COGITO BLOG

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices What is Active Directory? Active Directory is an Identity and Access Management tool (IAM) created by...

What is a Digital Certificate?

What is a digital certificate? A digital certificate is a tool much like a password. Digital certificates are used in PKI to validate the identity of machines, people and other network traffic. A digital certificate proves that you are who you say you are when...

COVID-19: The Biggest Cyber Security Risks Remote Workers Face

One of the key struggles we face under  the current COVID-19 crisis, is the mass instruction for staff to work from home. Organisations that were previously never equipped for WFH are now having to understand the cyber security risks remote workers face on an enormous...

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy, and how it works. This article will cover the practical implementation steps behind setting up a group policy. Group Policy is designed to make dealing...

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large. Cloud-based business solutions have become popular for offering less expense, less downtime, and often more security, with a...

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

Iranian Spear-Phishing Attacks Escalate amid Rising Tensions with U.S.

Recent reports of spear-phishing emails targeted at U.S Government agencies have fed into fears that offensive Iranian cyber-attacks could be increasing amid rising tensions between the Middle-Eastern country and the U.S. Earlier this month the Trump administration...

The Biggest Mistakes Businesses Make Using PKI

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

How to find and fix Vulnerable Certificates in your Network

1 in 5 unique IP addresses are still using the vulnerable SHA-1 certificate, according to research by machine identity protection agency Venafi.   There are multiples issues SSL certificates can be exposed to, including vulnerabilities from attacks like POODLE or...
Smiley face

Subscribe for the latest in Cyber Security News

@media screen and (max-width: 600px) { .col-25, .col-75, input[type=submit] { width: 100%; margin-top: 0; }

All Posts

What is a Digital Certificate?

What is a Digital Certificate?

What is a digital certificate? A digital certificate is a tool much like a password. Digital certificates are used in PKI to validate the identity of machines, people and other network traffic. A digital certificate proves that you are who you say you are when...

read more
COVID-19: The Biggest Cyber Security Risks Remote Workers Face

COVID-19: The Biggest Cyber Security Risks Remote Workers Face

One of the key struggles we face under  the current COVID-19 crisis, is the mass instruction for staff to work from home. Organisations that were previously never equipped for WFH are now having to understand the cyber security risks remote workers face on an enormous...

read more
Group Policy Best Practice

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy, and how it works. This article will cover the practical implementation steps behind setting up a group policy. Group Policy is designed to make dealing...

read more
Do you Need a Group Policy?

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

read more
Pros and Cons of Azure

Pros and Cons of Azure

Microsoft Azure is a cloud-based business solution designed for ease-of-access managment within organisations that scale from small to large. Cloud-based business solutions have become popular for offering less expense, less downtime, and often more security, with a...

read more
Data Compromise – What the AWS Engineer Leak can Teach us

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

read more
The Biggest Mistakes Businesses Make Using PKI

The Biggest Mistakes Businesses Make Using PKI

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

read more
How to find and fix Vulnerable Certificates in your Network

How to find and fix Vulnerable Certificates in your Network

1 in 5 unique IP addresses are still using the vulnerable SHA-1 certificate, according to research by machine identity protection agency Venafi.   There are multiples issues SSL certificates can be exposed to, including vulnerabilities from attacks like POODLE or...

read more
The Biggest Mistakes Businesses Make Using PKI

The Biggest Mistakes Businesses Make Using PKI

With the pervasive evolution of the IoT at our doorstep, PKI has become one of the fastest-growing cyber-security tactics in business and government today. PKI is used to create, manage, distribute, use, store and revoke digital certificates. The visible management of...

read more
Pros and Cons of Azure

Pros and Cons of Azure

Microsoft Azure is a cloud-based storage solution designed for ease-of-access management for organisations that scale from small to large.  There are several major players in cloud-storage solutions, Microsoft’s Azure is one of the largest. Like everything else, Azure...

read more
PKI – The Pros and Cons

PKI – The Pros and Cons

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

read more
Office 365 – The Good, the Bad, the Ugly

Office 365 – The Good, the Bad, the Ugly

Microsoft Office 365 is a cloud-based application used by many organisations and individuals to help streamline workflows and allow for team collaboration. For organisations in the digital age, every application has its upsides and its downsides. Cons of Office 365:...

read more
How to Combat the Cost of Cloud Computing for SME’s

How to Combat the Cost of Cloud Computing for SME’s

You know Cloud Computing is too expensive when even Mark Zuckerberg complains about it. "In our bio board meetings, one of the things we talk about is the cost of the compute, and our AWS bill, for example, is one of the specific points.” He stated. According to...

read more
Cogito Welcomes its Newest Regional Intern

Cogito Welcomes its Newest Regional Intern

In October 2019 Cogito welcomed its latest regional intern, Damian Bragg. Bragg comes to us from Wagga, after applying for the internship program online. Bragg found the internship to be an exciting opportunity as he had previously been awarded a Diploma and then...

read more
How to Set Up a Website (and make it secure)

How to Set Up a Website (and make it secure)

If you have a business you need a website, and with a website you need website security. This means you need to know how to set up a website for a business. When it comes to setting up a website for a business these days it's never been easier. Content Management...

read more
Common Mistakes Using PKI

Common Mistakes Using PKI

PKI management is an overarching set of security structures used by organisations to create secure management of websites and other online services. PKI can be difficult to manage correctly. We've compiled a list of some of the common mistakes using PKI you should...

read more

Cogito Announces the TeSA Network Access Engine

Today Cogito announces the deployment of the Technology Enabled Shared Accommodation capability in support of New Zealand Government. This project has sought to allow Government organisations to share buildings and services without having to be in the same security...

read more
Best Practices for Amazon Web Services

Best Practices for Amazon Web Services

Amazon Web Services is a business solution for cloud-based storage. Information that is both in transit and at rest needs to be protected from attackers and bad actors. Amazon Web Services is a global solution to the issue of cloud security. AWS offers analytics, web...

read more
Actsmart Business Recycling Program

Actsmart Business Recycling Program

Cogito Group is recognised as a business that is actively recycling and being environmentally responsible.  We contacted the Actsmart business recycling program to help us reduce costs, reduce impacts on the environment and meet corporate environmental commitments. We...

read more

Tell us what you would like to read about

REQUEST A SOLUTION

AU: +61 2 6140 4494

NZ: +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

 

Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Wellington | Washington DC

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you