Cogito Group Blog

Best Browsers for Privacy

It’s no secret that Google loves our data, keeping track of what we click, search for, and scroll through.   Google’s own browser, Chrome, is the first choice among desktop users. According to Gartner, personal data archives are the biggest area for privacy risks. For...

Pros and Cons of Amazon Web Services

Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions.  If you're looking for a cloud-based business solution, we've compiled a list of the pros and cons of Amazon Web Services. But...

Emerging Trends in Cyber Crime 2020

Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information.  With the recent implementation of the GDPR, there has...

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.  Changes to the algorithm can impact websites and where they rank in...

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices   What is Active Directory?   Active Directory is an Identity and Access Management tool (IAM) created by...

What is a Digital Certificate?

What is a Digital Certificate?   A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the identity of network traffic. A digital certificate proves that you are who you say you are when operating within a...

Cyber Security Risks when Working from Home

 Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home.   These new remote working landscapes cross through home networks and use new...

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice.   Group Policy makes dealing with your operating...

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

Pros and Cons of Microsoft Azure

This post will weigh up the pros and cons of Microsoft Azure. Azure is a cloud-storage business solution. Microsoft's Azure is one of the largest players in cloud-storage.   Cloud-based business solutions have become more popular in recent years. They offer less...
Smiley face

Subscribe for the latest in Cyber Security News

@media screen and (max-width: 600px) { .col-25, .col-75, input[type=submit] { width: 100%; margin-top: 0; }

All Posts

Cogito Announces the TeSA Network Access Engine

Today Cogito announces the deployment of the Technology Enabled Shared Accommodation capability in support of New Zealand Government. This project has sought to allow Government organisations to share buildings and services without having to be in the same security...

read more
Best Practices for Amazon Web Services

Best Practices for Amazon Web Services

Amazon Web Services is a business solution for cloud-based storage. Information that is both in transit and at rest needs to be protected from attackers and bad actors. Amazon Web Services is a global solution to the issue of cloud security. AWS offers analytics, web...

read more
Actsmart Business Recycling Program

Actsmart Business Recycling Program

Cogito Group is recognised as a business that is actively recycling and being environmentally responsible.  We contacted the Actsmart business recycling program to help us reduce costs, reduce impacts on the environment and meet corporate environmental commitments. We...

read more
Cogito and Ionize announce strategic partnership

Cogito and Ionize announce strategic partnership

 Cogito Group and Ionize today announced a strategic partnership that will enable both companies to significantly strengthen the breadth and depth of their cyber security capabilities. Cogito Group and Ionize are both successful Australian cyber security companies...

read more
Five Computer Security Myths, Debunked

Five Computer Security Myths, Debunked

This article was first published by Alan Henry on LifeHacker.com on 21 February 2019, and has been adapted for publishing on the Cogito Ergo Sum Blog Some computer security myths and stories that keep getting passed around, even though they’re clearly not true. There...

read more
Cogito Group’s Holiday Wishlist

Cogito Group’s Holiday Wishlist

Thank you for your continuing support throughout 2018. Cogito Group will be out of office until: 2 January 2019 in Australia 3 January 2019 in New Zealand.Before we go want to share 4 wishes we have for Christmas to mitigate targeted cyber intrusions:1. Application...

read more
Success in the Australian Technologies Competition

Success in the Australian Technologies Competition

In May 2018, Cogito Group begun our Australian Technologies Competition journey, and in November 2018 we took home the top prize for Cyber Security. The Australian Technologies Competition is a nationally recognised program which celebrates Australian innovation....

read more
A Glance into Indonesia

A Glance into Indonesia

This November, Cogito Group visited Jakarta for the first time to showcase our capabilities to the Indonesian market. The visit centered around the IndoDefence Expo & Form - Indonesia's biggest Defence Industry event. IndoDefence, hosted by the Ministry of...

read more
Understanding Derived Credentials

Understanding Derived Credentials

This article was first published by Timothy Quinn on https://timothy-quinn.com on 18 July 2017 Derived Credentials are a relatively new concept, and I’ve found their name tends to cause some confusion as to what they actually are and do. In a nutshell? A derived...

read more
Seven Things You Didn’t Know About Jellyfish

Seven Things You Didn’t Know About Jellyfish

If you clicked on this post hoping to read about marine animals you may be in the wrong place, but stick around because you are about to learn 7 things about Cogito Group's cyber security software: Jellyfish. Instead of stinging you, our Jellyfish will prevent you...

read more

Six Simple Security Steps to Secure your Information

Protecting online resources and information is time consuming, arduous and (let’s face it) boring. But individual users, businesses and their employees can all takes small steps in their daily actions to solve information security concerns on a larger scale. Although...

read more
Cogito Group sponsor athlete to compete at Commonwealth Games

Cogito Group sponsor athlete to compete at Commonwealth Games

At Cogito Group, we understand the time and commitment it takes to achieve success. Passion is a key ingredient to accomplishing our goals and at Cogito Group we are not only passionate about our work in the IT industry, but also passionate about helping others...

read more
Keep cyber safe during the Commonwealth Games

Keep cyber safe during the Commonwealth Games

The countdown to the Commonwealth Games is on! Major sporting events like the Commonwealth Games draw attention from around the world and can be a prime target for cyber criminals.  There is likely to be an increase in scams and cybercrime related to the Commonwealth...

read more
The 55th National Export Awards

The 55th National Export Awards

The 55th Australian Export Awards took place in Canberra on 5th December 2017. Before the ceremony Cogito Group enjoyed a National Finalists’ Masterclass at Kurrajong Hotel.  This included a keynote presentation by Dr Michael Rosemann, Executive Director from QUT.  He...

read more

Tell us what you would like to read about

Contact Us

Australia

1800 COGITO (264486)

or +61 2 6140 4494

New Zealand

0800 COGITO (264486)

or +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington 

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you