Our website uses cookies to give you the best experience and for us to analyse our site usage. If you continue to use our site, we will take it you are OK about this. Click on More for information about the cookies on our site and what you can do to opt out.

We respect your Do Not Track preference.

Viewing entries tagged with 'security'

Rodents and hackers Colin Trotter
29 September 2017

soxie2

I don’t usually converse in metaphors and analogies but bear with me as I liken hackers to rodents and discuss security in keeping both of them at bay.

Making privacy tick Sophie Richardson
5 July 2017

tick

How far can you trust a product or service with your personal information? Our office wants to create a way for consumers to know if they are using a service or product that will protect their privacy and personal information.

Breach Case 4: Testing with real data Neil Sanson
9 June 2017

test sign

Sometimes it seems a good idea to use real production data in a test environment. But doing so means security becomes even more important if you want to stop things going wrong.

Employee browsing is a no-no Abigail Vink
25 November 2016

employee browsing

Have you ever been tempted to search your company’s database for information about your colleagues’ pay, promotions, employment disputes or performance?  Or perhaps you have access to client databases which contain juicy information about customers’ purchase history and financial situation? Humans are inherently curious beings, but be aware that browsing other people’s private information is against the law.

Fancy Bears hack shows spear phishing threat Charles Mabbett
7 October 2016

fancy bear2

Nobody likes their health information being made public. But for Olympic athletes, this has become an occupational hazard as allegations of cheating and the use of performance-enhancing drugs are exchanged between those found to be guilty and those who are clean.

Making stronger passwords Charles Mabbett
5 July 2016

hulk by ablackinkartist d7vvbwf

If ‘open sesame’ was a password, just remember how in the tale of Ali Baba it didn’t work out so well for the 40 thieves and their treasure trove. Consider then how well an easy-to-guess password will protect yours.

GCSB director on surveillance, oversight and CORTEX Charles Mabbett
2 October 2015

Vincents 2

The GCSB does not undertake mass surveillance of New Zealanders. It was a message that the acting head of New Zealand’s foreign intelligence agency, Una Jagose, reiterated in Wellington this week, as well revealing details about the Bureau’s cyber-security work.

Customs, passwords and smartphones (oh my!) Tim Henwood
14 July 2015

passwords

There’s been a bit of murmuring on Twitter over the past couple of days because of this news story: