<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[NEC AFRICA - Blogs]]></title><link><![CDATA[https://www.nec.africa/blogs]]></link><description><![CDATA[Blogs]]></description><pubDate>Wed, 08 Apr 2026 04:27:26 +0200</pubDate><generator>Weebly</generator><item><title><![CDATA[How NEC XON is powering the future of Cybersecurity]]></title><link><![CDATA[https://www.nec.africa/blogs/how-nec-xon-is-powering-the-future-of-cybersecurity]]></link><comments><![CDATA[https://www.nec.africa/blogs/how-nec-xon-is-powering-the-future-of-cybersecurity#comments]]></comments><pubDate>Mon, 03 Nov 2025 22:00:00 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/how-nec-xon-is-powering-the-future-of-cybersecurity</guid><description><![CDATA[       Every digital interaction carries inherent risk. That means cybersecurity can no longer be seen as a shield - it must be the foundation of digital trust.The threat landscape has evolved beyond the occasional breach or isolated ransomware attack. Today&rsquo;s adversaries are adaptive, persistent, and often invisible until the damage is done. The response from industry leaders like NEC XON has been to shift from reaction to anticipation - from defense to design.      Absorb, adapt and reco [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/option-3_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><font size="3">Every digital interaction carries inherent risk. That means cybersecurity can no longer be seen as a shield - it must be the foundation of digital trust.</font><br /><font size="3">The threat landscape has evolved beyond the occasional breach or isolated ransomware attack. Today&rsquo;s adversaries are adaptive, persistent, and often invisible until the damage is done. The response from industry leaders like NEC XON has been to shift from reaction to anticipation - from defense to design.</font></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><font size="4"><strong style="">Absorb, adapt and recover</strong><br />&ldquo;Resilience isn&rsquo;t a feature. It&rsquo;s a mindset - and at NEC XON, it&rsquo;s the standard by which we measure security maturity,&rdquo; says Armand Kruger, Head of Cybersecurity at NEC XON.</font><br /><span></span><font size="4"><span>That shift in mindset is reshaping how organisations think about protection. Cyber resilience - the ability </span><span>to absorb, adapt, and recover from an attack while maintaining operational integrity - is now the benchmark of business continuity. Automation, zero-trust principles, and predictive analytics are no longer luxuries; they&rsquo;re the pillars of modern digital su</span><span>rvival.</span></font><br /><span></span><font size="4"><br /><span><strong>It's not the tools. it's the architecture</strong><br />But Kruger argues that real strength lies not in the tools, but in the architecture. &ldquo;No single solution can protect an enterprise. True resilience comes from intelligent integration - the ability to see, a</span><span>nticipate, and respond across every layer of the digital fabric.&rdquo;</span></font><br /><span></span><font size="4"><span>This architectural approach - blending analytics, automation, and foresight - transforms cybersecurity from a reactive function into a strategic enabler. When resilience is built into system</span><span>s from the start, disruption becomes less of a threat and more of a stress test for innovation.</span></font><br /><span></span><font size="4">Ultimately, the future of cybersecurity isn&rsquo;t defined by how well organisations defend, but by how confidently they advance. In a connected world where attackers never rest, resilience is more than a survival strategy - it&rsquo;s an act of digital courage.</font><br /><span></span></div>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Is Broken: NEC XON Is Rewriting the Rules]]></title><link><![CDATA[https://www.nec.africa/blogs/cybersecurity-is-broken-nec-xon-is-rewriting-the-rules]]></link><comments><![CDATA[https://www.nec.africa/blogs/cybersecurity-is-broken-nec-xon-is-rewriting-the-rules#comments]]></comments><pubDate>Sun, 19 Oct 2025 22:00:00 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/cybersecurity-is-broken-nec-xon-is-rewriting-the-rules</guid><description><![CDATA[       By Michael de Neuilly Rice, Cybersecurity Architect at NEC XON  &#8203;Picture this: a GenAI-powered insurance system quietly miscalculates thousands of policies after its training data was poisoned. No alarms go off. No one notices - until claims are denied, customers revolt, and regulators move in.&nbsp;That&rsquo;s the kind of threat we&rsquo;re facing. The real risk with AI isn&rsquo;t what the AI does - it&rsquo;s what&rsquo;s been done to the AI.      From Reaction to AnticipationFo [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/michael-de-neuilly-rice_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>By Michael de Neuilly Rice, Cybersecurity Architect at NEC XON</strong></div>  <div class="paragraph">&#8203;Picture this: a GenAI-powered insurance system quietly miscalculates thousands of policies after its training data was poisoned. No alarms go off. No one notices - until claims are denied, customers revolt, and regulators move in.<br />&nbsp;<br />That&rsquo;s the kind of threat we&rsquo;re facing. The real risk with AI isn&rsquo;t what the AI does - it&rsquo;s what&rsquo;s been done to the AI.<br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong>From Reaction to Anticipation</strong><br />For too long, cybersecurity has been reactive - waiting for alerts, responding to breaches, patching after the fact. But the threat landscape has evolved beyond that model. Today&rsquo;s attackers aren&rsquo;t just exploiting software vulnerabilities; they&rsquo;re shaping data, manipulating algorithms, and undermining the very logic that powers modern enterprises.<br />&nbsp;<br />I believe resilience starts before the breach. True cybersecurity isn&rsquo;t about responding faster - it&rsquo;s about preparing smarter. It&rsquo;s about anticipating how systems might fail before they do, designing for continuity, and investing in defences that are evidence-based, measurable, and continuously validated.<br />&nbsp;<br /><strong>Factual Cyber Investment: Building Security That Proves Itself</strong><br />Boards are tired of &ldquo;trust us&rdquo; cybersecurity. They want proof. That&rsquo;s why NEC XON is focusing on factual cyber investment - measurable, data-driven resilience strategies that demonstrate clear returns in risk reduction, system uptime, and incident avoidance.<br />&nbsp;<br />We believe in a combination of advanced AI threat modelling, continuous verification of system integrity, and adaptive resilience testing to help organisations predict, not just detect emerging risks. This proactive stance transforms cybersecurity from a cost centre into a strategic enabler of business continuity and trust.<br />&nbsp;<br /><strong>Anticipating Tomorrow&rsquo;s Threats</strong><br />The AI era introduces unseen vulnerabilities - from poisoned training data to compromised models. But the solution isn&rsquo;t only to secure the &ldquo;AI supply chain.&rdquo; It&rsquo;s to build anticipatory resilience into every layer of digital infrastructure, so that even when attacks evolve, organisations can adapt, recover, and continue operating with confidence.<br />&nbsp;<br />That&rsquo;s the real cybersecurity future: one where cyber resilience is proactive, predictive, and provable. Staying not just secure, but ready. Because in the next chapter of cybersecurity, survival won&rsquo;t come from reacting to what&rsquo;s already happened. It will come from anticipating what&rsquo;s coming next.<br />&nbsp;<br /><strong>About NEC XON</strong><br />NEC XON is a leading African integrator of ICT solutions and part of NEC, a Japanese global company. NEC XON has operated in Africa since 1963 and delivers communications, energy<em>,</em> safety, security, and digital solutions. It co-creates social value through innovation to help overcome serious societal challenges. The organisation operates in 54 African countries and has a footprint in 16 of them. Regional headquarters are located in South, East, and West Africa. NEC XON is a level 1-certified broad-based black economic empowerment (B-BBEE) business. Discover more at <a href="https://www.nec.africa">https://www.nec.africa</a><br />&nbsp;<br /><strong>Issued by:</strong> Michelle Oelschig, Scarlet Letter<br /><strong>Contact details:</strong> 083-636-1766, michelle@scarletletter.co.za<br /></div>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Is Not a Product Stack – It’s a Platform Strategy]]></title><link><![CDATA[https://www.nec.africa/blogs/cybersecurity-is-not-a-product-stack-its-a-platform-strategy]]></link><comments><![CDATA[https://www.nec.africa/blogs/cybersecurity-is-not-a-product-stack-its-a-platform-strategy#comments]]></comments><pubDate>Tue, 14 Oct 2025 07:00:31 GMT</pubDate><category><![CDATA[Cyber Security]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/cybersecurity-is-not-a-product-stack-its-a-platform-strategy</guid><description><![CDATA[       By Philip Wege, Network Security Lead Engineer at NEC XON  Complexity is the adversary of cybersecurity resilience. Too many organisations still try to secure their environments with a patchwork of point solutions, hoping that post-deployment integration will bring coherence. In reality, this approach creates silos, increases operational friction, and leaves exploitable IT blind spots. From a systems engineering standpoint, it&rsquo;s the equivalent of assembling critical infrastructure f [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/philip-wege-2_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong><font size="3">By Philip Wege, Network Security Lead Engineer at NEC XON</font></strong></div>  <div class="paragraph">Complexity is the adversary of cybersecurity resilience. Too many organisations still try to secure their environments with a patchwork of point solutions, hoping that post-deployment integration will bring coherence. In reality, this approach creates silos, increases operational friction, and leaves exploitable IT blind spots. From a systems engineering standpoint, it&rsquo;s the equivalent of assembling critical infrastructure from mismatched components without a unifying architecture - inefficiency, inconsistency, and failure are inevitable outcomes.</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">&#8203;<strong>The Business Cost of Fragmentation</strong><br />The economic consequences aren&rsquo;t theoretical. Global cybercrime has been projected to cost&nbsp;<a href="https://www.sec.gov/Archives/edgar/data/736012/000168316820004004/intrusion_ex9901.htm">$10.5 trillion by this year</a>, growing at 15% annually. The average data breach cost reached&nbsp;<a href="https://wp.table.media/wp-content/uploads/2024/07/30132828/Cost-of-a-Data-Breach-Report-2024.pdf">$4.88 million in 2024</a>, an increase of 10% year on year. On average, it takes&nbsp;<a href="https://www.morganlewis.com/blogs/sourcingatmorganlewis/2024/03/study-finds-average-cost-of-data-breaches-continued-to-rise-in-2023?utm_source=chatgpt.com">204 days to detect a breach and 73 days to contain it</a>, while&nbsp;<a href="https://www.verizon.com/business/resources/Ta5a/reports/2023-dbir-public-sector-snapshot.pdf">74% of breaches involve human error&nbsp;</a>- a stark reminder that tool sprawl does little to address the underlying challenge.For business leaders, these figures aren&rsquo;t just operationally inconvenient. They&rsquo;re a direct threat to shareholder value, regulatory compliance, and brand trust. A fragmented cybersecurity environment is not just inefficient - it&rsquo;s strategically dangerous.<br /><br /><strong>Why Engineering Principles Demand Convergence</strong><br />Security should not be treated like a collage. It should be a single, carefully engineered platform that delivers resilience from the ground up. From an engineering perspective, this requires:<ul><li><strong>Native integration:</strong>&nbsp;Components designed to interoperate without fragile connectors.</li><li><strong>Shared intelligence:</strong>&nbsp;Real-time threat data distributed across the entire ecosystem.</li><li><strong>Unified policy enforcement:</strong>&nbsp;Consistent controls spanning network, cloud, and endpoint environments.</li></ul>This approach mirrors well-architected enterprise systems - fewer moving parts, higher reliability, and faster average time to response.<br /><br /><strong>Platforms as Force Multipliers</strong><br />Leading cybersecurity vendors such as Palo Alto Networks are already proving the power of platform thinking. Their solutions go beyond collections of best-of-breed tools; they form cohesive ecosystems where infrastructure, workloads, and users are protected in unison. The benefits are measurable: improved visibility through a single pane of glass, accelerated detection and remediation through automation, and a reduced attack surface thanks to unified controls.For CFOs, this means lower total cost of ownership. For CIOs, it simplifies operations. And for CISOs, it provides the foundation for resilience at scale.<br /><br /><strong>The Strategic Question</strong><br />As technology leaders, we must ask ourselves: are we engineering a security architecture - or just collecting disconnected tools? Shifting the conversation from products to platforms isn&rsquo;t just a word game. It&rsquo;s a strategic move where integration moves from feature status to foundational status in enterprise security.<br /><br /><strong>About NEC XON</strong><br />NEC XON is a leading African integrator of ICT solutions and part of NEC, a Japanese global company. NEC XON has operated in Africa since 1963 and delivers communications, energy<em>,</em>&nbsp;safety, security, and digital solutions. It co-creates social value through innovation to help overcome serious societal challenges. The organisation operates in 54 African countries and has a footprint in 16 of them. Regional headquarters are located in South, East, and West Africa. NEC XON is a level 1-certified broad-based black economic empowerment (B-BBEE) business. Discover more at<a href="http://www.nec.xon.co.za/">www.nec.xon.co.za</a>.<br />&nbsp;<br /><strong>Issued by:</strong>&nbsp;Michelle Oelschig, Scarlet Letter&nbsp;<br />Contact details: 083-636-1766, michelle@scarletletter.co.za</div>]]></content:encoded></item><item><title><![CDATA[Securing the Telecom Frontier: How Fortinet SecOps Builds Resilience Across the Stack]]></title><link><![CDATA[https://www.nec.africa/blogs/securing-the-telecom-frontier-how-fortinet-secops-builds-resilience-across-the-stack]]></link><comments><![CDATA[https://www.nec.africa/blogs/securing-the-telecom-frontier-how-fortinet-secops-builds-resilience-across-the-stack#comments]]></comments><pubDate>Tue, 19 Aug 2025 08:34:22 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/securing-the-telecom-frontier-how-fortinet-secops-builds-resilience-across-the-stack</guid><description><![CDATA[       By Andre Lombaard, Network and Security Architect at NEC XON  Telecoms Under FireTelecom networks are no longer just critical infrastructure &mdash; they&rsquo;ve become strategic targets for cybercriminals. From sophisticated nation-state actors to profit-driven cybercriminals, the telecom sector is facing unprecedented security pressure.      