Cogito Group Blog

Why You Should Be Using a Password Manager

How many passwords do you need to remember? A 2017 survey by LastPass and a 2020 survey by NordPass revealed that, on average, we need to remember up to 100 passwords for our personal accounts, and 190 passwords for our work accounts.

Watch Our Latest Short Film

Do you know how easy it is to compromise common security controls?
Watch our latest short film ‘Complete Control’ to find out.

Best Browsers for Privacy

It’s no secret that Google loves our data, keeping track of what we click, search for, and scroll through. Google’s own browser, Chrome, is the first choice among desktop…

Pros and Cons of Amazon Web Services

Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions. If you’re looking for a…

Emerging Trends in Cyber Crime 2020

Cybercrime is the fastest growing crime across the US. And the global cost could exceed $6 trillion by 2021. These costs comprise damage to data, loss of money, and loss of personally identifiable information.  With the recent implementation of the GDPR, there has...

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.  Changes to the algorithm can impact websites and where they rank in...

Active Directory Security Best Practices

This article forms part 3 of our discussion on Group Policy. For articles 1 and 2 refer here: 1. Do you need a group policy? 2. Group policy best practices   What is Active Directory?   Active Directory is an Identity and Access Management tool (IAM) created by...

What is a Digital Certificate?

What is a Digital Certificate?   A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the identity of network traffic. A digital certificate proves that you are who you say you are when operating within a...

Cyber Security Risks when Working from Home

 Cyber security risks are more present given the COVID-19 crisis. We now face increased cyber security risks working from home. Even large banks like ANZ are sending workers home.   These new remote working landscapes cross through home networks and use new...

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article will cover the practical implementation of Group Policy best Practice.   Group Policy makes dealing with your operating...
Smiley face

Subscribe for the latest in Cyber Security News

@media screen and (max-width: 600px) { .col-25, .col-75, input[type=submit] { width: 100%; margin-top: 0; }

All Posts

Best Browsers for Privacy

Best Browsers for Privacy

It’s no secret that Google loves our data, keeping track of what we click, search for, and scroll through. Google’s own browser, Chrome, is the first choice among desktop…

read more
Pros and Cons of Amazon Web Services

Pros and Cons of Amazon Web Services

Next to Microsoft’s Azure, Amazon Web Services is one of the largest, most trusted, and most cost-effective cloud-based business solutions. If you’re looking for a…

read more
Google Algorithm Updates 2020

Google Algorithm Updates 2020

Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates...

read more
What is a Digital Certificate?

What is a Digital Certificate?

What is a Digital Certificate?   A digital certificate is a tool much like a password. In Public Key Infrastructure digital certificates confirm the...

read more
Group Policy Best Practice

Group Policy Best Practice

Group Policy Basics In part one of our discussion on Group Policy we covered some of the theory behind Group Policy and how it works. This article...

read more
Do you Need a Group Policy?

Do you Need a Group Policy?

This article forms part one of three articles which will discuss the importance of group policy for organisations, what Active Directory is, and how...

read more
Pros and Cons of Azure

Pros and Cons of Azure

Microsoft Azure is a cloud-based storage solution designed for ease-of-access management for organisations that scale from small to large.  There...

read more
PKI – The Pros and Cons

PKI – The Pros and Cons

PKI offers a higher standard of security for organisations than password authentication can. PKI, or public key infrastructure, uses Secure Shell to...

read more

Tell us what you would like to read about

Contact Us

Australia

1800 COGITO (264486)

or +61 2 6140 4494

New Zealand

0800 COGITO (264486)

or +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Washington DC | Wellington

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you