Blue Team Predictions for 2023

Blue Team Predictions for 2023

It's that time of the year where we see the head lines of predictions for how attacks will change and evolve in the new year. However, cyber defence is improving too, so it's only fair to make some predictions for the Blue Team and what can we potentially expect to...

Nclose: How our MDR can evolve your Security Operations

Nclose: How our MDR can evolve your Security Operations

Whether you have your own in-house or outsourced Security Operations Centre (SOC), having an integrated SOC within your business is the most competent and comprehensive resource to protect your business against evolving cybersecurity threats. Now more than ever,...

What to look for in a Cybersecurity Partner

What to look for in a Cybersecurity Partner

According to Interpol’s African Cyberthreat Assessment Report, 90% of African businesses operate without the necessary cybersecurity protocols. The report highlighted South Africa as the highest targeted for ransomware attacks in Africa and ranked third in the world...

Nclose: What it means to be Cyber Resilient

Nclose: What it means to be Cyber Resilient

A “buzz word” being used more often within the Cybersecurity community has been “Cyber Resiliency” - by no means is it a foreign term to the cybersecurity industry – but rather the current threat landscape making the term more relevant. So, just what does it mean to...

Beware of the Social Engineer

Beware of the Social Engineer

Social engineering is a technique used by cybercriminals that focuses on psychological manipulation to gain access to critical information or obtain critical information from a user. What makes social engineering so dangerous is cybercriminals use a variety of attack...

Nclose: How we can help you avoid security debt

Nclose: How we can help you avoid security debt

Regardless of your size or whether you are an organisation with a cybersecurity partner or not, having a solution that protects your organisation’s virtual assets and/or critical information is critical in today's age. With the world moving in such a digitalised...

The Insider Threat

The Insider Threat

A common debate in the cybersecurity stratosphere is the severity between insider and outsider threats – and which can cause more damage than the other. Cybersecurity companies are designed to prevent anything from coming in, but as time went by, the need to protect...

Responding to Zero-Days in 2022

Responding to Zero-Days in 2022

With the Covid-19 pandemic in 2020 forcing a lot of businesses to adopt a remote style of work – in turn opened a shopping window for cybercriminals to buy from, as they look for zero-day exploits as organizations try to protect themselves in uncharted territory....

What can Cybercriminals do with stolen information?

What can Cybercriminals do with stolen information?

Should a cybercriminal compromise, breach or hack an individual’s or businesses systems and data, there is a variety of sinister things they can do – especially if they are not making their intentions known or are hiding themselves. This is where the importance of...

Why Cybersecurity companies are misunderstood

Why Cybersecurity companies are misunderstood

So, you might be a business thinking or looking to put aside resources into partnering up with a cybersecurity service provider. You’ve done research and have an idea of the services you are looking for, what you want to protect, and how you want to protect it....

What happens when cybercriminals are successful?

What happens when cybercriminals are successful?

Cybercriminals have more targets now that organisations have adopted a remote style of work. The unfortunate outcome is that organisations must adopt remote work in some shape or form, or risk losing significant income, time, convenience and potential competitive...

How to Mitigate the Risks of working Remotely

How to Mitigate the Risks of working Remotely

With every passing year the need for hardcopy paperwork and physical presence in the office environment is becoming less and less of requirement. The trajectory in which the world of work is heading is from the comfort of one’s home or from anywhere around the world...

Not Finding the Right Information?