IT specialists

Practical information on keeping systems and data safe from attack.


How ransomware happens and how to stop it

Ransomware attacks are becoming increasingly common and sophisticated. This is how CERT NZ’s critical controls can help.


Critical Vulnerability in Palo Alto VPN

12 November 2021

cert nz resource pack tile robots


Be Cyber Smart

Cyber security threats are on the rise, so let’s Up our online defences.

2019 05 30 MTP 1764

Critical Controls

Multi-factor authentication and verification

You can authenticate with something you know, something you have, or something you are. Multi-factor authentication (MFA


Critical vulnerability in Windows’ Kerberos protocol

11 November 2021


Legacy systems

Legacy systems are systems that are no longer supported by the vendor, or systems that an organisation no longer maintai

CERT CAFE 180426 WEB 21


Remote working putting organisations at risk of ransomware

CERT NZ is urging Kiwi organisations to tighten up the way they enable remote working for staff to avoid a ransomware at

2 August 2021


Mobile device management

A mobile device is any portable device that can access and hold organisational data. It's important to secure these devi

nadia yousef


Spotlight on ransomware

CERT NZ Incident Response Manager Nadia Yousef provides an insight into ransomware and how organisations can protect the

16 July 2021

CERT TEC 180518 WEB 268

Critical Controls


Keeping your software up-to-date is one of the most simple and effective steps to take, to ensure your environment stays


Microsoft Exchange Autodiscover exposing credentials

24 September 2021

Michael Wallmannsberger


Don’t blame the IT crowd - cyber security is everyone’s concern

Cyber security incidents caused nearly $17m losses last year, but most organisations still see it as an 'IT problem'.

22 July 2021


Active scanning for VMware vCenter Vulnerability

23 September 2021


Traffic light protocol

The traffic light protocol (TLP) is a set of designations used to ensure that sensitive information is shared with the c