Jun 10, 20214 minMicrosoft Office and the catch 22Ten steps to secure your office 365 environment Microsoft Office 365 often forms the heart of an enterprise’s operations, facilitating...
May 18, 20212 minTo log or not to log?Log story short, you only look for the log when it is needed, and by then it may have already rotted away (deleted). Log files are...
Mar 11, 20212 minHow to prepare for Zero Day exploitsMore than 30,000 servers worldwide have been affected following last week's Microsoft Exchange Server zero-days and more are being...
Oct 12, 20202 minAre your SMS messages secure?Short messaging service (SMS), more commonly known as texting, has been around for nearly 30 years and is slowly fading out. This may be...
Sep 15, 20203 minCyber attacks on the rise in New ZealandOur New Zealand newswires have been busy of late with the rise of cyber attacks that have been hitting prominent New Zealand entities....
Sep 4, 20204 minWhat is a DDoS attack?DDoS stands for Distributed Denial of Service. This attack has the same goal as a traditional Denial Of Service (DOS) attack which is to...
Aug 17, 20202 minTwitter's security breach, the truth from the mythsTwitter’s employees were the target of a social engineering scheme, resulting in confidential information being disclosed and attackers...
Aug 7, 20201 minCloud + Threat Report Aug 2020 - NetskopeNetskope has released the latest edition of the Netskope Cloud and Threat Report, which reveals a massive shift in user behavior and...
Jul 30, 20202 minSecurity through the eyes of an Engineering studentMoving to New Zealand from Germany 10 years ago, I have grown to love this windy little capital. After graduating from College, I decided...
Jul 1, 20202 minHow do we deal with Security Incidents?A security incident can be a rough experience for any organisation, especially one that is not prepared. What is a Security Incident? To...
Jun 16, 20203 minAlert: Corporate double-tap ransomware on the riseOver recent years there has been an alarming evolution in the ransomware scene. eCrime gangs have moved from targeting single endpoints...
May 25, 20201 minAre you Privacy Act ready?Now that we are emerging from lockdown and heading to a new normal, it seems prudent to remind organisations that at some point the bill...
May 21, 20201 min2020 Verizon Data Breach Investigations ReportAttached below is the 2020 Verizon DBIR. We encourage you to read the full report however we've provided a brief summary as follows: Of...
May 11, 20203 minWorms: A slippery sabotagerA computer worm is a type of malware that spreads through self-replication and is focused on the lateral movement of an infected system...
May 4, 20203 minIs Anti-virus dead?Last Century Anti Virus (AV) was designed last century to deal with last century malware. It is fair to say times have changed....
Apr 22, 20202 minContinuous Assurance is the futureSecurity Testing Security testing is a common security assurance tool that has been used for many years. Yet, despite countless expensive...
Apr 22, 20203 minZoom and Cloud Application best practiceThe American digital conferencing solution company Zoom has recently experienced a major upsurge of popularity in its offerings due to...
Apr 22, 20204 minCryptojackingThe Aim of cryptojacking is to use victims’ machines to mine crypto on behalf of the hacker. There are two main ways to do this, 1)...