Posts

Showing posts from August, 2025

Ransomware: A Critical Cyber Security Threat to New Zealand Businesses

Image
Ransomware has become the most dangerous cyber security threat facing New Zealand businesses today. CERT NZ's latest Q1 2025 report shows New Zealanders lost $7.8 million to cybercrime, which is a 14.7% increase from Q4 2024's $6.8 million. For small and medium enterprises (SMEs) across New Zealand, understa nding and preparing for this cyber security threat is not optional, it is essential for business survival. Ransomware encrypted files What is Ransomware? Ransomware is malicious software that locks you out of your own computer systems by encrypting all your files. Once your data is scrambled, cybercriminals demand payment, usually in cryptocurrency, for the key to unlock it. Think of it as digital kidnapping, but instead of a person, they are holding your entire business hostage. According to the National Cyber Security Centre (NCSC), most ransomware attacks begin with a single phishing email or compromised passwords. From there, criminals spread through your network, steal...

MFA-Fatigue and Guidance

Image
  In recent years cybercriminal groups have made headlines by systematically bypassing Multi-Factor Authentication (MFA), the security control that many New Zealand businesses rely on to protect their digital assets. One of the most notorious groups, Scattered Spider, has orchestrated high-profile breaches using a technique called MFA fatigue attacks. But their methods pose an equally serious threat to Kiwi businesses of all sizes. New Zealanders lost $6.8M to cybercrime in quarter 4 2024, up 24% from $5.5M in quarter 3, according to CERT NZ. This trend highlights why understanding and defending against advanced identity-based attacks like MFA fatigue has never been more critical for New Zealand organisations. What Are MFA-Fatigue Attacks and Why Should You Care? MFA-fatigue attacks exploit the human element by overwhelming users with authentication requests until they give in. The process is simple yet effective. Attackers first obtain legitimate usernames and passwords through ph...