People are the weakest link
This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’
It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn. Even worse, their settings were on ‘public’ not ‘private’
It’s a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our new KARE for Security S2 plan helps identify use of these sites in your organisation.
US Soldiers Accidentally Leaked Nuclear Weapons Secrets: Report (gizmodo.com)
Shadow IT
Shadow IT is one of the largest threats to data privacy in organisations today.
It’s not necessarily because these sites are going to be hacked, although that’s always possible, but just because if you don’t know the tools are in use, then there is no way that you can manage them!
The first step to maintaining this data is to identify it! That’s why you need new tools that are cloud focused. If you’re still using the same old security tools that you used to use prior to the cloud, then you are not keeping up and we need to talk!
SIM Swapping Hijacking Cybercrime defeats (some) Multifactor Authentication
Today, its absolutely vital that you have multi-factor authentication on every key website you access, especially banking ones. In some cases, the multi-factor response is by way of a SMS text message sent to your phone, that you then enter into the website. Imagine...
Top Microsoft Teams Tips to Keep Your Team Together
People are already feeling strain with the rapidly changing face of Covid-19. Stress and tensions are naturally high and for many organisations this could be first time they have asked people to work remotely for extended periods. It’s definitely not our New...
Making it Work When Working From Home
Working remotely can be invigorating from time to time, but there’s a reason why we don’t do it permanently. If we’re forced to work remotely for a long period, how do we overcome isolation effects? Working together in an office has a number of social benefits. You...
Get a free copy of our COVID19 Business Readiness Kit
In this kit,we’ll take a look at how you can effectively check your systems, processes, and people are ready for the impacts of COVID19. We’ll explore the key things you need to consider relating to: The tools you use and how...
Covid-19 (CoronaVirus) and your IT
No amount of AntiVirus software will help with this one! Whether this is a "Black Swan" event or not, it's certainly having an impact. As I write this, there are stories of panic buying of hand sanitiser and face masks at the local supermarkets. That means it's...
Google Chrome – Urgent Security Warning
Security Advisory – Google Chrome Google has reported a security issue in the Chrome browser. This issue is known to attackers and it is already being exploited by some. All versions of Chrome are affected. Google have released an update for...
Are you really at threat from Cyber-Crime? 2 trillion reasons to say YES.
In New Zealand, the National Cyber Security Centre (NZ Govt - https://www.ncsc.govt.nz/ reports they reduced harm in NZ by $27.7 million in 2018/19. We know that’s just the tip of the iceberg – most cyber crime still goes unreported and certainly doesn’t get stopped...
With yet another IT security warning from the NSA, we’re being asked “so what is best practice?”
Aligning with NIST.....? Is your Cybersecurity protection matching best practice? Clearly the cybersecurity stakes are higher. The security precautions that used to be reasonable are no longer enough. Stakeholders expect businesses to do more – whether it’s your...
What will the 20’s decade bring?
There’s a debate raging in our office as to whether the new decade begins this year, 2020, or next, 2021. Regardless, we can all agree on the vast change in everyday technology since 2010. It’s a great time to reflect on what we might see in the next ten years, using...
Is your Bluetooth safe?
Bluetooth has become ubiquitous. We use it to connect our phones, laptops, keyboards, mice, headphones, speakers, cars – more and more each day. Even watches now! It seems to have got easier, maybe because we’re so practised with it. Bluetooth is everywhere. ...








