Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      South Africa unveils big state digital reform programme

      12 May 2025

      The SA start-up using AI to read X-rays – and save lives

      12 May 2025

      Brace yourself: iPhone prices may be headed even higher

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025

      MTN sees big expansion in profit margin

      12 May 2025
    • World

      Vodafone CFO to step down

      7 May 2025

      Lights, camera, tariffs: Trump declares war on foreign flicks

      5 May 2025

      UK to warn companies that cybersecurity must be ‘absolute priority’

      4 May 2025

      BYD sales are skyrocketing

      2 May 2025

      Pichai warns Google Search could be ripped apart

      30 April 2025
    • In-depth

      Social media’s Big Tobacco moment is coming

      13 April 2025

      This is Europe’s shot to emerge from Silicon Valley’s shadow

      10 April 2025

      Microsoft turns 50

      4 April 2025

      World reels from Trump tariff shock

      3 April 2025

      AI agents are here – but are they thinking for us or replacing us?

      12 March 2025
    • TCS

      TCS | Kiaan Pillay on fintech start-up Stitch and its R1-billion funding round

      7 May 2025

      TCS+ | Switchcom and Huawei eKit: networking made easy for SMEs

      6 May 2025

      TCS | How Covid sparked a corporate tug-of-war over Adapt IT

      30 April 2025

      TCS+ | Inside MTN’s big brand overhaul

      11 April 2025

      TCS | How South Africa’s Milkor became a global player in drone innovation

      28 March 2025
    • Opinion

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025

      ICT distributors must embrace innovation or risk irrelevance

      9 April 2025

      South Africa unprepared for deepfake chaos

      3 April 2025

      Google: South African media plan threatens investment

      3 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Cyber threat anticipation: how NEC XON leads the charge

    Cyber threat anticipation: how NEC XON leads the charge

    Promoted | NEC XON is at the forefront of the fight against cyber adversaries, helping companies enhance their resilience.
    By NEC XON9 November 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The war against cyber threats has never been more critical — or ferocious. The ever-growing number of sophisticated attacks on the horizon means organisations must evolve and adapt their cybersecurity strategies to protect their data, systems and reputation. NEC XON, a cybersecurity leader, is at the forefront of this fight, pioneering innovative approaches to enhance cyber defence and resilience.

    The changing landscape: a call for vigilance

    Recent findings from the Microsoft digital defence report have unveiled some alarming statistics. Human-operated ransomware attacks have surged by a staggering 200% and it’s not just large corporations that are in the crosshairs. Small and medium-sized businesses, with fewer than 500 employees, represent 70% of the organisations hit by these malicious attacks. Password-based attacks have also witnessed a significant spike, underscoring the need for organisations to adapt and prepare for the ever-evolving cyber threat landscape.

    NEC XON’s cybersecurity strategy foundation lies in the core principles of threat detection, response and anticipation. Our proactive approach to threat anticipation is the new frontier of defence, where we calibrate our readiness based on known vulnerabilities and observed attack techniques. This approach empowers us to reduce risk gradually while fostering business transformation and innovation.

    A real-world example

    Consider this scenario. Organisation A falls victim to a cyberattack due to a compromised credential used to access its customer infrastructure via VPN without multi-factor authentication (MFA).

    Threat anticipation is observing the attack tactics, going to all customers and partners and assisting them to enable MFA on VPN via a unified identity-centric strategy that is centrally controlled. Threat detection is detecting that there was an attempt to log into VPN via a compromised credential but was mitigated by MFA and additional controls applied as part of the identity-centric architecture.

    Threat Response is disabling the identity that was compromised, changing its password and limiting its ability to log into any business application, protecting business assets and maintaining cyber resilience.

    The role of cyber innovation

    In a landscape where cyber threats are prolific, the ability to innovate cyber strategy is crucial. We adopt an adversary-centric mentality, allowing us to view our customers’ organisations through the eyes of modern adversaries. By anticipating attack opportunities in the process of threat modelling and mapping them against current safeguards, we can pre-emptively strengthen defences. Here’s a cheat sheet with some key tactics to remember:

    Key tactics for cyber resilience

    • Map and reduce your perimeter: Identify and secure all potential entry points for adversaries, from VPNs to public-facing systems and login interfaces with no MFA.
    • Architecturally redesign your infrastructure: Implement network segmentation to limit lateral movement within your network and gain control over adversary pathways.
    • Adopt a unified and identity-centric approach: Strengthen identity and access management (IAM) solutions to ensure MFA across the entire network.
    • Reinforce privileged access control: Prioritise securing privileged access to seal off unauthorised pathways and closely monitor authorised access.
    • Prioritise basic cyber hygiene controls: Implement fundamental cyber hygiene practices, such as changing default credentials and reducing over-privileged users and groups.
    • Build a robust incident response plan: Prepare for cyber incidents with a well-defined response plan that includes communication, coordination and testing.
    • Use a vigorous XDR solution: Implement extended detection and response (XDR) to correlate signals from various security products and execute rapid threat response actions.
    • Maintain tested & isolated backups: Regularly back up critical data and applications, isolate them from the production environment and test their restoration.
    • Educate and guide the board of directors: Ensure that the board understands the evolving cyber risks and aligns cybersecurity investment with a defence-centric strategy.

    Cybersecurity is no longer just a matter of implementing security tools and services. It requires a holistic, proactive approach that incorporates threat anticipation, innovative thinking and a strong defence-centric strategy. NEC XON is at the forefront of this paradigm shift, leading the way in preparing for the cybersecurity challenges of tomorrow. In a world where cyber threats continue to evolve, our approach to threat anticipation is our first line of defence, ensuring that the pleasure of protection is all ours. 

    About NEC XON
    NEC XON is a leading African integrator of ICT solutions and part of NEC, a global Japanese firm. The company has operated in Africa since 1963 and delivers communications, energy, safety, security and digital solutions. It co-creates social value through innovation to help overcome serious societal challenges. The organisation operates in 54 African countries and has a footprint in 16 of them. Regional headquarters are located in South, East and West Africa. NEC XON is a level 1-certified broad-based black economic empowerment business. Learn more at www.nec.xon.co.za.

    • The author, Armand Kruger, is head of cybersecurity NEC XON
    • Read more articles by NEC XON on TechCentral
    • This promoted content was paid for by the party concerned


    Armand Kruger NEC XON
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleScientists detect oxygen on Venus
    Next Article A lot more Incredible for your business

    Related Posts

    NEC XON thwarts human-operated ransomware attack

    15 April 2025

    NEC makes history with first TIP Gold Badge for optical network software

    27 March 2025

    NEC XON achieves Palo Alto Networks Diamond Partner status

    4 March 2025
    Add A Comment

    Comments are closed.

    Company News

    The right laptop for the right job

    12 May 2025

    The ISP with the best Google and Hellopeter ratings

    12 May 2025

    Give your company more flex with the Voys Cloud PBX

    12 May 2025
    Opinion

    Solar panic? The truth about SSEG, fines and municipal rules

    14 April 2025

    Data protection must be crypto industry’s top priority

    9 April 2025

    ICT distributors must embrace innovation or risk irrelevance

    9 April 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.