Ngā Aratohu Technical guides

Practical information on keeping systems and data safe from attack.

Guide

Individual Illustrations RGB MASTER 06

How ransomware happens and how to stop it

Ransomware attacks are becoming increasingly common and sophisticated. This is how CERT NZ’s critical controls can help.

Guide

Computer Security2x

Hardening RDP if you have to use it

Understanding why RDP is necessary and who needs access are important when hardening the RDP server. For example, if sta

Guide

Individual Illustrations RGB MASTER 19

Mitigating denial-of-service attacks

There are multiple ways to manage a denial-of-service (DoS) incident and the way you respond depends on the controls yo

Guide

Individual Illustrations RGB MASTER 06

Preparing for denial-of-service incidents

Denial-of-service (DoS) attacks aim to exhaust your resources and take your operations offline. They can have a signific

Guide

Individual Illustrations RGB MASTER 16

Mitigating the impact of incidents in M365

CERT NZ has seen a lot of phishing attacks on Microsoft 365, due to it being a commonly used cloud platform. A percentag

Guide

Individual Illustrations RGB MASTER 02

Communicating in a cyber security incident

When your business experiences a cyber security incident, it’s easy to forget that responding to the technical issue is

Guide

Individual Illustrations RGB MASTER 16

Securing access to Microsoft 365

We see a large number of Microsoft 365 (formally known as Office 365) branded phishing attacks, due to it being such a c

Guide

Individual Illustrations RGB MASTER 17

Manage authentication

Using a combination of authentication security controls can protect your organisation from a wide range of unauthorised

Guide

9769 CERT Macros icon 160px

Secure defaults for macros

While macros have a valid business function, they are often used by attackers too. Using secure default configurations w

Guide

Individual Illustrations RGB MASTER 09

Cloud-based identity providers and authentication

Using single sign-on with a large cloud identity provider allows your users to protect fewer passwords and your IT staff

Guide

Computer Security2x

How to report a vulnerability

If you find a vulnerability in a service or product, you should report it to the individual or organisation (the 'vendor

Guide

Individual Illustrations RGB MASTER 23

Mobile device management

A mobile device is any portable device that can access and hold organisational data. It's important to secure these devi