Recent breaches underscore the severity of the threat. The&nbsp;SK Telecom compromise&nbsp;exposed internal segmentation weaknesses. Advanced pers [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/andrelombaardsm-3_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)"><font size="3">By Andre Lombaard, Network and Security Architect at NEC XON</font></span></div>  <div class="paragraph"><font size="4"><span style="font-weight: 700;">Telecoms Under Fire</span><br />Telecom networks are no longer just critical infrastructure &mdash; they&rsquo;ve become strategic targets for cybercriminals. From sophisticated nation-state actors to profit-driven cybercriminals, the telecom sector is facing unprecedented security pressure.</font></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><font size="3"><span style="color:rgb(129, 129, 129)">Recent breaches underscore the severity of the threat. The&nbsp;</span><a href="https://www.bleepingcomputer.com/news/security/sk-telecom-says-malware-breach-lasted-3-years-impacted-27-million-numbers/">SK Telecom compromise&nbsp;</a><span style="color:rgb(129, 129, 129)">exposed internal segmentation weaknesses. Advanced persistent threat group&nbsp;</span><a href="https://cloud.google.com/blog/topics/threat-intelligence/apt41-dual-espionage-and-cyber-crime-operation/">APT41&nbsp;</a><span style="color:rgb(129, 129, 129)">(also known as Wicked Panda) continues to infiltrate Asian telcos to harvest credentials and exfiltrate sensitive data. In South Korea, coordinated cyber campaigns have revealed the risks tied to cloud migration, legacy systems, and endpoint vulnerabilities.</span><br /><br /><span style="color:rgb(129, 129, 129)">In this high-stakes landscape, securing both the enterprise IT and core telecom infrastructure is non-negotiable. That&rsquo;s where Fortinet&rsquo;s SecOps framework &mdash; enhanced by NEC XON&rsquo;s delivery expertise &mdash; comes in.</span><br /><br /></font><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Inside the Modern threat Landscape</font></span><font size="3"><br /><span style="color:rgb(129, 129, 129)">Telecom providers operate some of the most complex digital ecosystems, integrating core networks, edge compute environments, and enterprise systems. But this complexity also creates gaps &mdash; and adversaries are exploiting them.</span><br /><br /></font><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Key Challenges:</font></span><font size="3"></font><ul style="color:rgb(129, 129, 129)"><li><font size="3">Multi-domain operations spanning IT, core, and edge</font></li><li><font size="3">Protection of subscriber data and control-plane traffic</font></li><li><font size="3">Interoperability across legacy and modern infrastructure</font></li><li><font size="3">Need for real-time detection and coordinated response mechanisms</font></li></ul><br /><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Fortinet SecOps: Security Built for Complexity</font></span><br /><span style="font-size: medium; color: rgb(129, 129, 129);">Fortinet&rsquo;s SecOps solution delivers an integrated, fabric-based approach to telecom security. It provides multi-domain visibility, automation, and intelligent threat response capabilities across hybrid environments.</span><br /><br /><span style="font-size: medium; color: rgb(129, 129, 129);">At its core, the Fortinet SecOps solution enables visibility across all operational layers &mdash; from enterprise IT to the mobile edge &mdash; and is powered by a tightly integrated security stack that includes FortiAnalyzer, FortiDeceptor, FortiNDR, and FortiSOAR. This integration supports security incident and event management (SIEM), network detection and response (NDR), and automated orchestration for faster and smarter threat handling. Fortinet's Zero Trust Network Access (ZTNA) enforces strict access control for employees and third parties alike. Its SD-WAN and 5G-aware firewalls offer advanced filtering of subscriber and GTP traffic. Combined with policy-as-code and automation capabilities, the platform reduces manual effort, eliminates configuration drift, and accelerates response to evolving threats.</span><br /><br /><span style="font-size: medium; color: rgb(129, 129, 129);">By correlating logs, events, traffic flows, and user behavior across domains, Fortinet delivers contextualised, actionable insights &mdash; essential for telcos operating in high-volume, multi-layered environments.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Strengthening Enterprise Security Within the Telco</font></span><br /><span style="font-size: medium; color: rgb(129, 129, 129);">Telcos aren&rsquo;t just infrastructure and service providers; they are large enterprises managing internal systems such as HR, finance, customer portals, and service platforms. Fortinet enhances security across these layers by enabling granular segmentation through FortiGate firewalls with Virtual Domains (vDOMs), which ensure secure tenancy and separation of services. Email and endpoint defenses, powered by FortiMail and FortiEDR, mitigate phishing, ransomware, and insider threats. Identity management is strengthened via FortiAuthenticator, which integrates seamlessly with telco SSO systems to enforce secure access policies. And to ensure visibility and control across increasingly hybrid environments, FortiCWP and Fabric Connectors enable robust Cloud Security Posture Management (CSPM) for public clouds like AWS and Azure, as well as telco private clouds.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Securing the Telco Stack - Core Edge</font></span><br /><span style="font-size: medium; color: rgb(129, 129, 129);">Modern telco architecture spans core networks (EPC/5GC), mobile edge computing (MEC), and access and backhaul layers &mdash; each with unique threat surfaces. Fortinet addresses these layers through a combination of carrier-grade firewalls capable of deep GTP inspection and subscriber traffic analysis, and robust DDoS protection using FortiDDoS and edge firewall scrubbing. Network segmentation is enforced across both virtual and physical network functions (VNF/PNF), limiting the lateral movement of threats. Real-time detection capabilities are enhanced through FortiDeceptor and honeynet deployments, which create traps for threat actors and expose attacker behavior. Automated incident response is enabled through FortiSOAR, which can isolate affected network segments or dynamically adjust policies to contain breaches as they unfold.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Operational Resilience with SecOps</font></span><br /><span style="font-size: medium; color: rgb(129, 129, 129);">Effective telecom security demands more than alerts &mdash; it requires contextual response and automation. Fortinet enables this shift through a platform that delivers full observability across the network using FortiAnalyzer and FortiNDR. Security teams can build and customise incident response playbooks in FortiSOAR, handling advanced scenarios such as BGP route poisoning, GTP abuse, and internal lateral movement. Use case automation extends to detecting rogue base stations, preventing SIM-based fraud, and identifying anomalies in VoIP traffic. Importantly, Fortinet facilitates threat intelligence sharing across internal business units and with regulatory bodies, helping telcos align with compliance requirements while staying ahead of adversaries.</span><br /><br /><span style="color: rgb(129, 129, 129); font-weight: 700;"><font size="3">NEC XON + Fortinet: Building Secure Telecom Operations</font></span><font size="3"><br /><span style="color:rgb(129, 129, 129)">At NEC XON, we help telecom operators go beyond reactive protection and adopt a proactive, integrated security strategy. Leveraging Fortinet&rsquo;s comprehensive security tools, we build fully integrated Security Operations Centers (SOCs) tailored to telecom environments. We conduct in-depth security posture audits and help telcos define roadmaps aligned with evolving threat landscapes. Our team enables end-to-end policy automation across enterprise and telco infrastructure and provides hands-on incident response and SecOps-as-a-Service. This allows operators to reduce mean time to response (MTTR), streamline security processes, and confidently scale technologies such as 5G, IoT, and SD-WAN.</span><br /><br /></font><span style="color:rgb(129, 129, 129); font-weight:700"><font size="3">Smarter Security for a New Era of Telecom</font></span><font size="3"><br /><span style="color:rgb(129, 129, 129)">As cyber threats evolve and customer expectations grow, telcos must rethink security from the ground up. It&rsquo;s no longer enough to deploy more tools &mdash; providers need smarter, integrated, telco-aware solutions.</span><br /><br /><span style="color:rgb(129, 129, 129)">&#8203;With Fortinet&rsquo;s&nbsp;product&nbsp;framework and NEC XON&rsquo;s implementation expertise, telecom operators can achieve deep, proactive security &mdash; from the cloud to the core, and from the user to the edge.</span><br /><br /><span style="color:rgb(129, 129, 129)">The future of telecom is fast, dynamic, and digital. With the right security in place, it can also be resilient.</span></font></div>]]></content:encoded></item><item><title><![CDATA[Inside the Mind of a Security Enhancer: NEC XON’s Approach to Modern Cybersecurity]]></title><link><![CDATA[https://www.nec.africa/blogs/inside-the-mind-of-a-security-enhancer-nec-xons-approach-to-modern-cybersecurity]]></link><comments><![CDATA[https://www.nec.africa/blogs/inside-the-mind-of-a-security-enhancer-nec-xons-approach-to-modern-cybersecurity#comments]]></comments><pubDate>Tue, 05 Aug 2025 09:10:11 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/inside-the-mind-of-a-security-enhancer-nec-xons-approach-to-modern-cybersecurity</guid><description><![CDATA[       By Andre Lombaard, Network and Security Architect at NEC XON  When it comes to enterprise cybersecurity there&rsquo;s often more noise than clarity. More tools than alignment. More pressure than purpose. My mission is to cut through all of that &mdash; not just to secure environments, but to enhance them. I don&rsquo;t see myself as a traditional security architect or consultant. I see myself as something different: a Security Enhancer.      What Is a Security Enhancer?A Security Enhancer [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/andrelombaardweb_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><em><span>By Andre Lombaard, Network and Security Architect at NEC XON</span></em></div>  <div class="paragraph">When it comes to enterprise cybersecurity there&rsquo;s often more noise than clarity. More tools than alignment. More pressure than purpose. My mission is to cut through all of that &mdash; not just to secure environments, but to enhance them. I don&rsquo;t see myself as a traditional security architect or consultant. I see myself as something different: a Security Enhancer.<br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129); font-weight:700">What Is a Security Enhancer?</span><br /><span style="color:rgb(129, 129, 129)">A Security Enhancer does more than just deploy solutions. We refine, optimise, and consolidate complex security ecosystems. We take fragmented environments and transform them into structured, scalable frameworks. It&rsquo;s not about stacking more tools. It&rsquo;s about strategic design, operational clarity, and the purposeful blending of automation and architecture. Sometimes, it means challenging convention. But always with control.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700">Controlled Disruption With Purpose</span><br /><span style="color:rgb(129, 129, 129)">Security isn&rsquo;t static &mdash; it&rsquo;s a living, breathing framework that must evolve with the threat landscape. That&rsquo;s why I believe in controlled disruption &mdash; challenging legacy designs and tool sprawl with strategic redesign. This might involve streamlining a patchwork of overlapping solutions, standardising configurations across teams, or layering automation to bring governance and consistency. The goal is never disruption for its own sake &mdash; it&rsquo;s clarity, control, and measurable improvement.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700">Where Networking and Security Meet</span><br /><span style="color:rgb(129, 129, 129)">A strong security posture rests on a solid network foundation. My experience spans Cisco Catalyst and Nexus, Juniper EX and SRX, and Fortinet&rsquo;s Secure SD-WAN and NGFW platforms. I don&rsquo;t just secure the edge &mdash; I optimise the entire data path, from core switching to cloud overlays.</span><br /><br /><span style="color:rgb(129, 129, 129)">Designing high-availability architectures, integrating SD-WAN with zero trust principles, and building virtual network overlays are where networking and security intersect &mdash; and that&rsquo;s where I thrive. This is where resilient design and real-world performance come together.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700">Fortinet + red Hat Ansible: Automation for Secure Infrastructure</span><br /><span style="color:rgb(129, 129, 129)">At NEC XON, I harness the combined power of Fortinet&rsquo;s security ecosystem and Red Hat Ansible&rsquo;s automation platform. Fortinet provides the intelligence and security fabric, while Ansible ensures consistency, speed, and repeatability across deployments.</span><br /><br /><span style="color:rgb(129, 129, 129)">I use Ansible to manage FortiGate firewalls, enforce security policies, automate change control, and maintain backups. But it&rsquo;s more than efficiency &mdash; it&rsquo;s about eliminating drift, ensuring compliance, and aligning execution with design intent. This automation-first mindset brings a DevSecOps philosophy into even the most traditional network environments &mdash; increasing visibility, reducing manual error, and scaling governance across the infrastructure.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700">A Standards-Based, Vendor-neutral Strategy</span><br /><span style="color:rgb(129, 129, 129)">Security must be built on solid, globally recognised foundations. At NEC XON, we are certified in CIS (Centre for Internet Security) and apply CIS Benchmarks to infrastructure to drive hardening, consistency, and visibility across environments.</span><br /><span style="color:rgb(129, 129, 129)">As a CISSP, I approach solutions with a vendor-neutral mindset. This means our recommendations aren&rsquo;t driven by products &mdash; they&rsquo;re driven by outcomes. We also hold Lead Auditor certification for ISO/IEC 27001:2022, allowing us to embed compliance, governance, and security assessments into every engagement. Whether it&rsquo;s auditing, assessing maturity, or building a roadmap, our approach is grounded in structure, evidence, and alignment to best practices.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700">Client-Centric Security Built on Vision - Not Templates</span><br /><span style="color:rgb(129, 129, 129)">No two clients are the same. That&rsquo;s why effective security cannot be templated. Every engagement begins with listening &mdash; understanding the client&rsquo;s business drivers, risk appetite, and governance goals. From there, we translate that vision into a security roadmap &mdash; whether it&rsquo;s a full audit, infrastructure optimisation, or a long-term hardening plan.</span><br /><span style="color:rgb(129, 129, 129)">&nbsp;</span><br /><span style="color:rgb(129, 129, 129)">Our goal is to ensure that security empowers innovation and operations, not obstructs them. It must be tailored, automated, and resilient &mdash; built around your context, not ours.