top of page


PHYSICAL SECURITY
Traditionally, protective security has had three ‘domains’ that combine to make up an organisation’s overall security posture. These...
Sep 6, 20222 min read


RISE OF DISINFORMATION
Disinformation has increasingly become a cybersecurity issue as large, coordinated disinformation campaigns compromise democratic...
Sep 2, 20224 min read

MOBILE SECURITY THREATS
SMARTPHONE HACKING Mobile security threats are on the rise. Mobile devices now account for more than 70% of digital fraud, ranging from...
Aug 23, 20223 min read


A Cyber Security Manifesto for 2022
InPhySec recently submitted to the government’s Cyber Security Advisory Committee. This is a summary of our submission. Its’s the money…...
Aug 11, 20225 min read


Microsoft Office and the catch 22
Ten steps to secure your office 365 environment Microsoft Office 365 often forms the heart of an enterprise’s operations, facilitating...
Jun 10, 20214 min read


To log or not to log?
Log story short, you only look for the log when it is needed, and by then it may have already rotted away (deleted). Log files are...
May 18, 20212 min read


How to prepare for Zero Day exploits
More than 30,000 servers worldwide have been affected following last week's Microsoft Exchange Server zero-days and more are being...
Mar 12, 20212 min read


Are your SMS messages secure?
Short messaging service (SMS), more commonly known as texting, has been around for nearly 30 years and is slowly fading out. This may be...
Oct 12, 20202 min read


Cyber attacks on the rise in New Zealand
Our New Zealand newswires have been busy of late with the rise of cyber attacks that have been hitting prominent New Zealand entities....
Sep 15, 20203 min read


What is a DDoS attack?
DDoS stands for Distributed Denial of Service. This attack has the same goal as a traditional Denial Of Service (DOS) attack which is to...
Sep 4, 20204 min read


Twitter's security breach, the truth from the myths
Twitter’s employees were the target of a social engineering scheme, resulting in confidential information being disclosed and attackers...
Aug 18, 20202 min read

Cloud + Threat Report Aug 2020 - Netskope
Netskope has released the latest edition of the Netskope Cloud and Threat Report, which reveals a massive shift in user behavior and...
Aug 7, 20201 min read


Security through the eyes of an Engineering student
Moving to New Zealand from Germany 10 years ago, I have grown to love this windy little capital. After graduating from College, I decided...
Jul 30, 20202 min read


How do we deal with Security Incidents?
A security incident can be a rough experience for any organisation, especially one that is not prepared. What is a Security Incident? To...
Jul 1, 20202 min read


Alert: Corporate double-tap ransomware on the rise
Over recent years there has been an alarming evolution in the ransomware scene. eCrime gangs have moved from targeting single endpoints...
Jun 16, 20203 min read

Are you Privacy Act ready?
Now that we are emerging from lockdown and heading to a new normal, it seems prudent to remind organisations that at some point the bill...
May 26, 20201 min read

2020 Verizon Data Breach Investigations Report
Attached below is the 2020 Verizon DBIR. We encourage you to read the full report however we've provided a brief summary as follows: Of...
May 21, 20201 min read


Worms: A slippery sabotager
A computer worm is a type of malware that spreads through self-replication and is focused on the lateral movement of an infected system...
May 11, 20203 min read


Is Anti-virus dead?
Last Century Anti Virus (AV) was designed last century to deal with last century malware. It is fair to say times have changed....
May 4, 20203 min read


Continuous Assurance is the future
Security Testing Security testing is a common security assurance tool that has been used for many years. Yet, despite countless expensive...
Apr 23, 20202 min read
bottom of page