Derm Complex, Kijitonyama.
Dar es Salaam, Tanzania
ST: KK 737st, Kinunga II, Gikondo
Kigali City, Rwanda
Monday – Friday 8:00 am – 7:00 pm
Saturday & Sunday Closed
  • Home
  • Overview
    • About Us
    • Our team
    • Careers
  • Services
    • Cybersecurity Consulting
      • Security Assessments & analysis
      • Advisory & Managed Services
    • Infosec SupplySM
    • Infosec Academy ®
  • Industries
    • Banking, Financial services and Insurance
    • Law Enforcement
    • Telecom
    • Online Businesses
    • Government Departments
  • Blog
  • Contact
Site Logo
  • “SIAFU” Cyber Managed Prevent – Your Security, Our Responsibility!

    • February 14, 2025
    • Posted by: Henry Chrizostom
    • Category: Cyber security
    No Comments
    read more
  • Stay Ahead of Cyber Risks with Infosec Continuous Red Teaming (CRT)

    • February 6, 2025
    • Posted by: Henry Chrizostom
    • Category: Cyber security
    No Comments
    read more
  • Mitigating Risks: Protecting Your Organization’s Exposed Applications

    • July 2, 2024
    • Posted by: Henry Chrizostom
    • Categories: Cyber security, Technology Infrastructure
    No Comments

    Given their exposure to the Internet, applications face an increased number of attack vectors. These critical applications, now globally accessible, are frequently the primary target for cyber attackers, underscored by the paramount importance of their security.

    read more
  • Fortifying Your Infrastructure: Best Practices for Controlled Public Remote Access

    • April 13, 2024
    • Posted by: Henry Chrizostom
    • Category: Cyber security
    No Comments

    Protecting public remote access from cyber threats is a top priority for organizations. This article explores strategies for building strong security controls to safeguard your organization’s digital perimeter.

    read more
  • Securing Your Sensitive Information: The Power of Encryption

    • March 24, 2024
    • Posted by: Henry Chrizostom
    • Categories: Cyber security, Data Privacy
    No Comments

    In the current digital environment, safeguarding sensitive data has become a top priority. Data encryption during transmission and storage plays a critical role in protecting information against unauthorized access and cyber threats. Public Key Infrastructure (PKI), Transport Layer Security (TLS), and Virtual Private Networks (VPNs) are among the most essential tools used to achieve this objective.

    read more
  • Identity and Access Management (IAM)

    • March 10, 2024
    • Posted by: Henry Chrizostom
    • Category: Cyber security
    No Comments

    One mismanaged user can harm an organization. IAM involves continuous access reviews and proper access policies to prevent unauthorized access. It’s more than password management

    read more
  • Achieving Asset Intelligence: A Guide to Modern Asset Management and CMDB Programs

    • February 25, 2024
    • Posted by: infosec
    • Categories: Asset Management, Cyber security, Technology Infrastructure
    No Comments

    Going back to the basics, Asset Management builds a foundation for Technology security, Continuous Asset Intelligence in particular is essential for organizations looking to enhance their cyber security posture and protect their assets from evolving cyber threats.

    read more
  • The Tanzania Personal Data Protection Act (PDPA).

    • February 20, 2024
    • Posted by: infosec
    • Category: Data Privacy
    No Comments

    The PDPA, aims to protect personal data by setting out minimum requirements for its collection and processing.The act has principles addressing both privacy and security risks. Data governance and privacy aspects require organizational-wide separate programs considering all business processes.

    read more
  • Take full control of your networks with Network Access Control (NAC) Solution

    • December 8, 2023
    • Posted by: Henry Chrizostom
    • Category: Cyber security
    No Comments

    Network Access Control (NAC) solutions have emerged as a crucial tool for reinforcing network defences, enabling authorized access, and minimizing potential risks.

    read more
  • Social Engineering

    • October 18, 2023
    • Posted by: Henry Chrizostom
    • Category: Cyber security
    No Comments

    Social engineering is a dangerous threat that exploits human nature. These malicious attacks aim to deceive users and trick them into making security mistakes or giving away confidential information.

    read more

Infosec is a fully independent cybersecurity consultancy and training company Founded in 2016 by the industry’s top cybersecurity experts.

Links

  • Blog
  • Careers
  • Privacy Policy
  • Gallery
  • Feedback
  • Contact Us

Tanzania

  • 5th Floor, Derm Complex, Kijitonyama, New Bagamoyo Road.
    P.O.Box 7524, DSM, Tanzania
  • +255673240533
  • info@infosec.co.tz

Rwanda

  • ST: KK 737st, Kinunga II, Gikondo
    Kigali City, Rwanda
  • +250793762753
  • info@infosec.co.rw
��� 2025 INFOSEC all rights reserved. Designed by Dephics Company Limited.