</span><br /><br /><span style="color:rgb(129, 129, 129); font-weight:700">The Pillars of a Security Enhancer</span><br /><span style="color:rgb(129, 129, 129)">Every project, architecture, and strategy I deliver is guided by a set of operating principles. These pillars shape not only the outcome, but the approach we take from day one.</span><ul style="color:rgb(129, 129, 129)"><li><span style="color:rgb(129, 129, 129); font-weight:700">Pillar 1: Clarity Through Architecture:</span><strong>&nbsp;</strong>We bring order to fragmented environments by designing simplified, scalable security architectures. Complexity becomes clarity through strategic structure and intentional disruption.</li><li><span style="color:rgb(129, 129, 129); font-weight:700">Pillar 2: Automation and Governance:</span><strong>&nbsp;</strong>Security must be embedded into the infrastructure lifecycle. By treating security as code, we automate policy enforcement and compliance, making governance a continuous and repeatable process.&nbsp;</li><li><span style="color:rgb(129, 129, 129); font-weight:700">Pillar 3: Innovation with Discipline:&nbsp;</span>We embrace innovation &mdash; but not for its own sake. Every enhancement is grounded in measurable value. Disruption is always deliberate, driven by purpose and aligned to business needs.</li><li><span style="color:rgb(129, 129, 129); font-weight:700">Pillar 4: Standards and Vision:</span><strong>&nbsp;</strong>Our solutions align to CIS Benchmarks, ISO/IEC 27001:2022, and other global best practices &mdash; but always contextualised to the client&rsquo;s environment. We combine the discipline of standards with the agility of real-world insight.</li></ul><br /><span style="color:rgb(129, 129, 129); font-weight:700">NEC XON: enabling the Future of Secure Infrastructure</span><br /><span style="color:rgb(129, 129, 129)">At NEC XON, we go beyond deploying security tools. We integrate, automate, and align them to your infrastructure and outcomes. As a forward-thinking systems integrator, we focus on real operational maturity &mdash; not theoretical security.</span><br /><span style="color:rgb(129, 129, 129)">Empowered by strategic partnerships with Fortinet and Red Hat, NEC XON delivers secure, scalable network infrastructures from edge to cloud. We use FortiSOAR and Ansible to build end-to-end automation for policy control and compliance. And we align all of it with your business goals &mdash; not vendor mandates.</span><br /><span style="color:rgb(129, 129, 129)">We don&rsquo;t just sell security. We design it, implement it, and evolve it. Our mission is to give you the visibility, control, and confidence to operate in a world that&rsquo;s always changing.</span><br /><span style="color:rgb(129, 129, 129); font-weight:700"><br />Security as a Mindset</span><br /><span style="color:rgb(129, 129, 129)">We don&rsquo;t just deliver network security &mdash; we enhance it. Through architectural clarity, infrastructure automation, governance, disciplined innovation, and standards alignment, we build environments that are ready for scale, compliance, and change. Security is not a product. It&rsquo;s a mindset, a philosophy, and a practice. This is what we bring to every client engagement.</span></div>]]></content:encoded></item><item><title><![CDATA[NEC XON MDR helps organisations pe-empt cyber attacks]]></title><link><![CDATA[https://www.nec.africa/blogs/nec-xon-mdr-helps-organisations-pe-empt-cyber-attacks]]></link><comments><![CDATA[https://www.nec.africa/blogs/nec-xon-mdr-helps-organisations-pe-empt-cyber-attacks#comments]]></comments><pubDate>Tue, 11 Mar 2025 08:24:34 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/nec-xon-mdr-helps-organisations-pe-empt-cyber-attacks</guid><description><![CDATA[       By Thobani Njamela, Cybersecurity Lead: MDR (Manage Detection and Response)  Constant corporate adaptation to new business models and their technology requirements is a double-edged sword. While it&rsquo;s an unavoidable business need, the process introduces a constant stream of new cyber threats and vulnerabilities. The critical question is: how do organisations proactively prepare for these cyber-attacks?      Different organisations take different approaches to cybersecurity, depending [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/15-mar-necxon-thobani-njamela_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><font size="3">By Thobani Njamela, Cybersecurity Lead: MDR (Manage Detection and Response)</font></div>  <div class="paragraph">Constant corporate adaptation to new business models and their technology requirements is a double-edged sword. While it&rsquo;s an unavoidable business need, the process introduces a constant stream of new cyber threats and vulnerabilities. The critical question is: how do organisations proactively prepare for these cyber-attacks?</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><font size="4" style="">Different organisations take different approaches to cybersecurity, depending on their response teams and strategies. NEC XON&rsquo;s Managed Detection &amp; Response (MDR) Team adopts a unique, adversary-centric mindset&mdash;a proactive approach to threat anticipation. This approach ensures organisations stay ahead of potential breaches instead of merely reacting to them.</font><br /><br /><font size="4" style=""><span style="font-weight:bold">MDR: the proactive approach to cybersecurity</span></font><br /><font size="4" style=""><span>NEC XON&rsquo;s MDR Team employs a range of processes to reduce the risk of a breach. These include:</span></font><br /><br /><span style="font-weight: bold;"><font size="4">Advanced Threat Hunting</font></span><br /><font size="4" style=""><span>Cybercriminals continuously refine their tactics, techniques, and procedures (TTPs). The NEC XON MDR Team actively researches these evolving threats and proactively hunts for them in an organisation&rsquo;s environment. Rather than relying solely on security solutions' detection mechanisms, the team seeks out hidden threats and neutralises them before they cause harm.</span></font><br /><br /><font size="4" style=""><span style="font-weight:bold">xCTEM</span><span style="font-weight:bold"> &ndash; Extended Continuous Threat Exposure Management</span></font><br /><font size="4" style=""><span>NEC XON&rsquo;s </span><span>xCTEM</span><span> platform assesses potential threats by analysing publicly available and dark web data. This includes:</span></font><ul><li><span><font size="4">Leaked credentials</font></span></li><li><span><font size="4">Exposed systems</font></span></li><li><span><font size="4">Other security risks that could be exploited</font></span></li></ul><br /><span><font size="4">Additionally, External Attack Surface Management (EASM) allows the MDR Team to assess potential entry points into an organisation. Once vulnerabilities are identified, the team provides guidance and implements necessary preventative actions to minimise risk.&nbsp;</font></span><br /><font size="4"><a href="https://securitymattersmagazine.com/gartner-identifies-key-cyber-security-trends-for-risk-managers-in-2023">According to Gartner</a><span>, by 2026, organisations prioritising their security investments based on a continuous threat exposure management programme will suffer two-thirds fewer breaches.</span></font><br /><br /><span style="font-weight:bold"><font size="4">BAS Simulations &ndash; Testing security resilience</font></span><br /><font size="4"><span>To ensure optimal security performance, the NEC XON MDR Team conducts Breach and Attack Simulations (BAS) to test the effectiveness of security controls like EDR (Endpoint Detection and Response) and XDR (Extended Detection and Response).</span></font><br /><br /><font size="4"><span>Additionally, tabletop exercises assess how well an organisation&rsquo;s stakeholders and the NEC XON MDR Team respond to simulated attacks. These exercises extend to training end-users on best practices, helping them become a second line of </span><span>defense</span><span> against cyber threats.</span></font><br /><br /><span style="font-weight:bold"><font size="4">Continuous identity &amp; endpoint security policy optimisation</font></span><br /><span><font size="4">With identities being a prime target for attackers, the NEC XON MDR Team constantly evaluates and strengthens identity security measures for both on-premises and cloud environments. This approach ensures:</font></span><ul><li><span><font size="4">Comprehensive access security across platforms</font></span></li><li><span><font size="4">Swift response actions when necessary</font></span></li><li><font size="4"><span>Optimised endpoint detection models tailored to each organisation's environment</span></font></li></ul> <font size="4" style=""><span>These measures are further reinforced through collaboration with NEC XON's Cybersecurity Architects.</span></font><br /><br /><font size="4" style=""><span style="font-weight:bold">The importance of proactive security measures</span></font><br /><font size="4" style=""><span>Cybercriminals are increasingly clever about how they attack. Many attacks succeed simply because organisations don&rsquo;t conduct the necessary assessments and proactively mitigate risks.</span></font><br /><br /><font size="4" style=""><span>At NEC XON, the MDR Team focuses on securing high-value targets while also identifying potential blind spots&mdash;areas often overlooked but susceptible to attack. By taking a proactive stance, NEC XON MDR ensures organisations experience minimal disruption, even as they scale and grow.</span></font><br /><br /><font size="4" style="">The key to cybersecurity is preparation. Organisations must invest in security as if they have already been breached. By doing so, they build resilience against future attacks and ensure business continuity. The best time to strengthen your security was yesterday. The next best time is now.</font></div>]]></content:encoded></item><item><title><![CDATA[Demystifying Phishing]]></title><link><![CDATA[https://www.nec.africa/blogs/demystifying-phishing]]></link><comments><![CDATA[https://www.nec.africa/blogs/demystifying-phishing#comments]]></comments><pubDate>Tue, 04 Feb 2025 08:25:16 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/demystifying-phishing</guid><description><![CDATA[       By Sanelisiwe Jaffar, Senior Cybersecurity Engineer at NEC XON  October is Cybersecurity Awareness Month, a good time to discuss the new ways scammers are finding to trick people into divulging their sensitive information (social engineering). Social engineering uses people&rsquo;s emotions to trick them into revealing sensitive information. Today, we focus on four common social engineering attacks: phishing, vishing, smishing, and quishing.      PhishingPhishing happens when scammers use [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/phising_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><font size="4">By Sanelisiwe Jaffar, Senior Cybersecurity Engineer at NEC XON</font></div>  <div class="paragraph">October is Cybersecurity Awareness Month, a good time to discuss the new ways scammers are finding to trick people into divulging their sensitive information (social engineering). Social engineering uses people&rsquo;s emotions to trick them into revealing sensitive information. Today, we focus on four common social engineering attacks: phishing, vishing, smishing, and quishing.</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><font size="4" style=""><span style="font-weight: bold;">Phishing</span><br />Phishing happens when scammers use fake emails to extract sensitive information, like your name, surname, ID number, home address, etc.), banking card information, and passwords. After successfully stealing this information, scammers use it to access the victim&rsquo;s accounts, which can result in identity theft and financial losses.</font><br /><br /><span style="font-weight: bold;"><font size="4">How to spot a phishing email:</font></span><ul><li><span style="font-weight:bold">Contains suspicious links or attachments:</span><span> Look out for links and attachments, especially in unexpected emails. Links in phishing emails are used to steal login information by sending people to a fraudulent website, while attachments are often infected with malware. Opening such an attachment may install malware on your device.</span></li><li><span style="font-weight:bold">Sender email addresses look similar to legitimate ones:</span><span> Phishing emails often use addresses that look similar to legitimate ones but contain slight variations or misspellings.</span></li><li><span style="font-weight:bold">Too good to be true:</span><span> Scammers may trigger emotions of excitement, such as claiming the recipient has won a prize without entering a competition. Alternatively, they may trigger fear, for example, by sending an email from SARS claiming the victim owes a large sum of money. In both cases, the victim may be tricked into clicking on malicious links or opening unsafe attachments.</span></li><li><span style="font-weight:bold">Poor grammar and spelling:</span><span> Phishing emails often contain spelling and grammatical errors.</span></li><li><span style="font-weight:bold">Sense of urgency:</span><span> Victims are sometimes threatened or urged to act quickly.</span></li></ul><br /><span style="font-weight:bold">Tips to avoid being a phishing victim:</span><ul><li><span>Examine the sender&rsquo;s email address.</span></li><li><span>Look out for generic greetings.</span></li><li><span>Hover over links before clicking.</span></li><li><span>Watch out for urgent or threatening language.</span></li></ul><br /><span style="font-weight:bold">Vishing and </span><span style="font-weight:bold">Smishing</span><br /><span>Many people have received a phone call about fraudulent activity involving their bank card. During the call, the scammer may trick the victim into sharing sensitive information, such as their banking app username and password, by causing panic. Similarly, an SMS may contain a link asking for delivery address confirmation for a package when no delivery is expected, or exciting news about winning a prize, with a phone number to claim it, even though the person hasn&rsquo;t entered a competition.</span><br /><br /><span>These attacks are known as vishing (voice call) and </span><span>smishing</span><span> (SMS) attacks. In these cases, the scammer impersonates a reputable organi</span><span>s</span><span>ation, such as a financial institution, courier, or telecommunications provider, and manipulates the victim&rsquo;s emotions to create a sense of panic, prompting them to divulge sensitive information.</span><br /><br /><span style="font-weight:bold">How to prevent vishing and </span><span style="font-weight:bold">smishing</span><span style="font-weight:bold"> attacks:</span><ul><li><span style="font-weight:bold">Don&rsquo;t go too fast:</span><span> Before sharing any information, take a deep breath and think about the communication&rsquo;s source. For example, are you expecting a delivery if you receive an SMS about one?</span></li><li><span style="font-weight:bold">Ask yourself, &ldquo;What do they already know?&rdquo;</span><span> Banks and telecommunications companies you have contracts with should have your information. If asked to provide additional information, end the call.</span></li><li><span style="font-weight:bold">Quishing</span><span>&nbsp;= QR code + Phishing.