25 March 2025

Dr Tom Hartley

Taking a Risk to Talk About Risk When it comes to cybersecurity, one of the first things I’m often asked to do is perform a gap analysis. This helps businesses identify the areas in their security posture that need improvement. It’s a crucial step, but surprisingly, I often encounter a

Part 1: Deep fake Imagine seeing a video of a well-known CEO making outrageous statements, only to find out later it wasn’t real at all. That’s the power — and danger — of deep fake AI. This technology uses artificial intelligence to create highly convincing fake images, videos, and audio

A few years back, my friend Johnathan, who was working as a Principal Solution Architect for AWS, visited EIT to spend some time with our students. He told me about this new thing called Alexa for Business. What he told me was futuristic … imagine a CEO in a board

While you may or may not be aware of the CIA Triad, it is a well-known set of fundamental principles of information security – Confidentiality, Integrity, and Availability. It clearly defines the relationship between information and security. Confidentiality: Often considered the most fundamental principle of the CIA Triad, this involves

2024 marks the beginning of a new era, bidding farewell to an old friend – the humble password – and embracing passkeys as the innovative gatekeeper of our digital security. Say goodbye to the days of cumbersome passwords and welcome a secure, convenient, and seamless login experience. For years, passwords

Artificial Intelligence (AI) has emerged as one of the most transformative and revolutionary technologies in recent history. From its humble beginnings to its widespread applications today, AI has garnered significant attention for its potential benefits as well as the inherent threats it poses. Discussions and experiments in technology date back

Over the course of the last several years, we have seen three major events that forced us to reassess our business continuity and disaster recovery planning. The Christchurch earthquake of 2011 initiated a shift towards cloud technology in preparation for office access becoming more unpredictable. 2020’s COVID-19 pandemic solidified remote

2022 has seen two notable cybersecurity incidents: the significant data breach of the Pinnacle Midlands Health Network and the white-hat hacking of the Christchurch Hot Pools. While the Christchurch breach was downplayed as having been conducted by an “ethical hacker” intentionally identifying security vulnerabilities, the important takeaway in both

In past articles, we have looked at the four cores of managing cybersecurity – securing your people, your communications, your data, and your technology. This is achieved through awareness training, best-practice policies and procedures, and selective technologies. These are the foundational components that every business is expected to implement for

Every business, regardless of industry or size, is vulnerable to cybersecurity attack- that’s just a fact; your business is not immune. As of the writing of this article, there’s an uptick in attacks across New Zealand in both the retail and manufacturing sectors, businesses that normally would be considered low

Search

Like Us On Facebook

Recent posts

Verified by MonsterInsights