Cogito Group Blog

Best Browsers for Privacy

It’s no secret that Google loves our data, keeping track of what we click, search for, and scroll through.   Google’s own browser, Chrome, is the first choice among desktop users. According to Gartner, personal data archives are the biggest area for privacy risks. For...

Pros and Cons of Amazon Web Services

Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions.  If you're looking for a cloud-based business solution, we've compiled a list of the pros and cons of Amazon Web Services. But...

Emerging Trends in Cyber Crime 2020

Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information.  With the recent implementation of the GDPR, there has...

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.  Changes to the algorithm can impact websites and where they rank in...

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices   What is Active Directory?   Active Directory is an Identity and Access Management tool (IAM) created by...

What is a Digital Certificate?

What is a Digital Certificate?   A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the identity of network traffic. A digital certificate proves that you are who you say you are when operating within a...

Cyber Security Risks when Working from Home

 Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home.   These new remote working landscapes cross through home networks and use new...

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice.   Group Policy makes dealing with your operating...

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

Pros and Cons of Microsoft Azure

This post will weigh up the pros and cons of Microsoft Azure. Azure is a cloud-storage business solution. Microsoft's Azure is one of the largest players in cloud-storage.   Cloud-based business solutions have become more popular in recent years. They offer less...
Smiley face

Subscribe for the latest in Cyber Security News

@media screen and (max-width: 600px) { .col-25, .col-75, input[type=submit] { width: 100%; margin-top: 0; }

All Posts

Pros and Cons of Amazon Web Services

Pros and Cons of Amazon Web Services

Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions.  If you're looking for a cloud-based business solution, we've compiled a list of the pros and cons of Amazon Web Services. But...

read more
Emerging Trends in Cyber Crime 2020

Emerging Trends in Cyber Crime 2020

Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information.  With the recent implementation of the GDPR, there has...

read more
Google Algorithm Updates 2020

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.  Changes to the algorithm can impact websites and where they rank in...

read more
Active Directory Security Best Practices

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices   What is Active Directory?   Active Directory is an Identity and Access Management tool (IAM) created by...

read more
What is a Digital Certificate?

What is a Digital Certificate?

What is a Digital Certificate?   A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the identity of network traffic. A digital certificate proves that you are who you say you are when operating within a...

read more
Cyber Security Risks when Working from Home

Cyber Security Risks when Working from Home

 Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home.   These new remote working landscapes cross through home networks and use new...

read more
Group Policy Best Practice

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice.   Group Policy makes dealing with your operating...

read more
Do you Need a Group Policy?

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how to implement best practice for use of these services within an entity. What is Group Policy? Group Policy is a method...

read more
Pros and Cons of Microsoft Azure

Pros and Cons of Microsoft Azure

This post will weigh up the pros and cons of Microsoft Azure. Azure is a cloud-storage business solution. Microsoft's Azure is one of the largest players in cloud-storage.   Cloud-based business solutions have become more popular in recent years. They offer less...

read more
Data Compromise – What the AWS Engineer Leak can Teach us

Data Compromise – What the AWS Engineer Leak can Teach us

When an engineer working for AWS accidentally made almost a gigabyte worth of data public, resulting in a massive data compromise, it was Californian Cyber Security company Upguard that came to the rescue, contacting AWS to inform them of the breach. Greg Pollock,...

read more
How to find and fix Vulnerable Certificates in your Network

How to find and fix Vulnerable Certificates in your Network

1 in 5 unique IP addresses are still using the vulnerable SHA-1 certificate, according to research by machine identity protection agency Venafi.   There are multiples issues SSL certificates can be exposed to, including vulnerabilities from attacks like POODLE or...

read more
The Biggest Mistakes Businesses Make Using PKI

The Biggest Mistakes Businesses Make Using PKI

With the pervasive evolution of the IoT at our doorstep, PKI has become one of the fastest-growing cyber-security tactics in business and government today. PKI is used to create, manage, distribute, use, store and revoke digital certificates. The visible management of...

read more
Pros and Cons of Azure

Pros and Cons of Azure

Microsoft Azure is a cloud-based storage solution designed for ease-of-access management for organisations that scale from small to large.  There are several major players in cloud-storage solutions, Microsoft’s Azure is one of the largest. Like everything else, Azure...

read more
PKI – The Pros and Cons

PKI – The Pros and Cons

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to authenticate logons and privilege users accordingly. This added security allows for a safer transfer of information and...

read more
Office 365 – The Good, the Bad, the Ugly

Office 365 – The Good, the Bad, the Ugly

Microsoft Office 365 is a cloud-based application used by many organisations and individuals to help streamline workflows and allow for team collaboration. For organisations in the digital age, every application has its upsides and its downsides. Cons of Office 365:...

read more
How to Combat the Cost of Cloud Computing for SME’s

How to Combat the Cost of Cloud Computing for SME’s

You know Cloud Computing is too expensive when even Mark Zuckerberg complains about it. "In our bio board meetings, one of the things we talk about is the cost of the compute, and our AWS bill, for example, is one of the specific points.” He stated. According to...

read more
Cogito Welcomes its Newest Regional Intern

Cogito Welcomes its Newest Regional Intern

In October 2019 Cogito welcomed its latest regional intern, Damian Bragg. Bragg comes to us from Wagga, after applying for the internship program online. Bragg found the internship to be an exciting opportunity as he had previously been awarded a Diploma and then...

read more
How to Set Up a Website (and make it secure)

How to Set Up a Website (and make it secure)

If you have a business you need a website, and with a website you need website security. This means you need to know how to set up a website for a business. When it comes to setting up a website for a business these days it's never been easier. Content Management...

read more
Common Mistakes Using PKI

Common Mistakes Using PKI

PKI management is an overarching set of security structures used by organisations to create secure management of websites and other online services. PKI can be difficult to manage correctly. We've compiled a list of some of the common mistakes using PKI you should...

read more

Tell us what you would like to read about

Contact Us

Australia

1800 COGITO (264486)

or +61 2 6140 4494

New Zealand

0800 COGITO (264486)

or +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington 

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you