</span></li></ul><br /><span>Scammers are now using QR codes to launch phishing attacks, and these scams are becoming more common. In these attacks, people are tricked into sharing personal information, passwords, or even money. Scammers use QR codes because they provide a quick and easy way for people to access websites, applications, or services.</span><br /><br /><span style="font-weight:bold">How </span><span style="font-weight:bold">quishing</span><span style="font-weight:bold"> works:</span><br /><span>When someone scans a malicious QR code, they are unknowingly directed to a fake website that looks legitimate. Once on this fake website, the victim may be asked to enter login credentials, banking details, or other personal information, which the scammer can use to steal identities or drain bank accounts.</span><br /><br /><span style="font-weight:bold">How to avoid getting </span><span style="font-weight:bold">quished</span><span style="font-weight:bold">:</span><ul><li><span style="font-weight:bold">Verify the source:</span><span> Ensure the QR code comes from a trusted source.</span></li><li><span style="font-weight:bold">Look out for overlays:</span><span> In public spaces, ensure that no fake QR codes have been placed over legitimate ones.</span></li><li><span style="font-weight:bold">Be cautious of emails with QR codes:</span><span> If you receive an unexpected email with a QR code, it&rsquo;s safer to manually enter the link rather than scan it.</span></li><li><span style="font-weight: bold;">Look for &ldquo;https&rdquo;:</span> After scanning the QR code, ensure the link starts with &ldquo;https&rdquo; to verify the site is secure.Stay vigilant. Verifying sources, and follow the &nbsp;simple safety tips above to protect yourself. Remember: awareness is the first line of defense in a landscape full of cyber bandits.</li></ul></div>]]></content:encoded></item><item><title><![CDATA[Defending Against Cybercrime Even More Relevant in a Digital World]]></title><link><![CDATA[https://www.nec.africa/blogs/defending-against-cybercrime-even-more-relevant-in-a-digital-world]]></link><comments><![CDATA[https://www.nec.africa/blogs/defending-against-cybercrime-even-more-relevant-in-a-digital-world#comments]]></comments><pubDate>Thu, 11 Jul 2024 07:22:31 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/defending-against-cybercrime-even-more-relevant-in-a-digital-world</guid><description><![CDATA[       By Michael de Neuilly-Rice, Cyber Security Architect at NEC XON      In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. These illicit markets have become more accessible, necessitating security strategies and tactics that reflect the increased prevalence of attacks.      Defence-in-Depth and Modern Attack SurfacesEmploying defence-in-depth methodologies alongside ex [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/michael_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><em>By Michael de Neuilly-Rice, Cyber Security Architect at NEC XON</em><br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. These illicit markets have become more accessible, necessitating security strategies and tactics that reflect the increased prevalence of attacks.<br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong>Defence-in-Depth and Modern Attack Surfaces<br /></strong>Employing defence-in-depth methodologies alongside expanded defences into modern attack surfaces&mdash;including cloud-based systems, IoT devices, and mobile endpoints&mdash;is crucial. The rise of hybrid work models has expanded the attack surface, making it imperative to include mobile defence layers that address mobility and environmental changes. Perimeter defence alone is now obsolete.<br />With SaaS solutions being hosted, managed, and controlled by third parties, it is vital to control access to these applications from a network, session, and identity perspective. While modern authentication methods have enhanced identity security, they have also introduced new vulnerabilities. Reckless provisioning and granting of OAuth access without proper policies have created significant attack vectors for cloud resources.<br /><br /><strong>Evolving Network Access Security<br /></strong>Traditional VPN architectures are no longer sufficient to protect infrastructure from malicious access. Cloud-native Secure Access Service Edge (SASE) solutions offer robust security for both on-premises and cloud resources. These always-on zero trust access solutions protect all resources from any endpoint and location. When combined with secure browser technology, they mitigate popular malware delivery mechanisms and limit initial access vectors.<br />Consolidation is key when it comes to defensive tools. Extended Detection and Response (XDR) solutions integrate multiple detection, prevention, and response tools into a single platform, increasing Security Operations Center (SOC) efficiency. By ingesting data from various sources such as networks, endpoints, identity providers, and clouds, XDR platforms ensure effective correlation and analysis, transforming millions of events into actionable alerts.<br /><br /><strong>Adapting to New Cybersecurity Challenges<br /></strong>As we transition from offices to airports and coffee shops, we need elastic, scalable, and robust cybersecurity measures to counter the risks of being true digital nomads. Threat actors are evolving and adapting their attacks to this new environment, where our offices are everywhere, and our data is spread across multiple locations and platforms. As the attack surface expands along with our work boundaries, cybersecurity is more critical than ever and will continue to evolve with modern technology.<br /><br />Will you evolve with it, or be left behind with the other victims?<br /></div>]]></content:encoded></item><item><title><![CDATA[NEC XON achieves ISO 45001 certification]]></title><link><![CDATA[https://www.nec.africa/blogs/nec-xon-achieves-iso-45001-certification]]></link><comments><![CDATA[https://www.nec.africa/blogs/nec-xon-achieves-iso-45001-certification#comments]]></comments><pubDate>Thu, 04 Jul 2024 08:37:14 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/nec-xon-achieves-iso-45001-certification</guid><description><![CDATA[       Thabiet Gabier, Head SHEQ Department at NEC XON      I am delighted to share the news that our Safety, Health, Environment and Quality (SHEQ) department has received the ISO 45001 certification. This is a significant advanced safety culture milestone for NECXON, making us one of only two NEC affiliates in EMEA, alongside NEC UK, to achieve this rigorous standard.      ISO 45001 is not just a certification; it's an international standard that transcends geographic, political, and social bo [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/sheq-certificate_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph">Thabiet Gabier, Head SHEQ Department at NEC XON</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">I am delighted to share the news that our Safety, Health, Environment and Quality (SHEQ) department has received the ISO 45001 certification. This is a significant advanced safety culture milestone for NECXON, making us one of only two NEC affiliates in EMEA, alongside NEC UK, to achieve this rigorous standard.</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">ISO 45001 is not just a certification; it's an international standard that transcends geographic, political, and social boundaries. Achieving this certification demonstrates our unwavering commitment to providing a safe working environment, reassuring our clients, vendors, staff, and subcontractors that NEC XON upholds the highest standards of occupational health and safety wherever we operate. Being assessed by a respected certification body and meeting these stringent requirements on a global scale enhances our reputation, making us a preferred service provider for international organisations looking to do business in Africa.<br /><br /><strong>A Rigorous Implementation Process</strong><br />The process of obtaining ISO 45001 certification is extensive, involving theoretical understanding, practical implementation, and proof of compliance. The journey begins with management&rsquo;s commitment to advanced safety culture, as accountability is a critical aspect of the standard. Given the stakes involved in people's safety, the first step is to conduct a gap analysis to understand our current position and identify areas for improvement.<br /><br />Understanding the context of our organisation involves an analysis to identify internal and external stakeholders and their expectations. This information helps define our OHS (Occupational Health and Safety) scope, outlining the specific areas and activities covered by our Occupational Health and Safety Management System (OHSMS). One of the biggest challenges was interpreting OHS in a way that fits our dynamic organisation. Implementing a practical approach that aligns with both the OHS Act and ISO standards required extensive development, planning, and training. After 18 months of hard work, we achieved certification with only two minor non-conformities, which we have already addressed.<br /><br />At NEC XON, our executives, managers, and department heads are well-versed in their responsibilities towards the OHSMS, documented in an OHS Scope document signed annually by the CEO. Unique to ISO 45001 is the emphasis on worker participation, necessitating an OHS Committee with both worker and company representatives to address safety concerns effectively.<br /><br />Risk management is another cornerstone of ISO 45001. Setting SMART objectives (Specific, Measurable, Achievable, Relevant, and Time-based) helps manage and mitigate risks. At NEC XON, we hold monthly risk review sessions where hazards and risks are openly discussed, allowing for practical mitigation strategies.<br /><br /><strong>Change Management and Competence</strong><br />Change management is integral to the certification process. Organisations must demonstrate how changes are assessed, communicated, and adopted without endangering the workforce. Competence and documentation are emphasised, requiring competent personnel and comprehensive documentation of processes, policies, and procedures.<br /><br />Operational aspects involved demonstrating daily safety practices, showing that staff and subcontractors are aware of their duties and conduct them safely. Internal audits play a significant role here, where organisations review their initial gap analysis and evaluate compliance with standards, policies, legal requirements, and customer expectations. These audits inform management reviews, essential for continual improvement.<br /><br /><strong>The Culmination - Achieving Certification</strong><br />The certification process culminates with an external audit. Auditors review monthly inspections, OHS Committee meetings, risk reviews, training records, and other evidence. Based on their findings, the auditor either recommends certification or identifies areas for improvement. Certification bodies like BSI verify the auditor&rsquo;s report and, if all requirements are met, issue the certification.<br /><br />Overall, the process of obtaining ISO 45001 certification ensures that organisations establish a comprehensive system to manage occupational health and safety risks, ultimately protecting employee well-being and enhancing operational efficiency.<br /><br /><strong>Improvement and People Involvement</strong><br />Back in September 2021, NEC XON did not have a dedicated OHS department. The commitment began by appointing a dedicated resource to direct SHEQ, which, I, Thabiet Gabier, now lead. Our managers understand their legal responsibilities to ensure their staff work safely. For our clients, the word "trusted" is crucial, and they expect us to adhere to international standards without further scrutiny.<br /><br />We established an OHS Committee with nominated staff representatives who are trained to raise critical issues. This committee meets quarterly and remains active in bringing safety concerns to top management&rsquo;s attention. To align with the standard, certain staff underwent ISO 45001-2018 requirements, implementation, and internal auditor training. Our Internal Auditor and I received lead auditor certification to ensure a strategic approach to meeting the standard&rsquo;s requirements. This training provided valuable insights into the difference between implementation and auditing, allowing us to identify necessary training for our staff, from legal liability to first aid and fire training.<br /><br />Maintaining and continually improving our standards involves strict adherence to existing processes and procedures, regular drills, and readiness assessments. Our goal is to create an advanced safety culture throughout the organisation, ensuring our colleagues return home safely every day.<br /><br /><strong>Forging Ahead</strong><br />Our commitment doesn&rsquo;t end with certification. We will continually assess our processes, strive for improvement, and ensure that safety remains a top priority at NEC XON. Thank you for your support and dedication to making NEC XON a safer place to work.</div>]]></content:encoded></item><item><title><![CDATA[SASE: The Future of Secure Remote Work]]></title><link><![CDATA[https://www.nec.africa/blogs/beyond-vpns-sase-pioneers-the-future-of-secure-remote-work]]></link><comments><![CDATA[https://www.nec.africa/blogs/beyond-vpns-sase-pioneers-the-future-of-secure-remote-work#comments]]></comments><pubDate>Thu, 25 Apr 2024 07:40:41 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/beyond-vpns-sase-pioneers-the-future-of-secure-remote-work</guid><description><![CDATA[       Michael de Neuilly Rice, Cyber Security Architect at NEC XON      In an era where workplace boundaries are increasingly fluid, traditional enterprise network security is inadequate. The rise of cloud adoption, coupled with the ubiquitous nature of remote work, demands a security solution that is as dynamic and agile as the modern workforce itself. Enter Secure Access Service Edge (SASE), the beacon guiding enterprises toward a future-proof network infrastructure.      What exactly is SASE [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/mr_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph">Michael de Neuilly Rice, Cyber Security Architect at NEC XON</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">In an era where workplace boundaries are increasingly fluid, traditional enterprise network security is inadequate. The rise of cloud adoption, coupled with the ubiquitous nature of remote work, demands a security solution that is as dynamic and agile as the modern workforce itself. Enter Secure Access Service Edge (SASE), the beacon guiding enterprises toward a future-proof network infrastructure.</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">What exactly is SASE, and why is it gaining traction among forward-thinking organisations? According to Gartner, SASE delivers a convergence of network and security capabilities as a service, encompassing SD-WAN, SWG, CASB, NGFW, and zero trust network access (ZTNA). It's a comprehensive approach to security that supports various use cases, from branch offices to remote workers, all while adhering to the principles of zero trust.<br /><br /><strong>Contrast with traditional VPNs</strong><br />At its core, SASE is about simplifying secure access without compromising on security. Unlike traditional VPNs, which rely on complex site-to-site tunnels, SASE connects endpoints directly to the service, eliminating the need for a vendor-specific perimeter firewall. This direct connection streamlines access to shared resources while enhancing security through dynamic access control. Imagine it as a smart keycard system for your network, granting access based on identity and context, and adapting to evolving security needs in real-time.