Problem Solved

We're continually using our technology expertise to solve challenging new business problems. Here are some examples of the innovative solutions we've delivered for clients along with tangible results. You'll find new solutions posted here regularly, so please check back often.

 

  • “Man in the Inbox” Phishing Attacks Highlight A Concerning Gap In Perimeter Technology Defences

    “Man in the Inbox” phishing attacks come from compromised email accounts. They look like someone from within a business, for example the HR director, sent an email directing employees to do something legitimate—like logging onto a fabricated page to read and agree to a corporate policy. When employees log on, the attackers harvest their credentials. These attacks are yet another example of increasingly sophisticated credential phishing. 

     <more>
  • What’s Next for Ransomware: Data Corruption, Exfiltration and Disruption

    Ransomware’s popularity continues to skyrocket, due to its successful business model and the significant profit paid by its victims. Unlike other malware business models – where attackers steal data and then sell it on the darknet; hackers who utilise ransomware as their attack vector receive payment directly from their victims. 

     <more>
  • Governance Over External File Sharing Is Key

    Enterprises today are moving faster than ever before. Product development cycles are shorter, supply chains are more connected and nimble, and with more and more data being generated, information is delivered more quickly than ever before. As a result, IT organisations find themselves scrambling like pit crews to keep business units performing with utmost speed and agility.

     <more>
  • Don’t Trust Others With Your Keys

    The recent Trustico SSL (Secure Sockets Layer) certificate and private key breach is certainly unique in the way it played out, but unfortunately, the SSL Certificate type of breach is not. The problems surrounding SSL and TLS (Trusted Layer Security) private key security for SSL/TLS certificates have already been experienced in the larger PKI space where the security of a single private key can impact the trust placed in thousands, if not millions, of certificates in use cases such as code signing, database encryption and the Internet of Things (IoT).

     <more>
  • When Your CA Migration Is Actually A CA Evacuation

    Does the Symantec SSL Certificate Distrust and your potential decision to evacuate from Symantec's CAs put you at risk?

     <more>
  • Phishing Identified As Most Concerning Security Threat In Two Local Reports

    Two recently released reports have highlighted that Phishing attacks continue to be a major threat and problem for organisations in New Zealand and Australia.

     <more>
  • Handling Incidents

    The hyper connected digital world presents some unique challenges for any organisation that needs to investigate issues concerning data breaches, malware outbreaks e.g. ransomware, or the misuse of organisational systems and data, that potentially could lead to legal and employment action. The use of mobile technology, Cloud services, increased levels of virtualised systems, combined with the ongoing use of traditional or legacy computer platforms, means investigations are becoming more complex.

     <more>
  • 300% Increase In Microsoft Cloud-based Attacks

    Early in August Microsoft released the latest version of their Security Intelligence Report (SIR) covering their findings for Q1 2017 period.

     <more>
  • Digital Transformation

    The term Digital Transformation (DT) represents different things to different organisations and business sectors. One definition of DT, courtesy of Cap Gemini, states Digital Transformation is the use of new digital technologies to enable major business improvements such as enhancing customer experience, streamlining operations, or creating new business models.

     <more>
  • Balancing IT Security and Productivity

    A recent US survey by Dimensional Research found that 72% of employees are willing to share “sensitive, confidential, or regulated company information”. Regulated information being classed as customer records in financial services and Patient Health Information (PHI) in healthcare.

     <more>
  • Securing Blurred Boundaries

    The uptake to date of Mobile and Cloud computing in New Zealand has been strong. On a global basis Gartner have predicted that by 2020, 80% of digital access will be shaped by non-PC architectures. IT spending, to the tune of $1 trillion, will be directly or indirectly affected by the shift to cloud over the next four years. In their view cloud computing is now one of the most disruptive forces of IT spending since the formation of the digital age.

     <more>
  • Taking a Different Approach to Endpoint Security

    In our last Problem Solved newsletter, We wrote about Endpoint Detection and Response technologies and highlighted that the vendors playing in this market segment omit to tell you in their literature that..

     

     <more>
  • Addressing Endpoint Security Challenges

    If you have oversight on cybersecurity controls such as signature based technology and antivirus you will be very aware that they are readily bypassed by targeted attacks using polymorphic malware payloads, file-less cyberattacks, malware toolkits and advanced persistent attackers.  Many organisations recognise and concede that the traditional anti-malware defences they have in place are failing and they need to evaluate new approaches and options.

     <more>
  • HTTPS – Uptake Set to Accelerate in 2017

    A recent Mozilla telemetry and Google transparency report shows that after 20 years, HTTPS is now being used more than HTTP. Growth in HTTPS usage has come from the large push to move to Always-On SSL or HTTPS Everywhere. Also helping drive this change are the browser players who require that only HTTPS be used for HTTP/2 deployments, and browser privileged services such as geolocation.

     <more>
  • Internet of Things

    In 2016 concerns about securing the Internet of Things for the future saw plenty of airtime and column centimetres devoted to it by industry commentators.  As 2016 ends IoT security appears to be featuring prominently for all the wrong reasons courtesy of some malicious code called Mirai.

     <more>
Our Solutions
Security Solutions

We work with leaders in the fields of data protection, authentication and perimeter security to protect your organisation and manage any threats with the most effective security systems. More >

Technical Services

MPA New Zealand Ltd provides a range of technical services to compliment the vendor technology our company brings to the local market. More >