top of page

News
Search
All Posts


How to Write an Executive Summary
The final outcome of most penetration tests is the report, and it is often the part dreaded most by the consultants carrying out the test. One part especially is frequently found difficult by many consultants but, with the right guidance, can actually be relatively straight forward. The Executive Summary. A-rated summary A pentest report is only as valuable as its first page. The executive summary is where decisions are made, it’s what boards, managers, and risk owners read f
5 days ago5 min read


Ransomware at the Airport
When major European airports ground to a halt in September 2025, the cause wasn't a storm, strike, or mechanical failure. It was...
Sep 235 min read


Security in CI/CD Pipelines
This guide covers the essential security checks every small team should use. Most of these tools are free or cheap, and they run...
Sep 1510 min read


Cloud Migration Security Risks for NZ SMEs
New Zealand's small and medium-sized enterprises (SMEs) are rapidly adopting cloud infrastructure for its flexibility and scalability....
Sep 18 min read


Cyber insurance in New Zealand: what insurers expect you to do to stay covered
Cyber insurance can save your business when you are dealing with ransomware and the related business interruption, privacy breaches, and...
Aug 256 min read


Security Vulnerabilities in Fortinet Products: Causes and Comparative Analysis
Why Fortinet Products Keep Appearing in Security Advisories Fortinet firewalls are everywhere, reportedly accounting for over half of all...
Aug 184 min read
The Difference Between a Vulnerability Scan, a Penetration Test, and a Red Team Exercise
If you're responsible for keeping your business secure, you've probably heard terms like vulnerability scan , penetration test (or...
Aug 149 min read


Ransomware: A Critical Cyber Security Threat to New Zealand Businesses
Ransomware has become the most dangerous cyber security threat facing New Zealand businesses today. CERT NZ's latest Q1 2025 report shows...
Aug 125 min read


Pen Testing Your Mobile Application (and Its API)
Mobile apps are everywhere. Whether it’s a banking app, a fitness tracker, or a marketplace for local goods, almost every New Zealand...
Aug 74 min read


MFA-Fatigue Attacks and MFA Guidance
In recent years cybercriminal groups have made headlines by systematically bypassing Multi-Factor Authentication (MFA), the security...
Aug 46 min read


A Quick Guide to Password Managers
The Password Problem That's Costing New Zealand Picture this: A cybercriminal needs just one weak password to potentially access your...
Aug 15 min read


Why Penetration Testing Matters for New Zealand Businesses in 2025
Cybersecurity threats are evolving rapidly, and New Zealand businesses are no longer flying under the radar. From SMEs to large...
Jul 283 min read


SharePoint “ToolShell” Vulnerability (CVE-2025-53770)
TL;DR This is a critical SharePoint server bug that lets attackers break in without authenticating and gain admin access to the system....
Jul 247 min read


What NZ Businesses Need to Know Before Deploying AI Chatbots
Generative AI chatbots are becoming a serious consideration for many New Zealand businesses. Whether it's to improve customer service,...
Jul 214 min read


Shorter SSL Certificate Lifespans Are Coming – What NZ Businesses Should Know
If you manage a website or IT services for a NZ business, there’s a big change coming. SSL/TLS certificates (those things that make your...
Jul 93 min read


Penetration Testing – An Ally for Your IT Support and Development Teams
Many Kiwi businesses assume their IT provider handles all aspects of security. But penetration testing , a specialised service performed...
Jul 83 min read


How Secure Is Your Business Wi-Fi?
Guest post from TheXero For many small and medium businesses, Wi-Fi is something that’s set up once and rarely thought about again, until...
Jul 44 min read


Scattered Spider: What NZ Small Businesses Need to Know
Scattered Spider Introduction Scattered Spider is a cybercrime group that has made headlines for high-profile attacks on companies across...
Jul 24 min read


Why Printer Vulnerabilities Are a Serious Business Risk
Sad printer Rapid7 recently disclosed multiple security vulnerabilities affecting a range of printers and multi-function devices from...
Jun 302 min read


Critical Citrix NetScaler Flaw (CVE-2025-5777) – What NZ Businesses Need to Know
Citrix NetScaler (formerly known as Citrix ADC) is widely used to provide secure remote access. A newly disclosed vulnerability in these...
Jun 254 min read
Let’s Work Together
Get in touch so we can start working together.
bottom of page