<br /><br />By leveraging ZTNA principles, SASE ensures that only compliant devices and identities gain access, mitigating risks associated with unauthorised access. This seamless integration extends to modern identity providers like Microsoft Entra, augmenting security through conditional access policies and single sign-on convenience.<br /><br /><br /><strong>Agility and scalability</strong><br />As the landscape of work continues to evolve, SASE offers a scalable solution that grows alongside your business. Its cloud-native architecture enables organisations to adapt quickly to changing needs, facilitating digital transformation initiatives and the rapid deployment of new services or applications.<br /><br />In a world where security is paramount, SASE provides the foundation for a secure, flexible, and resilient network infrastructure. By embracing SASE, organisations can navigate the complexities of modern enterprise networks with confidence, ensuring that security strides hand in hand with innovation.</div>]]></content:encoded></item><item><title><![CDATA[NEC's Social Impact helps farming, energy & telecom]]></title><link><![CDATA[https://www.nec.africa/blogs/necs-social-impact-business-helps-farming-energy-and-telecom]]></link><comments><![CDATA[https://www.nec.africa/blogs/necs-social-impact-business-helps-farming-energy-and-telecom#comments]]></comments><pubDate>Tue, 09 Apr 2024 18:10:29 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/necs-social-impact-business-helps-farming-energy-and-telecom</guid><description><![CDATA[       Yosuke Koide, General Manager: Global Synergy Creation      &#8203;Like many countries on the African continent, South Africa has a young, growing population. However, its roughly 60-million population face a challenge that may be surprising to people from other countries: daily power outages that may last as long as 12 hours. It&rsquo;s a challenge that Yosuke Koide is working to address through cutting-edge technology developed by NEC.&#8203;      Working to change lives in AfricaNEC ha [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/yosuke_orig.webp" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph">Yosuke Koide, General Manager: Global Synergy Creation</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<span style="color:rgba(0, 0, 0, 0.9)">Like many countries on the African continent, South Africa has a young, growing population. However, its roughly 60-million population face a challenge that may be surprising to people from other countries: daily power outages that may last as long as 12 hours. It&rsquo;s a challenge that</span><span style="color:rgba(0, 0, 0, 0.9)"> </span><a href="https://www.linkedin.com/in/yosuke-koide-1283aaa/">Yosuke Koide</a><span style="color:rgba(0, 0, 0, 0.9)"> </span><span style="color:rgba(0, 0, 0, 0.9)">is working to address through cutting-edge technology developed by NEC.</span>&#8203;</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><font color="#2a2a2a"><font size="4"><strong>Working to change lives in Africa</strong><br />NEC has had a presence in Africa since 1963, helping build telecommunications, submarine cable, biometrics technology and broadcasting infrastructure. In 2011, it established NEC Africa (Pty) Ltd. in South Africa, a company focused on growing NEC's business in the Sub-Saharan region. Yosuke moved to South Africa on January 2016 shortly after NEC invested minority shareholdings of XON on July 2015 , a local systems integrator and renewable energy provider established in 1996, joined NEC Group. He is now General Manger, and Head of Global Synergy Creation at NEC XON.<br /><br />Based in Johannesburg, Yosuke says that living in South Africa is a challenge however he enjoys. Yosuke is in charge of communications, biometrics technologies, enterprise sectors, and alternative energy solutions in 48 countries in sub-Saharan Africa centered on South Africa, Nigeria and Kenya. He says that the so-called &ldquo;loadshedding&rdquo; power supply problems in South Africa, caused by aging infrastructure, poor maintenance, and other issues, are also a major issue in other African countries, disrupting lives and economies.<br /><br />&ldquo;For almost half a day we are without power,&rdquo; says Yosuke. &ldquo;Without power generators at home or office , we cannot survive.&rdquo;<br /><br />Some of the many companies affected by energy issues include mobile network operators that keep Africa&rsquo;s mobile phones connected to each other and the world. NEC XON has supplied these utilities with Hybrid Energy Storage Solutions, a flexible system that can improve reliability and save on energy costs. A typical situation would involve a rural, off-grid telecom base station combined with a solar panel array, lithium-ion storage battery, and a diesel generator. By deploying this kind of hybrid energy systems to cell towers, operators can realize diesel fuel savings of over 50%, as well as reduce CO2&nbsp;emissions and operating expenses including the cost of bringing fuel to off-grid telecom base station in rural areas.<br /><br />&ldquo;This has been a very successful accomplishment,&rdquo; says Yosuke, noting that more than 700 of the hybrid energy systems have been deployed across South Africa, Nigeria, Kenya, and Tanzania, countries he visits every few months for business.<br /><br /><strong>Life lessons: Respect and diversity</strong><br />Yosuke says the most important thing he has learned during more than five years in South Africa is the value of mutual respect and understanding. It&rsquo;s something that helps people overcome their cultural differences and lets them work together. He has also learned about the diversity of cultures in Africa, something he was unaware of when living in Japan.<br /><br />&ldquo;Japanese tend to view Africa as just one country,&rdquo; says Yosuke. &ldquo;But as you know, there are over 50 countries and many peoples, ways of thinking and languages. I am really enjoying those differences and that diversity.<br /><br />&ldquo;Living and working in South Africa is very hard, and every day something surprising happens. But it&rsquo;s so exciting, and I&rsquo;m gaining lots of experience and learning more and more as a human being. I would like to continue living here and grow together with African people by using cutting-edge technologies.&rdquo;<br /><br />NEC has the capability to support international organizations in South Africa and beyond. This capacity is based not only on NEC&rsquo;s vast technological resources, but the involvement of staff who have accumulated experiences by cooperating with many international organizations. In this way, the people who work at NEC are making a difference around the world.<br />&#8203;</font><br /></font><br /></div>]]></content:encoded></item><item><title><![CDATA[The Rise of XDR and the Decline of SIEM and SOAR]]></title><link><![CDATA[https://www.nec.africa/blogs/the-rise-of-xdr-and-the-decline-of-siem-and-soar]]></link><comments><![CDATA[https://www.nec.africa/blogs/the-rise-of-xdr-and-the-decline-of-siem-and-soar#comments]]></comments><pubDate>Tue, 05 Mar 2024 06:53:51 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/the-rise-of-xdr-and-the-decline-of-siem-and-soar</guid><description><![CDATA[       Michael de Neuilly Rice, NEC XON Cyber Security Architect      NEC XON often finds itself at the nexus of innovation, exploring new technologies to enhance defence mechanisms against evolving threats. Recently, while implementing a Security Information and Event Management (SIEM) solution for a client, our team had a moment of reflection: could a mature Extended Detection and Response (XDR) system have provided even greater benefits?      The contemplation led us to delve deeper into XDR  [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/9_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph">Michael de Neuilly Rice, NEC XON Cyber Security Architect</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">NEC XON often finds itself at the nexus of innovation, exploring new technologies to enhance defence mechanisms against evolving threats. Recently, while implementing a Security Information and Event Management (SIEM) solution for a client, our team had a moment of reflection: could a mature Extended Detection and Response (XDR) system have provided even greater benefits?</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">The contemplation led us to delve deeper into XDR and its potential to render traditional SIEM and Security Orchestration, Automation, and Response (SOAR) solutions obsolete. XDR represents a paradigm shift in cybersecurity, consolidating functionalities that were once dispersed across multiple tools. Endpoint Detection and Response (EDR), automation, and SIEM seamlessly converge within XDR platforms, offering a unified interface for detection and response.<br /><br /><strong>XDR: Redefining Detection and Response</strong><br />Modern XDR embodies years of refinement, addressing the challenges that security teams faced with disparate tools and configurations. Traditional approaches required analysts to navigate between EDR, automation, and SIEM, consuming valuable time during incident investigation. With XDR, this fragmentation is dissolved. Many EDR solutions now rebrand as XDR, expanding their coverage to include signals from various sources such as devices, identities, networks, applications, and cloud environments. The emphasis shifts towards ingesting and analysing these signals to generate actionable insights, streamlining incident response. Simplified usability and implementation have become paramount, driving the evolution of security software vendors.<br /><br />Even industry giants like Microsoft are recognising the significance of this shift, evident in the integration of their SIEM and SOAR solution, Sentinel, into Defender XDR. This trend underscores the value of centralised solutions capable of processing and responding to diverse signals, greatly benefiting Security Operations Centres (SOCs).<br /><br /><strong>Who's Falling Behind?</strong><br />Meanwhile, traditional endpoint protection solutions focusing solely on host-based and agent-based software signatures and behaviour analysis are rapidly becoming obsolete. Many antivirus vendors struggle to defend modern infrastructures against organised cybercrime operations orchestrated by sophisticated adversaries. The need for comprehensive data on environmental activities is paramount, as merely detecting malware is insufficient. Machine learning and AI offer powerful capabilities, but their effectiveness hinges on data availability. Relying solely on endpoint software analysis is inadequate in today's dynamic threat landscape.<br />&#8203;<br /><strong>Looking Ahead: Innovations on the Horizon</strong><br />As the competition for the ultimate XDR solution intensifies, anticipation grows for the innovations that lie ahead. Failure to innovate promptly risks being left behind, akin to operating a SIEM without XDR integration. As we navigate this new era, embracing XDR becomes imperative for organisations seeking to fortify their defences against new threats.</div>]]></content:encoded></item><item><title><![CDATA[Resurgence of AiTM Attacks in Cybersecurity]]></title><link><![CDATA[https://www.nec.africa/blogs/unmasking-aitm-the-resurgence-of-adversary-in-the-middle-attacks-in-cybersecurity]]></link><comments><![CDATA[https://www.nec.africa/blogs/unmasking-aitm-the-resurgence-of-adversary-in-the-middle-attacks-in-cybersecurity#comments]]></comments><pubDate>Wed, 31 Jan 2024 22:00:00 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/unmasking-aitm-the-resurgence-of-adversary-in-the-middle-attacks-in-cybersecurity</guid><description><![CDATA[       Divan de Nysschen, Cybersecurity Architect, NEC XON      Unmasking AiTM: The Resurgence of Adversary-in-the-Middle Attacks in CybersecurityIn the dynamic realm of cybersecurity, threats often disappear temporarily, only to evolve and reappear in more sophisticated forms. One such resurgence is the Adversary-in-the-Middle (AiTM) attack, a potent phishing tactic that poses a significant risk to the security of SaaS applications. How should organisations prepare themselves to counter this fo [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/cc_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><font size="3">Divan de Nysschen, Cybersecurity Architect, NEC XON</font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>Unmasking AiTM: The Resurgence of Adversary-in-the-Middle Attacks in Cybersecurity</strong><br />In the dynamic realm of cybersecurity, threats often disappear temporarily, only to evolve and reappear in more sophisticated forms. One such resurgence is the Adversary-in-the-Middle (AiTM) attack, a potent phishing tactic that poses a significant risk to the security of SaaS applications. How should organisations prepare themselves to counter this formidable threat?</div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong style="color:rgb(129, 129, 129)">AiTM Evolution</strong><br /><span style="color:rgb(129, 129, 129)">While AiTM is not a novel concept, it has undergone a metamorphosis, transforming the tools employed into a potent weapon in the arsenal of cyber adversaries. Initially witnessed in 2017, AiTM are particularly adept at pilfering session tokens - the danger being in AiTM&rsquo;s resulting ability to circumvent Multi-Factor Authentication (MFA), rendering trusted security measures inadequate. The AiTM attack intercepts authentication between users and a legitimate authentication service to compromise identities, steal credentials and intercept MFA, capturing the session cookie. This stolen session cookie allows attackers to impersonate the user without further intervention, gaining unauthorised access and potentially leading to Business Email Compromise (BEC) attacks.</span><br /><span style="color:rgb(129, 129, 129)">Modern cyber adversaries use phishing and spear-phishing campaigns to redirect users to fake login pages. Once users enter legitimate credentials and complete the MFA prompt, the attackers save the credentials and session token. The end-user is then redirected to the legitimate login page, automatically logged in without suspecting anything. Tools like Evilginx and new tactics like "EvilQR" (QR code-based attacks) further complicate detection, as entire emails with QR codes are inserted as images, making it challenging for email security solutions to identify the threat.</span><br /><span style="color:rgb(129, 129, 129)">&#8203;</span><br /><strong style="color:rgb(129, 129, 129)">Bolstering cybersecurity measures is no longer an option but a necessity</strong><br /><span style="color:rgb(129, 129, 129)">Recognising the gravity of AiTM attacks, NEC XON implements pivotal security measures to protect against potential breaches. In the face of emerging Tactics, Techniques, and Procedures (TTPs), NEC XON emphasises the need for a proactive approach from Managed Security Service Providers (MSSPs) and cybersecurity professionals worldwide.</span><br /><span style="color:rgb(129, 129, 129)">As our customers navigate this new era of cyber threats, the call to action is clear &ndash; bolstering cybersecurity measures is no longer an option but a necessity. The time to reinforce defences and stay ahead of evolving threats is now. The era of AiTM demands a united front from the global cybersecurity community to ensure a secure digital future. Stay vigilant, stay secure.