InPhySec.png
  • Home

  • About

  • Services

  • People

  • Partners

  • Careers

  • Education

  • Blog

  • Contact

  • More

    Use tab to navigate through the menu items.
    A Cyber Security Manifesto for 2022
    • 3 days ago
    • 5 min

    A Cyber Security Manifesto for 2022

    InPhySec recently submitted to the government’s Cyber Security Advisory Committee. This is a summary of our submission. Its’s the money…...
    Microsoft Office and the catch 22
    • Jun 10, 2021
    • 4 min

    Microsoft Office and the catch 22

    Ten steps to secure your office 365 environment Microsoft Office 365 often forms the heart of an enterprise’s operations, facilitating...
    To log or not to log?
    • May 18, 2021
    • 2 min

    To log or not to log?

    Log story short, you only look for the log when it is needed, and by then it may have already rotted away (deleted). Log files are...
    How to prepare for Zero Day exploits
    • Mar 12, 2021
    • 2 min

    How to prepare for Zero Day exploits

    More than 30,000 servers worldwide have been affected following last week's Microsoft Exchange Server zero-days and more are being...
    Are your SMS messages secure?
    • Oct 12, 2020
    • 2 min

    Are your SMS messages secure?

    Short messaging service (SMS), more commonly known as texting, has been around for nearly 30 years and is slowly fading out. This may be...
    Cyber attacks on the rise in New Zealand
    • Sep 15, 2020
    • 3 min

    Cyber attacks on the rise in New Zealand

    Our New Zealand newswires have been busy of late with the rise of cyber attacks that have been hitting prominent New Zealand entities....
    What is a DDoS attack?
    • Sep 4, 2020
    • 4 min

    What is a DDoS attack?

    DDoS stands for Distributed Denial of Service. This attack has the same goal as a traditional Denial Of Service (DOS) attack which is to...
    Twitter's security breach, the truth from the myths
    • Aug 18, 2020
    • 2 min

    Twitter's security breach, the truth from the myths

    Twitter’s employees were the target of a social engineering scheme, resulting in confidential information being disclosed and attackers...
    Cloud + Threat Report Aug 2020 - Netskope
    • Aug 7, 2020
    • 1 min

    Cloud + Threat Report Aug 2020 - Netskope

    Netskope has released the latest edition of the Netskope Cloud and Threat Report, which reveals a massive shift in user behavior and...
    Security through the eyes of an Engineering student
    • Jul 30, 2020
    • 2 min

    Security through the eyes of an Engineering student

    Moving to New Zealand from Germany 10 years ago, I have grown to love this windy little capital. After graduating from College, I decided...
    How do we deal with Security Incidents?
    • Jul 1, 2020
    • 2 min

    How do we deal with Security Incidents?

    A security incident can be a rough experience for any organisation, especially one that is not prepared. What is a Security Incident? To...
    Alert:  Corporate double-tap ransomware on the rise
    • Jun 16, 2020
    • 3 min

    Alert: Corporate double-tap ransomware on the rise

    Over recent years there has been an alarming evolution in the ransomware scene. eCrime gangs have moved from targeting single endpoints...
    Are you Privacy Act ready?
    • May 26, 2020
    • 1 min

    Are you Privacy Act ready?

    Now that we are emerging from lockdown and heading to a new normal, it seems prudent to remind organisations that at some point the bill...
    2020 Verizon Data Breach Investigations Report
    • May 21, 2020
    • 1 min

    2020 Verizon Data Breach Investigations Report

    Attached below is the 2020 Verizon DBIR. We encourage you to read the full report however we've provided a brief summary as follows: Of...
    Worms: A slippery sabotager
    • May 11, 2020
    • 3 min

    Worms: A slippery sabotager

    A computer worm is a type of malware that spreads through self-replication and is focused on the lateral movement of an infected system...
    Is Anti-virus dead?
    • May 4, 2020
    • 3 min

    Is Anti-virus dead?

    Last Century Anti Virus (AV) was designed last century to deal with last century malware. It is fair to say times have changed....
    Continuous Assurance is the future
    • Apr 23, 2020
    • 2 min

    Continuous Assurance is the future

    Security Testing Security testing is a common security assurance tool that has been used for many years. Yet, despite countless expensive...
    Zoom and Cloud Application best practice
    • Apr 23, 2020
    • 3 min

    Zoom and Cloud Application best practice

    The American digital conferencing solution company Zoom has recently experienced a major upsurge of popularity in its offerings due to...
    Cryptojacking
    • Apr 23, 2020
    • 4 min

    Cryptojacking

    The Aim of cryptojacking is to use victims’ machines to mine crypto on behalf of the hacker. There are two main ways to do this, 1)...

    0800 463 673 (NZ)

    +64 27 554 9243 (Aus, UK)

    security@inphysec.co.nz

    • YouTube

    ©2020 by InPhySec.