top of page
Sep 6, 20222 min read
PHYSICAL SECURITY
Traditionally, protective security has had three ‘domains’ that combine to make up an organisation’s overall security posture. These...
Sep 2, 20224 min read
RISE OF DISINFORMATION
Disinformation has increasingly become a cybersecurity issue as large, coordinated disinformation campaigns compromise democratic...
Aug 23, 20223 min read
MOBILE SECURITY THREATS
SMARTPHONE HACKING Mobile security threats are on the rise. Mobile devices now account for more than 70% of digital fraud, ranging from...
Aug 11, 20225 min read
A Cyber Security Manifesto for 2022
InPhySec recently submitted to the government’s Cyber Security Advisory Committee. This is a summary of our submission. Its’s the money…...
Jun 10, 20214 min read
Microsoft Office and the catch 22
Ten steps to secure your office 365 environment Microsoft Office 365 often forms the heart of an enterprise’s operations, facilitating...
May 18, 20212 min read
To log or not to log?
Log story short, you only look for the log when it is needed, and by then it may have already rotted away (deleted). Log files are...
Mar 12, 20212 min read
How to prepare for Zero Day exploits
More than 30,000 servers worldwide have been affected following last week's Microsoft Exchange Server zero-days and more are being...
Oct 12, 20202 min read
Are your SMS messages secure?
Short messaging service (SMS), more commonly known as texting, has been around for nearly 30 years and is slowly fading out. This may be...
Sep 15, 20203 min read
Cyber attacks on the rise in New Zealand
Our New Zealand newswires have been busy of late with the rise of cyber attacks that have been hitting prominent New Zealand entities....
Sep 4, 20204 min read
What is a DDoS attack?
DDoS stands for Distributed Denial of Service. This attack has the same goal as a traditional Denial Of Service (DOS) attack which is to...
Aug 18, 20202 min read
Twitter's security breach, the truth from the myths
Twitter’s employees were the target of a social engineering scheme, resulting in confidential information being disclosed and attackers...
Aug 7, 20201 min read
Cloud + Threat Report Aug 2020 - Netskope
Netskope has released the latest edition of the Netskope Cloud and Threat Report, which reveals a massive shift in user behavior and...
Jul 30, 20202 min read
Security through the eyes of an Engineering student
Moving to New Zealand from Germany 10 years ago, I have grown to love this windy little capital. After graduating from College, I decided...
Jul 1, 20202 min read
How do we deal with Security Incidents?
A security incident can be a rough experience for any organisation, especially one that is not prepared. What is a Security Incident? To...
Jun 16, 20203 min read
Alert: Corporate double-tap ransomware on the rise
Over recent years there has been an alarming evolution in the ransomware scene. eCrime gangs have moved from targeting single endpoints...
May 26, 20201 min read
Are you Privacy Act ready?
Now that we are emerging from lockdown and heading to a new normal, it seems prudent to remind organisations that at some point the bill...
May 21, 20201 min read
2020 Verizon Data Breach Investigations Report
Attached below is the 2020 Verizon DBIR. We encourage you to read the full report however we've provided a brief summary as follows: Of...
May 11, 20203 min read
Worms: A slippery sabotager
A computer worm is a type of malware that spreads through self-replication and is focused on the lateral movement of an infected system...
May 4, 20203 min read
Is Anti-virus dead?
Last Century Anti Virus (AV) was designed last century to deal with last century malware. It is fair to say times have changed....
Apr 23, 20202 min read
Continuous Assurance is the future
Security Testing Security testing is a common security assurance tool that has been used for many years. Yet, despite countless expensive...
bottom of page