</span></div>]]></content:encoded></item><item><title><![CDATA[Future of Cybersecurity: Identity-Centric Zero Trust]]></title><link><![CDATA[https://www.nec.africa/blogs/embracing-identity-centric-zero-trust-a-glimpse-into-the-future-of-the-modern-cybersecurity-perimeterma]]></link><comments><![CDATA[https://www.nec.africa/blogs/embracing-identity-centric-zero-trust-a-glimpse-into-the-future-of-the-modern-cybersecurity-perimeterma#comments]]></comments><pubDate>Tue, 16 Jan 2024 22:00:00 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/embracing-identity-centric-zero-trust-a-glimpse-into-the-future-of-the-modern-cybersecurity-perimeterma</guid><description><![CDATA[       Michael de Neuilly-Rice,&nbsp;&#8203;NEC XON Cybersecurity Architect&nbsp;      Embracing Identity-Centric Zero Trust: A Glimpse into the Future of the Modern Cybersecurity PerimeterIn the fluid cybersecurity landscape, the focus has shifted from fortifying network perimeters to acknowledging the critical role of identity and user authentication. Threat actors no longer exploit vulnerabilities; they log in using legitimate credentials. This paradigm shift calls for innovative security app [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/d_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)"><font size="3">Michael de Neuilly-Rice,&nbsp;&#8203;NEC XON Cybersecurity Architect&nbsp;</font></span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong><span style="color:rgb(129, 129, 129)">Embracing Identity-Centric Zero Trust: A Glimpse into the Future of the Modern Cybersecurity Perimeter</span></strong><br /><span style="color:rgb(129, 129, 129)">In the fluid cybersecurity landscape, the focus has shifted from fortifying network perimeters to acknowledging the critical role of identity and user authentication. Threat actors no longer exploit vulnerabilities; they log in using legitimate credentials. This paradigm shift calls for innovative security approaches. One approach gaining prominence is Identity-Centric Zero Trust.</span><br /><span style="color:inherit; font-weight:inherit">&nbsp;</span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong>The Dark Web and the Accessibility of Cybercrime:</strong><br />The rise of a flourishing black market on the Dark Web has democratised cybercrime, making it accessible to a broader spectrum of individuals. Cybercrime-as-a-Service organisations coupled with user-friendly tools have lowered the barrier of entry, allowing anyone with compromised identities to become a successful hacker.<br /><br /><strong>Zero Trust Principles:</strong><br />Microsoft's "Evolving Zero Trust" white paper defines core principles for a successful Zero Trust strategy:<ul><li><strong>Verify Explicitly:</strong> Make security decisions using all available data points, including identity, location, device health, resource, data classification, and anomalies.</li><li><strong>Use Least Privilege Access:</strong> Limit access with just-in-time and just-enough-access (JIT/JEA) and risk-based adaptive policies.</li><li><strong>Assume Breach:</strong> Minimise blast radius with micro-segmentation, end-to-end encryption, continuous monitoring, and automated threat detection and response.</li></ul><br /> <strong>Identity-Centric Zero Trust and ZTA:</strong><br />Identity-Centric Zero Trust builds upon Zero Trust principles, making user identity the new perimeter. Strict controls and continuous authentication mechanisms ensure that only authorised entities gain access to sensitive resources.<ul><li><strong>Adaptive Authentication</strong> - Behavioural Analysis: Implement advanced authentication methods that analyse user behaviour to detect anomalies, ensuring access is granted only to legitimate users.</li><li><strong>Multi-Factor Authentication (MFA)</strong> - enhanced security layers: Integrate MFA protocols, focusing on passwordless and phishing-resistant methods like Windows Hello for Business and FIDO2 keys. Extending MFA to all sections of the organisation is vital to sustain the identity-centric approach.</li><li><strong>Policy-Based Access Control</strong> - Dynamic Policies: Implement granular access control policies adapting based on contextual factors, such as user location, device health, compliance, and time of access.</li><li><strong>ITDR (Identity Threat Detection &amp; Response):</strong> ITDR aims to reduce the time it takes to identify and respond to threats by combining information from all identity sources. Automated attack disruption stops identity attacks and lateral movement activities using compromised credentials, delivering consistent protection for human and non-human identities.</li></ul><br /> <strong>The Future of the Modern Perimeter:</strong><br />As organisations embrace cloud-based services, remote work, and diverse devices, the traditional network perimeter becomes obsolete. Identity-Centric Zero Trust, fortified by Zero Trust Architecture, represents the future of cybersecurity. By placing identity at the forefront, organisations can adapt to the dynamic nature of modern business environments, proactively protecting assets and maintaining data integrity. In a digital landscape characterised by complexity and rapid evolution, Identity-Centric Zero Trust stands as a beacon guiding organisations towards a secure and adaptive future.</div>]]></content:encoded></item><item><title><![CDATA[Comprehensive Cybersecurity in Digital Era]]></title><link><![CDATA[https://www.nec.africa/blogs/navigating-the-human-factor-a-holistic-approach-to-cybersecurity-in-the-digital-age]]></link><comments><![CDATA[https://www.nec.africa/blogs/navigating-the-human-factor-a-holistic-approach-to-cybersecurity-in-the-digital-age#comments]]></comments><pubDate>Tue, 21 Nov 2023 22:00:00 GMT</pubDate><category><![CDATA[Cyber Security]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/navigating-the-human-factor-a-holistic-approach-to-cybersecurity-in-the-digital-age</guid><description><![CDATA[       Michael de Neuilly-Rice,&nbsp;&#8203;NEC XON Cybersecurity Architect&nbsp;&#8203;      The Evolution of Cybersecurity ChallengesTraditional cybersecurity measures, including firewalls, antivirus software, and encryption, have undoubtedly been instrumental in protecting digital environments. However, the relentless evolution of cyber threats, coupled with the innate vulnerabilities associated with human behaviour, has created a shifting paradigm that necessitates a more comprehensive strat [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/yy_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph" style="text-align:left;"><font size="3"><span style="color:rgb(129, 129, 129)">Michael de Neuilly-Rice,&nbsp;&#8203;NEC XON Cybersecurity Architect&nbsp;</span>&#8203;</font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong style="color:rgb(129, 129, 129)">The Evolution of Cybersecurity Challenges</strong><br /><span style="color:rgb(129, 129, 129)">Traditional cybersecurity measures, including firewalls, antivirus software, and encryption, have undoubtedly been instrumental in protecting digital environments. However, the relentless evolution of cyber threats, coupled with the innate vulnerabilities associated with human behaviour, has created a shifting paradigm that necessitates a more comprehensive strategy.</span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><br /><ul><li><span style="color:rgb(129, 129, 129)"><strong>Constantly Evolving Threats</strong>:&nbsp;Cyber threats continually evolve, employing advanced techniques like zero-day exploits, social engineering, and targeted attacks that challenge conventional technological defences.</span></li></ul><ul><li><span style="color:rgb(129, 129, 129)"><strong>Human Error</strong>:&nbsp;Despite robust technological safeguards, humans remain susceptible to errors. From falling victim to phishing emails to unintentionally compromising security, the human factor introduces an element of unpredictability.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Insider Threats</strong>:&nbsp;Trusted insiders, with legitimate access to systems, can inadvertently or intentionally cause security breaches. Distinguishing between legitimate and malicious user actions is a complex task.</span></li></ul><br /><br /><strong style="color:rgb(129, 129, 129)">The Human Element as the Primary Attack Vector</strong><br /><span style="color:rgb(129, 129, 129)">The&nbsp;</span><a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank">Verizon DBIR Report 2023</a><span style="color:rgb(129, 129, 129)">&nbsp;reveals a startling statistic: 74% of all breaches involve the human element. Social engineering tactics, credential theft, unpatched systems, employee training gaps, and insider threats collectively contribute to humans emerging as a primary target for cybercriminals.</span><ul><li><span style="color:rgb(129, 129, 129)"><strong>Social Engineering</strong>:&nbsp;Cybercriminals exploit human psychology through tactics like phishing, spear-phishing, and baiting, manipulating individuals into divulging sensitive information or compromising security.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Credential Theft</strong>:&nbsp;Gaining access to usernames and passwords remains a top priority for attackers, with techniques like password guessing and credential stuffing exploiting human-created vulnerabilities.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Unpatched Systems</strong>:&nbsp;Human negligence in keeping systems updated creates vulnerabilities that attackers can exploit, emphasising the need for proactive security practices.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Employee Training</strong>:&nbsp;Inadequate cybersecurity awareness among employees increases the risk of costly mistakes, making comprehensive training crucial in mitigating the human error factor.</span></li></ul><br /><strong style="color:rgb(129, 129, 129)">A Holistic Approach to Cybersecurity</strong><br /><span style="color:rgb(129, 129, 129)">To effectively counter the evolving threat landscape and address the human factor, organisations must adopt a holistic cybersecurity approach:</span><ul><li><span style="color:rgb(129, 129, 129)"><strong>Education and Training</strong>:&nbsp;Regular and comprehensive cybersecurity training for employees is crucial, reducing the likelihood of falling victim to social engineering and other tactics.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Detect, Prevent and Respond</strong>:&nbsp;Use advanced behavioural analytics tools and Endpoint Detection and Response (EDR) systems to monitor user activities and detect anomalies indicative of unauthorised access or insider threats.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Zero Trust Framework</strong>:&nbsp;Implement a zero-trust security framework that continuously verifies user identities and device security, even for those within the organisation.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>Incident Response Plans</strong>:&nbsp;Develop and regularly test incident response plans to ensure swift and effective responses in the event of a breach, minimising potential damage.</span></li><li><span style="color:rgb(129, 129, 129)"><strong>User-Friendly Security</strong>:&nbsp;Implement security measures that balance effectiveness with user convenience, avoiding complex protocols that may lead to workarounds and reduced security compliance.</span>&#8203;<span style="color:rgb(129, 129, 129)">&#8203;</span></li></ul><br /><span style="color:rgb(129, 129, 129)">While technological measures remain integral to cybersecurity, they are no longer sufficient on their own. By acknowledging the human factor as a primary attack vector and combining advanced technology with comprehensive training, monitoring, and incident response strategies, organisations can fortify their defences against the ever-evolving cyber threat landscape. It is through this holistic approach that true cybersecurity resilience can be achieved in the digital age.</span></div>]]></content:encoded></item><item><title><![CDATA[Cyber threat anticipation: how NEC XON leads the charge]]></title><link><![CDATA[https://www.nec.africa/blogs/cyber-threat-anticipation-how-nec-xon-leads-the-charge]]></link><comments><![CDATA[https://www.nec.africa/blogs/cyber-threat-anticipation-how-nec-xon-leads-the-charge#comments]]></comments><pubDate>Wed, 08 Nov 2023 22:00:00 GMT</pubDate><category><![CDATA[Cyber Security]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/cyber-threat-anticipation-how-nec-xon-leads-the-charge</guid><description><![CDATA[       &#8203;Armand Kruger,&nbsp;Head of Cyber Security at NEC XON      NEC XON, a cybersecurity leader, is at the forefront of this fight, pioneering innovative approaches to enhance cyber defence and resilience.      The changing landscape: A call for vigilanceRecent findings from the Microsoft digital defence report have unveiled some alarming statistics. Human-operated ransomware attacks have surged by a staggering 200% and it&rsquo;s not just large corporations that are in the crosshairs.  [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/armand_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)"><font size="3">&#8203;Armand Kruger,&nbsp;Head of Cyber Security at NEC XON</font></span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><a href="https://nec.xon.co.za/" target="_blank">NEC XON</a><span style="color:rgb(129, 129, 129)">, a cybersecurity leader, is at the forefront of this fight, pioneering innovative approaches to enhance cyber defence and resilience.</span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><strong style="color:rgb(129, 129, 129)">The changing landscape: A call for vigilance</strong><br /><span style="color:rgb(129, 129, 129)">Recent findings from the Microsoft digital defence report have unveiled some alarming statistics. Human-operated ransomware attacks have surged by a staggering 200% and it&rsquo;s not just large corporations that are in the crosshairs. Small and medium-sized businesses, with fewer than 500 employees, represent 70% of the organisations hit by these malicious attacks. Password-based attacks have also witnessed a significant spike, underscoring the need for organisations to adapt and prepare for the ever-evolving cyber threat landscape.</span><br /><br /><span style="color:rgb(129, 129, 129)">NEC XON&rsquo;s cybersecurity strategy foundation lies in the core principles of threat detection, response and anticipation. Our proactive approach to&nbsp;</span><a href="https://www.comparethecloud.net/articles/strategy-and-anticipation-are-key-to-securing-against-cyber-threats/" target="_blank">threat anticipation&nbsp;</a><span style="color:rgb(129, 129, 129)">is the new frontier of defence, where we calibrate our readiness based on known vulnerabilities and observed attack techniques. This approach empowers us to reduce risk gradually while fostering business transformation and innovation.</span><br /><br /><strong style="color:rgb(129, 129, 129)">A real-world example</strong><br /><span style="color:rgb(129, 129, 129)">Consider this scenario. Organisation A falls victim to a cyberattack due to a compromised credential used to access its customer infrastructure via VPN without multi-factor authentication (MFA).