Avoiding Subscription Bombs

If 10,000 emails suddenly flooded your inbox, what would you do? Suddenly any real messages will be lost in the blitz of spam that’s overloading your screen.  It is hard enough to delete all those messages, let alone filter out the genuine ones from the flood....

Gotcha!

“GROUP-IB” are a Singapore-based cyber-security provider.   They go deep into the cyber-crime sphere and it’s paid off. After 30+ attacks, and over $US30M stolen, “OPERA1ER” have been caught! They describe a bad actor who, from 2019, had...

Look before you click

The latest trend in phishing is pictures! It might be a thumb nail of a picture – a cute pet, interesting garden scene, or some other curiosity. It might be in the form of advertisement.   Maybe it is offering a time sensitive, and urgent deal.   It might even...

REWATCH Cyber Lessons from the field.

What can we learn from recent NZ cyber-events? What is real and what is hyperbole? Scroll down for the MFA revelation – it will surprise you! Introducing Campbell McKenzie from Incident Response, the team called in after cyber-events to help clean up and manage...

Get ready for your AI Copilot

We’re excited about Copilot. It was announced a few weeks ago, Introducing Microsoft 365 Copilot – your copilot for work – The Official Microsoft Blog and promises to help us do what Microsoft call ‘the drudgery of work on tasks that zap our time, creativity and...

Free AI images: Have you tried Microsoft Designer yet?

What is Microsoft Designer? If you have had fun with ChatGPT, (ChatGPT, write me a security policy in the theme of a country and western ballad) then you’ll love experimenting with Microsoft Designer. Like ChatGPT, designer brings AI to the desktop, in this case to...

What level of cyber-security is right for my organisation?

The world is changing. Your company’s cyber security is increasingly under threat and the costs of mitigation are often unwelcome. The first question organisations need to ask is whether they are exposed, and to what level. All the available data from sources...

How many of these 10 layers of cyber protection do you use?

“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.” – Combating Ransomware – A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force. The message we hear from...