Resources
The importance of having a cybersecurity partner to manage your Multi-Factor Authentication
The importance of having a cybersecurity partner to manage your Multi-Factor Authentication Having a cybersecurity partner to manage your multi-factor authentication (MFA) can enhance your organisation's overall security posture. Multi-factor authentication is a...
Why African businesses should invest in African cybersecurity partners
Combatting Africa's lack of digital security infrastructure requires a multi-faceted approach involving government policies, private sector initiatives, education, and international collaboration. Local cybersecurity partners can play a crucial role in helping Africa...
A potential emerging game changer: Moving Target Defence
Defining Moving Target Defence (MTD) Moving Target Defence (MTD) is a cybersecurity strategy that aims to enhance the security of systems and networks by continuously changing their attack surface and making them more challenging to target and exploit by...
The Blue Team
In cybersecurity, a "blue team" refers to professionals defending and securing an organisation's IT infrastructure and information systems. They work in opposition to the "red team," which simulates attacks and attempts to breach the organisation's security to...
Put your MDR where your cloud is: the challenges of MDR in hybrid or multi-cloud environments
Many people think hybrid and multi-cloud environments make it hard to use managed detection and response (MDR) effectively; these environments pose problems for MDR integration and limit its capabilities. Your detection tools and MDR should work well using AWS,...
The benefits of using a cybersecurity partner to conduct internal and external penetration testing
Using a cybersecurity partner to conduct internal and external penetration testing offers several benefits for organisations. Here are some of the key advantages: Expertise and Experience: Cybersecurity partners specialise in conducting penetration tests and have...
8 years, 8 Questions: Managing a Successful Managed Security Services Team
An interview with Head of Managed Security Service, Paul Grapendaal, on his experience, challenges and success of managing a Managed Security Services team for 8 years at Nclose, pooling more than 25 years of experience in cybersecurity to grow and develop a team to...
Blue Team Predictions for 2023
It's that time of the year where we see the head lines of predictions for how attacks will change and evolve in the new year. However, cyber defence is improving too, so it's only fair to make some predictions for the Blue Team and what can we potentially expect to...
Nclose How To: 5 Ways to Make Cybersecurity Awareness a Habit
Whether at work or at home, we are using our cell phones, laptops, tablets, and various other devices to get things done. This more than likely requires online interaction with other people or browsing around the web to accomplish tasks both personal and business....
Social Engineering: Protecting the Human Element of Cybersecurity
Phishing, baiting, whaling, scareware, pretexting and so on, social engineering has a plethora of attack techniques that sound a lot more complex in nature than they actually are. The method behind social engineering is to get the victim or target person/personnel to...
Nclose Women’s Month: 6 Of Our Cyber-Women Answer 6 Questions
Sam How did you find your way into the cybersecurity industry? I originally come from an advertising background and my journey into cybersecurity started with Anna Collard – who was the Head of Popcorn Training which is now KnowB4 – she took a chance and pulled me...
Nclose: How our MDR can evolve your Security Operations
Whether you have your own in-house or outsourced Security Operations Centre (SOC), having an integrated SOC within your business is the most competent and comprehensive resource to protect your business against evolving cybersecurity threats. Now more than ever,...
What to look for in a Cybersecurity Partner
According to Interpol’s African Cyberthreat Assessment Report, 90% of African businesses operate without the necessary cybersecurity protocols. The report highlighted South Africa as the highest targeted for ransomware attacks in Africa and ranked third in the world...
Nclose: What it means to be Cyber Resilient
A “buzz word” being used more often within the Cybersecurity community has been “Cyber Resiliency” - by no means is it a foreign term to the cybersecurity industry – but rather the current threat landscape making the term more relevant. So, just what does it mean to...
Cyber Diplomacy: How Africa can Leverage its Position, Age and Talent
Often when Africa is spoken about in a digital context and future, the immediate argument points towards the continent’s shortfalls. However, just because Africa lacks in certain criterion does not mean the continent cannot contribute globally to the cyber space – in...
Why South African Businesses are investing in Cybersecurity Companies
South African businesses have seen a massive mentality shift towards cybersecurity over the last few years. Global threats, digitalisation, metaverse era, the overall shift to remote workforces has made them more vulnerable and increased exposure to the cyber world...
Cybersecurity concerns around the Russia-Ukraine conflict
To any of those worrying about the cybersecurity situation happening over between Ukraine and Russia, Nclose’s Co-Founder & Technical Director, Martin Potgieter, weighed in his speculation and opinion of what is currently and could potentially happen. Who is...
Beware of the Social Engineer
Social engineering is a technique used by cybercriminals that focuses on psychological manipulation to gain access to critical information or obtain critical information from a user. What makes social engineering so dangerous is cybercriminals use a variety of attack...
Nclose: How we can help you avoid security debt
Regardless of your size or whether you are an organisation with a cybersecurity partner or not, having a solution that protects your organisation’s virtual assets and/or critical information is critical in today's age. With the world moving in such a digitalised...
The Insider Threat
A common debate in the cybersecurity stratosphere is the severity between insider and outsider threats – and which can cause more damage than the other. Cybersecurity companies are designed to prevent anything from coming in, but as time went by, the need to protect...