IT specialists

Practical information on keeping systems and data safe from attack.

CERT TEC 180518 WEB 268

Critical Controls

Patching

Keeping your software up-to-date is one of the most simple and effective steps to take, to ensure your environment stays

Guide

Mobile device management

A mobile device is any portable device that can access and hold organisational data. It's important to secure these devi

CERT TEC 180518 WEB 245

Critical Controls

Implement and test backups

After an incident, restoring your data from backups is often the best way to return to business as usual. Performing and

Advisory

Critical vulnerabilities in Microsoft Windows Print Spooler service

2 July 2021

Guide

Traffic light protocol

The traffic light protocol (TLP) is a set of designations used to ensure that sensitive information is shared with the c

q1 2021 quarterly report card

News

Cyber security incidents continue to rise

CERT NZ’s latest report shows Kiwis reported more than 1,400 cyber security incidents from 1 January to 31 March.

3 June 2021

Guide

How to report a vulnerability

If you find a vulnerability in a service or product, you should report it to the individual or organisation (the 'vendor

Advisory

Vulnerability in Adobe Acrobat and Reader being actively exploited

12 May 2021

2019 05 16 MTP 0632

Critical Controls

Application allowlisting

Application allowlisting (otherwise known as whitelisting) is a method of strictly controlling what programs can be run

samoa cert

News

Cyber security strengthens in the Pacific with the launch of SamCERT

A partnership between New Zealand and Samoa has strengthened cyber security resilience in the Pacific with the establish

27 May 2021

Advisory

QNAP NAS vulnerabilities exploited to deploy ransomware

29 April 2021

CERT TEC 180518 WEB 83

Critical Controls

Principle of least privilege

The principle of least privilege means only having the access you need to do your job. Restricting the level access to o

Guide

Reporting a vulnerability to CERT NZ

A vulnerability is a weakness in software, hardware, or an online service. Vulnerabilities can be exploited to damage a

CERT TEC 180518 WEB 83 v2

Critical Controls

Centralised logging

Storing and securing your logs in a central place makes log analysis and alerting easier.

Advisory

Vulnerabilities in Apple operating systems reportedly being actively exploited

4 May 2021

CERT STREET 180621 WEB 1

News

Concerns over security increase as more people hit the online shops

Research shows that as more people are transacting online, concerns about the security of online shopping are on the min

29 April 2021