</span><br /><br /><span style="color:rgb(129, 129, 129)">Threat anticipation is observing the attack tactics, going to all customers and partners and assisting them to enable MFA on VPN via a unified identity-centric strategy that is centrally controlled. Threat detection is detecting that there was an attempt to log into VPN via a compromised credential but was mitigated by MFA and additional controls applied as part of the identity-centric architecture.</span><br /><br /><span style="color:rgb(129, 129, 129)">Threat Response is disabling the identity that was compromised, changing its password and limiting its ability to log into any business application, protecting business assets and maintaining cyber resilience.</span><br /><br /><strong style="color:rgb(129, 129, 129)">The role of cyber innovation</strong><br /><span style="color:rgb(129, 129, 129)">In a landscape where cyber threats are prolific, the ability to innovate cyber strategy is crucial. We adopt an adversary-centric mentality, allowing us to view our customers&rsquo; organisations through the eyes of modern adversaries. By anticipating attack opportunities in the process of&nbsp;</span><a href="https://www.csoonline.com/article/569225/threat-modeling-explained-a-process-for-anticipating-cyber-attacks.html" target="_blank">threat modelling&nbsp;</a><span style="color:rgb(129, 129, 129)">and mapping them against current safeguards, we can pre-emptively strengthen defences. Here&rsquo;s a cheat sheet with some key tactics to remember:</span><br /><br /><strong style="color:rgb(129, 129, 129)">Key tactics for cyber resilience</strong><ul style="color:rgb(129, 129, 129)"><li>Map and reduce your perimeter:&nbsp;Identify and secure all potential entry points for adversaries, from VPNs to public-facing systems and login interfaces with no MFA.</li><li>Architecturally redesign your infrastructure:&nbsp;Implement network segmentation to limit lateral movement within your network and gain control over adversary pathways.</li><li>Adopt a unified and identity-centric approach:&nbsp;Strengthen identity and access management (IAM) solutions to ensure MFA across the entire network.</li><li>Reinforce privileged access control:&nbsp;Prioritise securing privileged access to seal off unauthorised pathways and closely monitor authorised access.</li><li>Prioritise basic cyber hygiene controls:&nbsp;Implement fundamental cyber hygiene practices, such as changing default credentials and reducing over-privileged users and groups.</li><li>Build a robust incident response plan:&nbsp;Prepare for cyber incidents with a well-defined response plan that includes communication, coordination and testing.</li><li>Use a vigorous XDR solution:&nbsp;Implement extended detection and response (XDR) to correlate signals from various security products and execute rapid threat response actions.</li><li>Maintain tested &amp; isolated backups:&nbsp;Regularly back up critical data and applications, isolate them from the production environment and test their restoration.</li><li>Educate and guide the board of directors:&nbsp;Ensure that the board understands the evolving cyber risks and aligns cybersecurity investment with a defence-centric strategy.</li><br /><br /></ul><span style="color:rgb(129, 129, 129)">Cybersecurity is no longer just a matter of implementing security tools and services. It requires a holistic, proactive approach that incorporates threat anticipation, innovative thinking and a strong defence-centric strategy. NEC XON is at the forefront of this paradigm shift, leading the way in preparing for the cybersecurity challenges of tomorrow. In a world where cyber threats continue to evolve, our approach to threat anticipation is our first line of defence, ensuring that the pleasure of protection is all ours.&nbsp;</span><br /><span style="color:rgb(129, 129, 129)">&#8203;</span><br /><strong><font color="#055eac">About NEC XON</font></strong><br /><span style="color:rgb(129, 129, 129)">NEC XON is a leading African integrator of ICT solutions and part of NEC, a global Japanese firm. The company has operated in Africa since 1963 and delivers communications, energy, safety, security and digital solutions. It co-creates social value through innovation to help overcome serious societal challenges. The organisation operates in 54 African countries and has a footprint in 16 of them. Regional headquarters are located in South, East and West Africa. NEC XON is a level 1-certified broad-based black economic empowerment business.&nbsp;Learn more at&nbsp;</span><a href="http://www.nec.xon.co.za/" target="_blank">www.nec.xon.co.za</a><span style="color:rgb(129, 129, 129)">.</span></div>]]></content:encoded></item><item><title><![CDATA[Boosting Employee Cyber Awareness with ModernStrategies]]></title><link><![CDATA[https://www.nec.africa/blogs/modern-strategies-to-stimulate-cyber-awareness-for-employee-resilience]]></link><comments><![CDATA[https://www.nec.africa/blogs/modern-strategies-to-stimulate-cyber-awareness-for-employee-resilience#comments]]></comments><pubDate>Thu, 26 Oct 2023 22:00:00 GMT</pubDate><category><![CDATA[Cyber Security]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/modern-strategies-to-stimulate-cyber-awareness-for-employee-resilience</guid><description><![CDATA[       By Divan de Nysschen, Cybersecurity Architect at NEC XON      Malicious actors seeking to infiltrate networks would rather find a way to be given a key to the castle by an unsuspecting human than try to climb the ramparts or break through a thick iron gate. Recent statistics reveal that a staggering 22% of all cyber breaches stem from phishing attacks, which take an alarming 295 days, on average, to contain.&#8203;      To defend against cyber threats effectively, businesses must prioriti [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/divan_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)"><font size="3">By Divan de Nysschen, Cybersecurity Architect at NEC XON</font></span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)">Malicious actors seeking to infiltrate networks would rather find a way to be given a key to the castle by an unsuspecting human than try to climb the ramparts or break through a thick iron gate. Recent statistics reveal that a staggering 22% of all cyber breaches stem from phishing attacks, which take an alarming 295 days, on average, to contain.<br />&#8203;<br /></span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">To defend against cyber threats effectively, businesses must prioritise increasing cybersecurity awareness among their employees. This awareness ensures that employees are well-versed in maintaining their "cyber hygiene" and understanding how to identify and prevent cyber threats. With the right tools and knowledge, employees can act proactively to prevent security incidents that could lead to data breaches, causing significant harm to a business's operations, finances, and reputation.<br /><br /><strong><font size="5" color="#0a3c91">Five strategies to thwart the thieves</font></strong><br />In this blog, we explore five contemporary strategies designed to cultivate cyber awareness and enhance employee resilience against social engineering.<br /><br /><ol><li><strong>Make Cybersecurity a Part of New Employee Onboarding</strong> - One effective way to instil the importance of cybersecurity among employees is by integrating it into their onboarding process. Educating employees about their roles and responsibilities in upholding information security can help businesses build a robust defence against cyber threats. However, it's crucial to remember that cybersecurity training should not end with onboarding; it should be an ongoing part of your business's strategy to maintain awareness.</li><li><strong>Cybersecurity Training and Workshops</strong> - A comprehensive security awareness training program is essential to boost overall cybersecurity awareness among employees. Such programs provide employees with the knowledge and confidence needed to recognise cyber threats and respond appropriately to prevent them. They also help employees understand the process of escalation in case of a security incident. One way to engage employees effectively is through interactive live video demonstrations. These demonstrations provide a comprehensive understanding of the entire attack lifecycle, from its inception to how it appears to an end-user.</li><li><strong>Executive Cyber Drills</strong> - Cyber drills are an excellent way to test an organisation's defences, specifically employees&rsquo; ability to respond quickly to potential threats in a simulated environment. These drills, often run by internal or external teams, simulate cyber-attacks to test a business's security measures. Different types of drills challenge different sets of employees and skills, such as phishing simulations, which test employees' alertness in identifying and avoiding phishing scams.</li><li><strong>Get Senior Management to Promote Cyber Awareness </strong>- Leadership within a business plays a critical role in promoting cybersecurity awareness. Senior-level management must model appropriate cybersecurity hygiene, setting the tone and standard for the entire company. By displaying behaviour expected from employees, leadership helps instil a culture of cybersecurity awareness throughout the organisation.</li><li><strong>Implement Robust Cybersecurity Policies</strong> - While most employees understand the importance of protecting company security, some may not take it as seriously. It's essential for businesses to be clear with their employees about the consequences of repeated security failures. A single careless employee can have a detrimental impact on the entire organisation. Each organisation should determine appropriate measures for handling repeat failures and offer rewards for proper precaution.</li></ol><br />Cybersecurity awareness is a critical component of an organisation's defence against the growing threat of cyberattacks. By implementing the strategies mentioned above and continuously educating and engaging employees, businesses can enhance their cybersecurity posture and create a resilient workforce that is well-prepared to tackle the challenges of the digital age. Remember, in the battle against cyber threats, informed and aware employees are your first line of defence.</div>]]></content:encoded></item><item><title><![CDATA[Pioneering people-centric AI in a data-centric world]]></title><link><![CDATA[https://www.nec.africa/blogs/pioneering-people-centric-ai-in-a-data-centric-world]]></link><comments><![CDATA[https://www.nec.africa/blogs/pioneering-people-centric-ai-in-a-data-centric-world#comments]]></comments><pubDate>Sun, 21 May 2023 22:00:00 GMT</pubDate><category><![CDATA[AI]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/pioneering-people-centric-ai-in-a-data-centric-world</guid><description><![CDATA[       &#8203;By&nbsp;Yosuke Koide | General Manager: Global Synergy Creation at NEC XON      There&rsquo;s an AI revolution happening in the data-centric world! Data has become the lifeblood of our digital age, but the sheer volume and complexity present significant challenges. NEC XON acknowledges that the real value lies in effectively processing, analysing, and extracting meaningful insights from vast data repositories. Leveraging AI, we empower organisations to navigate the data deluge effo [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/koide_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><font size="3">&#8203;<span style="color:rgb(129, 129, 129)">By&nbsp;Yosuke Koide | General Manager: Global Synergy Creation at NEC XON</span></font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)">There&rsquo;s an AI revolution happening in the data-centric world! Data has become the lifeblood of our digital age, but the sheer volume and complexity present significant challenges. NEC XON acknowledges that the real value lies in effectively processing, analysing, and extracting meaningful insights from vast data repositories. Leveraging AI, we empower organisations to navigate the data deluge effortlessly.<br />&#8203;</span><br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph">&#8203;By employing cutting-edge machine learning algorithms and advanced analytics, NEC XON&rsquo;s AI solutions offer the ability to uncover hidden patterns, predict trends, and make data-driven decisions with greater accuracy and efficiency.&nbsp; But what about our humanity?.<br /><br /><strong>It&rsquo;s about more than business</strong><br /><br />NEC XON is dedicated to tackling societal challenges and driving social value by leveraging data and AI technologies. We aim to help create a sustainable future, deliver social benefits, and empower individuals. Fundamental societal transformation has led us to recognise that corporations have to go beyond merely pursuing profit, and help to provide social value to benefit everyone. Respect for individual freedoms and the responsible sharing of limited resources are crucial aspects of NEC XON&rsquo;s approach. Furthermore, a sustainable future requires effective talent acquisition and training a younger generation to meet future needs. These are just some of the vital challenges that we aim to overcome through data analytics and AI technologies.<br /><br />NEC XON envisions a world where data acts as a bridge between the real and cyber worlds, and AI serves as the catalyst for analysis and application. By collecting and analysing data from sensors, we help customers gain a deeper understanding of their businesses and the world. This information is then processed using cyber-world analytics and AI to generate insights and conclusions, which are subsequently applied in the real world to create social value.<br /><br /><strong>What AI is and where we apply it</strong><br /><br />To us AI comprises three fundamental steps: recognition and understanding, thinking and analysis, and action and prescription. AI algorithms effectively computerise human intellectual activities, but efficiently process vast amounts of data. However, AI applications are not solely reliant on technology; human input is crucial in optimising the value created by AI. NEC emphasises the importance of strong AI governance and ethical principles to ensure responsible and beneficial use of AI.<br /><br />Our parent company NEC has successfully applied AI across various environments and industries. In manufacturing, AI enables automated inspection of production lines and products, reducing costs and ensuring standardised quality. Retail environments benefit from AI-powered demand forecasting, minimisng losses and optimising ordering systems. In financial services, AI aids in fraud detection, lowering detection costs and providing explanations for suspicious account identification. NEC also applies AI in infrastructure monitoring to prevent malfunctions and in healthcare for AI-based self-care, promoting healthier lifestyles while reducing the workload on medical professionals.<br /><br />NEC XON&rsquo;s commitment to AI and data analytics reflects our dedication to creating social value and addressing societal challenges. By leveraging the power of data and AI technologies, we pioneer practical applications that drive business growth, enhance operational efficiency, and promote the well-being of individuals and communities. Through responsible and ethical AI implementation, NEC XON is shaping a data-centric world for the better.<br />&#8203;<br />If you&rsquo;d like to discuss any aspect of this blog, please feel free to reach out to us at info@nec.xon.co.za. We&rsquo;d be delighted to chat.