Dive into our latest video series, where we illuminate key considerations for business leaders and cyber security professionals aiming to enhance their cyber security stance.
How do you stay safe when security defences are finite and unevenly distributed, and when compliance obligations raise the bar for security best practice?
As Cyber Security Awareness Month kicks off, Spark is doing its bit to ensure our customers are alert to today’s novel attacks and aware of their organisation’s weak links.
Watch our experts as they discuss the security issues they believe harry IT professionals by day and keep them awake at night.
Check out our cyber security series to learn more about what you can do to stay safe in an uncertain world.
Don’t let the allure of shiny new tech distract you from doing the basics well
AI will supercharge IT security capabilities, just as it will the efforts of cybercriminals. But as promising and potentially threatening – as this disruptive technology is, the real risk is when it distracts you from security tasks that matter now.
Josh Bahlman, Spark’s Group Chief Security and Information Officer – discusses the need to balance new technology with the basics to avoid presenting your organisation as “low hanging fruit” to bad actors.
Four tips to minimise supply chain risks
High-profile supply chain breaches underscore risks associated with third parties. When each of your vendors represents a branching tree of connections to other third parties, security threats can come from almost anywhere.
Megan Young, Spark’s Security Governance, Risk and Architecture Specialist – Supply chain management, offers four tips to help you toughen your supply chain against cyber-attacks.
Enforcing least privilege is instrumental to reducing security risk
Taking a fortress mentality to security is a slippery slope when sophisticated cyber threats skirt the edges, sizing up remote workers and cloud services.
While perimeter security still has its place, zero-trust architectures reorientate security to treat system access requests as if they came from an open network, providing a more adaptable and secure approach to protect sensitive data and resources.
Patric Balmer, Spark’s Managed Security Practice Lead discusses the mindset of continuous verification and the gradual adoption of security measures supporting this approach.
Good compliance is ongoing – not once a year
While compliance frameworks are necessary, ‘box ticking’ alone is no guarantee that your organisation and its data will remain secure.
Rather than implement security controls solely to comply with regulations, security leaders should consider security compliance as a by-product of good security by design.
Cherry Liwag, Spark’s Compliance Lead –, discusses why you shouldn’t view compliance as a barrier – but as a catalyst for scaling and fostering trust within your organisation.
He who defends everything defends nothing
- Frederick The Great of Prussia
Militarily speaking, you cannot defend every inch of ground or even a long front with a limited supply of troops. In other words, in attempting to defend everything you end up defending nothing effectively.
The principle also applies to IT security. When resources are stretched and the enemy keeps turning up in expected places, you can’t be everywhere or pre-empt everything.
Nyuk Loong Kiw, Spark’s Head of Security, discusses security priorities and the importance of safeguarding mission-critical information assets – your organisation's crown jewels.
Know yourself to protect yourself
Just as you can’t improve what you don’t measure, an organisation will struggle to stiffen its security defences without first understanding the integrity of its cyber security posture.
You’ve got to know what great looks like according to security best practice and how your organisation stacks up before opportunities to improve come clear.
Renee Mateparae, Spark’s Network and Operations Director –, lays out key questions company leaders should ask themselves to ensure they stay on the right track – and ahead of emerging threats.
There are no sure bets when it comes to IT security. But there’s still plenty you can do to improve the odds on keeping your systems and data out of harm’s way.
Put your security on the front foot with the company who knows what it takes to keep critical infrastructure and services safe, and big reputations intact.
We will use these details to connect you with a suitable business success manager across our group.