If 10,000 emails suddenly flooded your inbox, what would you do? Suddenly any real messages will be lost in the blitz of spam that’s overloading your screen. It is hard enough to delete all those messages, let alone filter out the genuine ones from the flood....
“GROUP-IB” are a Singapore-based cyber-security provider. They go deep into the cyber-crime sphere and it’s paid off. After 30+ attacks, and over $US30M stolen, “OPERA1ER” have been caught! They describe a bad actor who, from 2019, had...
The latest trend in phishing is pictures! It might be a thumb nail of a picture – a cute pet, interesting garden scene, or some other curiosity. It might be in the form of advertisement. Maybe it is offering a time sensitive, and urgent deal. It might even...
What can we learn from recent NZ cyber-events? What is real and what is hyperbole? Scroll down for the MFA revelation – it will surprise you! Introducing Campbell McKenzie from Incident Response, the team called in after cyber-events to help clean up and manage...
We’re excited about Copilot. It was announced a few weeks ago, Introducing Microsoft 365 Copilot – your copilot for work – The Official Microsoft Blog and promises to help us do what Microsoft call ‘the drudgery of work on tasks that zap our time, creativity and...
What is Microsoft Designer? If you have had fun with ChatGPT, (ChatGPT, write me a security policy in the theme of a country and western ballad) then you’ll love experimenting with Microsoft Designer. Like ChatGPT, designer brings AI to the desktop, in this case to...
Faced with a legacy practice management system coming towards end of support, Auckland city firm TBB tested the market and decided on partnering with Kinetics for the delivery of a replacement. Through the engagement, Kinetics has not only successfully migrated TBB to...
Did you know that, on average, 1.2 million Microsoft accounts get compromised every month? According to Microsoft, 99.9% of hacked accounts didn’t use MFA, and only 11% of all accounts have MFA enabled. The average cost of a ransomware security breach is...
The world is changing. Your company’s cyber security is increasingly under threat and the costs of mitigation are often unwelcome. The first question organisations need to ask is whether they are exposed, and to what level. All the available data from sources...
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.” – Combating Ransomware – A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force. The message we hear from...