</div>]]></content:encoded></item><item><title><![CDATA[NEC XON fills the IT Human Capital Gap]]></title><link><![CDATA[https://www.nec.africa/blogs/hunting-professional-ict-skills-nec-xon-fills-the-it-human-capital-gap]]></link><comments><![CDATA[https://www.nec.africa/blogs/hunting-professional-ict-skills-nec-xon-fills-the-it-human-capital-gap#comments]]></comments><pubDate>Thu, 04 May 2023 22:00:00 GMT</pubDate><category><![CDATA[Human Capital]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/hunting-professional-ict-skills-nec-xon-fills-the-it-human-capital-gap</guid><description><![CDATA[       By&nbsp;Stephan Ras, Executive: Managed Services and Consulting at NEC XON Systems      As a business owner or manager, you know the importance of having a skilled and reliable workforce. I can relate to your pain. In today&rsquo;s constantly changing employment landscape, finding and retaining top-tier talent can be a huge challenge. The ICT sector, in particular, has been characterised by continuous turnover and churn, and the challenge is set to grow in the post-COVID-19 era.      Acco [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://www.nec.africa/uploads/1/2/3/1/123149466/blog-humancapital_orig.jpg" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph" style="text-align:left;"><span style="color:rgb(129, 129, 129)"><font size="3">By&nbsp;Stephan Ras, Executive: Managed Services and Consulting at NEC XON Systems</font></span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span style="color:rgb(129, 129, 129)">As a business owner or manager, you know the importance of having a skilled and reliable workforce. I can relate to your pain. In today&rsquo;s constantly changing employment landscape, finding and retaining top-tier talent can be a huge challenge. The ICT sector, in particular, has been characterised by continuous turnover and churn, and the challenge is set to grow in the post-COVID-19 era.</span><br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;"><br />According to the &ldquo;State of ICT Skills in South Africa 2021&rdquo; report by the Information Technology Association of South Africa (ITA), there is a significant skills gap in the country&rsquo;s ICT sector. The report concluded that:<ul><li>South Africa has a significant shortage of ICT skills, with an estimated 40,000 unfilled vacancies in the sector.</li><li>The skills shortage is most acute in the areas of software development, cybersecurity, data analytics, and cloud computing.</li><li>The shortage of skills is leading to significant productivity losses, with companies struggling to implement new technologies and systems due to a lack of qualified workers.</li><li>Despite the high levels of unemployment in the country, many ICT companies are struggling to find suitable candidates to fill vacancies.</li><li>The skills shortage is exacerbated by a lack of investment in training and education in the ICT sector, as well as skilled workers leaving the country for opportunities abroad.</li><li>The COVID-19 pandemic has further highlighted the importance of ICT skills, with many businesses and industries relying heavily on technology to continue operations during lockdowns.</li></ul> <br />Overall, the ITA report emphasises the urgent need for increased investment in training and education in the ICT sector to address the skills gap and boost economic growth. Fortunately, NEC XON has launched a new Human Capital business unit, which offers a range of workforce management and contract resourcing solutions to meet the critical staffing needs of South African businesses.<br /><br />Traditional sourcing methods like using web portals have become less effective, and the emergence of social media has changed the sourcing landscape forever. At the same time, the workforce has also evolved, with different values and demands regarding work-life balance. Smart resourcing has become the new normal, and NEC XON&rsquo;s Human Capital team is well equipped to help IT executives find the right talent to achieve their business objectives.<br /><br />What sets NEC XON&rsquo;s Human Capital business unit apart is the personalised approach to each client engagement. The team works closely with IT executives to understand their specific skills requirements and sources the right talent to meet those needs. With a deep understanding of the talent landscape across various industries and roles, the team delivers tailored staffing solutions that align with each client&rsquo;s unique needs.<br />In addition to recruitment services, NEC XON&rsquo;s Human Capital business unit also offers workforce management solutions to help IT executives optimise their staffing operations. These solutions include workforce planning, scheduling, performance management, compliance and risk management. By leveraging Human Capital&rsquo;s expertise in workforce management, IT executives can streamline their staffing processes, reduce costs and improve efficiency.<br /><br />NEC XON Human Capital&rsquo;s track record is testament to our understanding of the past and current ICT employment landscape, and we are well-poised to meet the future challenges of this highly competitive market. As an IT executive or business owner, partnering with NEC XON&rsquo;s Human Capital business unit provides a valuable resource to address your critical skilled contract resourcing needs. Contact us for more information about how NEC XON can help your organisation achieve its staffing goals and drive business success.</div>  <div> 	<form enctype="multipart/form-data" action="//www.weebly.com/weebly/apps/formSubmit.php" method="POST" id="form-801526850658847391"> 		<div id="801526850658847391-form-parent" class="wsite-form-container" 				 style="margin-top:10px;"> 			<ul class="formlist" id="801526850658847391-form-list"> 				<div class="wsite-spacer" style="height:50px;"></div>  <h2 class="wsite-content-title"><font size="6">Need more information</font></h2>  <label class="wsite-form-label wsite-form-fields-required-label"><span class="form-required">*</span> Indicates required field</label><div><div class="wsite-form-field wsite-name-field" style="margin:5px 0px 5px 0px;"> 				<label class="wsite-form-label">Name <span class="form-required">*</span></label> 				<div style="clear:both;"></div> 				<div class="wsite-form-input-container wsite-form-left wsite-form-input-first-name"> 					<input aria-required="true" id="input-697895242738665609" class="wsite-form-input wsite-input" placeholder="First" type="text" name="_u697895242738665609[first]" /> 					<label class="wsite-form-sublabel" for="input-697895242738665609">First</label> 				</div> 				<div class="wsite-form-input-container wsite-form-right wsite-form-input-last-name"> 					<input aria-required="true" id="input-697895242738665609-1" class="wsite-form-input wsite-input" placeholder="Last" type="text" name="_u697895242738665609[last]" /> 					<label class="wsite-form-sublabel" for="input-697895242738665609-1">Last</label> 				</div> 				<div id="instructions-697895242738665609" class="wsite-form-instructions" style="display:none;"></div> 			</div> 			<div style="clear:both;"></div></div>  <div><div class="wsite-form-field" style="margin:5px 0px 5px 0px;"> 				<label class="wsite-form-label" for="input-479369291817901416">Email <span class="form-required">*</span></label> 				<div class="wsite-form-input-container"> 					<input aria-required="true" id="input-479369291817901416" class="wsite-form-input wsite-input wsite-input-width-370px" type="text" name="_u479369291817901416" /> 				</div> 				<div id="instructions-479369291817901416" class="wsite-form-instructions" style="display:none;"></div> 			</div></div>  <div><div class="wsite-form-field" style="margin:5px 0px 5px 0px;"> 				<label class="wsite-form-label" for="input-466611680452989646">Comment <span class="form-required">*</span></label> 				<div class="wsite-form-input-container"> 					<textarea aria-required="true" id="input-466611680452989646" class="wsite-form-input wsite-input wsite-input-width-370px" name="_u466611680452989646" style="height: 200px"></textarea> 				</div> 				<div id="instructions-466611680452989646" class="wsite-form-instructions" style="display:none;"></div> 			</div></div> 			</ul> 			 		</div> 		<div style="display:none; visibility:hidden;"> 			<input type="hidden" name="weebly_subject" /> 		</div> 		<div style="text-align:left; margin-top:10px; margin-bottom:10px;"> 			<input type="hidden" name="form_version" value="2" /> 			<input type="hidden" name="weebly_approved" id="weebly-approved" value="approved" /> 			<input type="hidden" name="ucfid" value="801526850658847391" /> 			<input type="hidden" name="recaptcha_token"/> 			<input type="submit" role="button" aria-label="Submit" value="Submit" style="position:absolute;top:0;left:-9999px;width:1px;height:1px" /> 			<a class="wsite-button"> 				<span class="wsite-button-inner">Submit</span> 			</a> 		</div> 	</form> 	<div id="g-recaptcha-801526850658847391" class="recaptcha" data-size="invisible" data-recaptcha="1" data-sitekey="6Ldf5h8UAAAAAJFJhN6x2OfZqBvANPQcnPa8eb1C"></div>    </div>]]></content:encoded></item><item><title><![CDATA[NEC XON breaks ground in Africa's quest for 5G OpenRAN]]></title><link><![CDATA[https://www.nec.africa/blogs/nec-xon-breaks-ground-in-africas-quest-for-5g-openran]]></link><comments><![CDATA[https://www.nec.africa/blogs/nec-xon-breaks-ground-in-africas-quest-for-5g-openran#comments]]></comments><pubDate>Sat, 01 Apr 2023 22:00:00 GMT</pubDate><category><![CDATA[5G]]></category><guid isPermaLink="false">https://www.nec.africa/blogs/nec-xon-breaks-ground-in-africas-quest-for-5g-openran</guid><description><![CDATA[  &#8203;By Willem Wentzel | Head of Wireless at NEC XON      &#8203;5G OpenRAN (ORAN) technology that enables mobile operators to open the RAN network and use multi-vendor solutions holds huge promise for business growth in Africa. It means network operators can focus capital expenditure (capex) on competitively priced open-standards equipment rather than proprietary gear.&ldquo;It enables attractive savings of about 40% on capital expenditure and 30% on operating expenditure (OPEX),&rdquo; say [...] ]]></description><content:encoded><![CDATA[  <div class="paragraph"><font size="3">&#8203;By Willem Wentzel | Head of Wireless at NEC XON</font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;5G OpenRAN (ORAN) technology that enables mobile operators to open the RAN network and use multi-vendor solutions holds huge promise for business growth in Africa. It means network operators can focus capital expenditure (capex) on competitively priced open-standards equipment rather than proprietary gear.<br /><br />&ldquo;It enables attractive savings of about 40% on capital expenditure and 30% on operating expenditure (OPEX),&rdquo; says Willem Wentzel, head of Wireless at NEC XON. &ldquo;It can also be deployed in a matter of two to three days instead of up to nine months. But the realities of Africa mean that 5G ORAN will initially be limited to private corporate networks in industries like mining, manufacturing and industrial where large campuses are common. Public ORAN networks are likely to remain on 4G for the moment, given the level of investment in existing infrastructure and the prohibitive cost of 5G handsets (UE) for consumers.&rdquo;<br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph"><br />&#8203;<strong>Private corporate networks &ndash; NEC XON&rsquo;s thin edge of the wedge</strong><br />Private 5G ORAN networks will break the ice and help to bring down unit costs for the public market, and Wentzel says NEC XON is currently bringing proof-of-concept kits into Africa for three clients in these industries.<br />&ldquo;The ability to privatise 5G ORAN will enable machine-to-machine (M2M), business to business (B2B) and push-to-talk communication on campus, or anywhere in the country (or the world) on a company site using a phone app. To date, most of these campus applications used WiFi simply because it was the only tech feasible to use given that all 4G spectrum has been allocated on a national level to monopolistic MNO players. &ldquo;The shortfall with WiFi is industrial-scientific noise which limits the guaranteed throughput and customer experience. As such, it is a &lsquo;best effort&rsquo; service,&rdquo; Wentzel explains. &ldquo;That creates a lot of latency in the network which means the signal isn&rsquo;t reliable enough for B2B and M2M services. Due to its reliability in design, 5G ORAN guarantees low latency and enables remote operation of both B2B and M2M processes.&rdquo; Wentzel says the mining industry is particularly hungry for low latency networks that enable control of machinery and reduce the risk of human injury &ndash; and increase productivity since the technology can work 24&times;7 whereas a lot of mines can&rsquo;t currently work at sunset because of safety concerns.<br /><br />Wentzel says a key hurdle to overcome is scaling the network to the point where it makes economic sense. &ldquo;Each of these companies wants its own 5G ORAN core on campus. Finding the right operation and business support system (OSS/BSS) is vital to the business case and, with our partners, we are already building cost-effective models. This is especially important in industries like mining where the network coverage need is intricate &ndash; a reality that impacts on cost.&rdquo; Wentzel&nbsp; says NEC XON is developing a unique panel which deflects 3.7GHz signals into specific areas where coverage is required &ndash; underground, for example.<br /><br />NEC XON has also invested in network assurance with its acquisition of Aspire &ndash; whose solutions can monitor and display the performance of the network, highlight any weak points and optimise network usage on any vendor&rsquo;s solution. That doesn&rsquo;t just improve the network itself, but it reduces total cost of ownership by allowing for predictive maintenance, for example.<br /><br />Wentzel explains that predictive maintenance goes deeper than simple early warnings. The Aspire solution will tell support workers what to look for and what spares to take with them to effect repairs. &ldquo;This actually plays right into the total cost of ownership point,&rdquo; says Wentzel. &ldquo;Currently, you&rsquo;d need a rigger, an engineer and a labourer to be on site to do repairs. A predictive maintenance solution will often obviate the need for an engineer, and allow a suitably qualified technician to simply replace the part as indicated.&rdquo;<br /><br /><strong>NEC XON 5G ORAN blueprint</strong><br />&ldquo;Of course, each client&rsquo;s private network will be unique from the features, functions and scalability perspectives,&rdquo; Wentzel says. &ldquo;But the good news is that the savings in terms of time and money will make 5G ORAN a worthwhile investment very quickly. The solution can use existing ducting and data centre infrastructure, doesn&rsquo;t require intervention by a structural engineer to approve and oversee building alterations, or building approval from municipal authorities.<br />The solution also extends to any industry with a campus environment, and can cover multiple dispersed campuses too. &ldquo;A bank could have one core instance of the solution deployed, and allow employees in Johannesburg to communicate via the internal network to employees at its Cape Town campus, for example. Much like a PABX, your mobile device becomes your extension,&rdquo; Wentzel explains. &ldquo;The difference is that you&rsquo;re using the internal company network instead of the public GSM network.&rdquo;<br /></div>]]></content:encoded></item></channel></rss>