Cogito Group Blog
All Posts
Pros and Cons of Amazon Web Services
Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions. If you're looking for a cloud-based business solution, we've compiled a list of the pros and cons of Amazon Web Services. But...
Emerging Trends in Cyber Crime 2020
Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information. With the recent implementation of the GDPR, there has...
Google Algorithm Updates 2020
Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries. Changes to the algorithm can impact websites and where they rank in...
Active Directory Security Best Practices
This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices What is Active Directory? Active Directory is an Identity and Access Management tool (IAM) created by...
What is a Digital Certificate?
What is a Digital Certificate? A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the identity of network traffic. A digital certificate proves that you are who you say you are when operating within a...
Cyber Security Risks when Working from Home
Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home. These new remote working landscapes cross through home networks and use new...
Group Policy Best Practice
Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice. Group Policy makes dealing with your operating...
Do you Need a Group Policy?
This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...
Pros and Cons of Microsoft Azure
This post will weigh up the pros and cons of Microsoft Azure. Azure is a cloud-storage business solution. Microsoft's Azure is one of the largest players in cloud-storage. Cloud-based business solutions have become more popular in recent years. They offer less...
Data Compromise – What the AWS Engineer Leak can Teach us
When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...
Iranian Spear-Phishing Attacks Escalate amid Rising Tensions with U.S.
Recent reports of spear-phishing emails targeted at U.S Government agencies have fed into fears that offensive Iranian cyber-attacks could be increasing amid rising tensions between the Middle-Eastern country and the U.S. Earlier this month the Trump administration...
How to find and fix Vulnerable Certificates in your Network
1 in 5 unique IP addresses are still using the vulnerable SHA-1 certificate, according to research by machine identity protection agency Venafi. There are multiples issues SSL certificates can be exposed to, including vulnerabilities from attacks like POODLE or...
The Biggest Mistakes Businesses Make Using PKI
With the pervasive evolution of the IoT at our doorstep, PKI has become one of the fastest-growing cyber-security tactics in business and government today. PKI is used to create, manage, distribute, use, store and revoke digital certificates. The visible management of...
Pros and Cons of Azure
Microsoft Azure is a cloud-based storage solution designed for ease-of-access management for organisations that scale from small to large. There are several major players in cloud-storage solutions, Microsoft’s Azure is one of the largest. Like everything else, Azure...
PKI – The Pros and Cons
PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...
Office 365 – The Good, the Bad, the Ugly
Microsoft Office 365 is a cloud-based application used by many organisations and individuals to help streamline workflows and allow for team collaboration. For organisations in the digital age, every application has its upsides and its downsides. Cons of Office 365:...
How to Combat the Cost of Cloud Computing for SME’s
You know Cloud Computing is too expensive when even Mark Zuckerberg complains about it. "In our bio board meetings, one of the things we talk about is the cost of the compute, and our AWS bill, for example, is one of the specific points.” He stated. According to...
Cogito Welcomes its Newest Regional Intern
In October 2019 Cogito welcomed its latest regional intern, Damian Bragg. Bragg comes to us from Wagga, after applying for the internship program online. Bragg found the internship to be an exciting opportunity as he had previously been awarded a Diploma and then...
Cogito Group Announces Reserve Bank of New Zealand as a Client
Cogito Group is proud to announce a new client, the Reserve Bank of New Zealand. Cogito Group will provide ICT security services to the Reserve Bank of New Zealand, aiding in risk mitigation procedures, business enablement, and strengthening its overall security...
How to Set Up a Website (and make it secure)
If you have a business you need a website, and with a website you need website security. This means you need to know how to set up a website for a business. When it comes to setting up a website for a business these days it's never been easier. Content Management...
Common Mistakes Using PKI
PKI management is an overarching set of security structures used by organisations to create secure management of websites and other online services. PKI can be difficult to manage correctly. We've compiled a list of some of the common mistakes using PKI you should...
Tell us what you would like to read about
Contact Us

Australia
1800 COGITO (264486)
or +61 2 6140 4494
New Zealand
0800 COGITO (264486)
or +64 4909 7580
Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington