 with Martin Potgieter and Craig Kruger. They presented a demo lab session and the topic was ‘Office 365 Security Controls’. You can get the presentation right here. #ITWebSS2020

Building a proactive security posture using analytics

Building a proactive security posture using analytics

You can only manage what you can see. Many clients still manage their IT and cybersecurity environments without clear metrics or SLAs in place. Without data to understand and contextualise risks, trends, improvements, or issues, improving your security posture is an...

Nclose moves to secure Microsoft 365 environment in SA

Nclose moves to secure Microsoft 365 environment in SA

Nclose managed services rolls out dedicated Microsoft 365 security capabilities Cybersecurity defence, offence and protection specialist Nclose has launched dedicated Microsoft 365 managed security service within its Managed Security Services division, to help...

Measuring Client Visibility

Measuring Client Visibility

We often speak about “visibility” to our MDR clients, so I thought I would write a blog post to illustrate why it is so important and what we are doing to get better at measuring it. This morning I also read Anton Chuvakin’s post about visibility, which inspired me...

How good are your SOC detection capabilities?

How good are your SOC detection capabilities?

Do you have sleepless nights wondering if your organisation’s security systems can detect the types of attacks that are prevalent today? You likely have good reason. Despite every solution IT security teams and Security Operations Centres (SOCs) implement to mitigate...

Improving the outcomes of your security assessments

Improving the outcomes of your security assessments

Regular assessments are a key method to gauge improvement and compliance By Paul Grapendaal, Head of Managed Security Services at Nclose Recently, the inspector general for NASA found that resource constraints and a lack of awareness had resulted in continued...

Navigating risk into a post-COVID new normal

Navigating risk into a post-COVID new normal

Having rushed to keep the remote lights on in the early stages of lockdown, organisations must now change their focus to mitigating a plethora of risks emerging out of the pandemic chaos.   By Paul Grapendaal, Head of Managed Services, Nclose  With little time to...

In-house SOCs hidden costs and considerations

In-house SOCs hidden costs and considerations

Security Operations Centres (SOCs) have an important role to play in the large enterprise. But for mid-to-large enterprises, an in-house SOC may come with more cons than pros. “Not all organisations need to build their own SOC, and doing so could incur unexpected...

IT security debt, it’s a deep burn

IT security debt, it’s a deep burn

The thing with fighting fires is that you often have your best people dousing the flames with their backs turned to whatever is going on behind them. If we can consider cyber threats as multiple little digital fires that flicker in and out daily, then think about the...

The DNA of cybersecurity failure

The DNA of cybersecurity failure

Cybersecurity has become one of the most important aspects determining the safety of companies, governments and individuals in the modern age. Headline-grabbing examples of major cybersecurity breaches have become increasingly commonplace, from the Sony Pictures hack...

The reinvention of the MSSP

The reinvention of the MSSP

Managed security service providers (MSSPs) are likely to be in the spotlight over the next few years as the scale and sophistication of cyberattacks increase at alarming rates. In its latest report, the SA Banking Risk Information Centre found that cybercrime costs...

Modern KPIs for effective cybersecurity

Modern KPIs for effective cybersecurity

Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks. Research by Symantec found that ransomware attacks increased by 36% in 2017 following...

Not Finding the Right Information?