Blogs
Check out our Blogs below and stay up to date via our LinkedIn page.
Beyond SASE Go-Live: Operating and Optimising a Modern, Secure Network in the AI Era
By Larissa Kolver, Head of Cyber Security at Securecom. As a security leader, I’ve seen too many organisations treat SASE as a destination rather than a journey. Celebrating ‘go-live’ is natural, but the real value and risk reduction happen in the operational lifecycle that follows.
How to de-risk your SASE decision with one accountable NZ provider
By Larissa Kolver, Head of Cyber Security at Securecom. Don’t let fragmented accountability undermine your investment. We explore how to de-risk your decision and eliminate the vendor “blame game” to ensure long-term success.
Evaluating modern network and security options without getting lost in SASE hype
By Rob Graham, Head of Networks at Securecom. Terms like SASE are everywhere, but differentiating a unified platform from a “stitched together” portfolio is difficult. Here is how to cut through the hype and define evaluation criteria that deliver real outcomes.
Building the business case to modernise your network with SASE
By Rob Graham, Head of Networks at Securecom. Once the operational pain of an ageing Wide Area Network (WAN) and security stack becomes clear, the conversation inevitably shifts from the technical to the financial.
Is your network holding the business back from AI, Cloud and Hybrid Work?
By Larissa Kolver, Head of Cyber Security at Securecom. If your team battles slow apps and clunky VPNs while you juggle security tool sprawl, your legacy network is likely the invisible hand holding you back.
What’s Possible with HP WXP: The Power of Proactive Device Management
Maximise Employee Productivity, Minimise IT Costs with HP Workforce Experience Platform. For most IT teams, the daily rhythm is familiar: respond to tickets, troubleshoot issues, and put out fires. It’s a cycle that feels productive but masks a deeper problem.
Your first 90 days with PTAAS – metrics, rituals, and realising value
By Larissa Kolver, Head of Cyber Security at Securecom. Connect ticketing and chat, fast-path retests, and track KPIs like critical fix lead time to realise value within 90 days.
Selecting and onboarding a PTAAS partner
By Larissa Kolver, Head of Cyber Security at Securecom. Lock in cadence, SLAs, privacy-safe terms, and a 90 day onboarding that delivers early value and audit-ready evidence.
How to evaluate security testing providers without checkbox security
By Larissa Kolver, Head of Cyber Security at Securecom. Separate checkbox scanning from real testing. Use NIST 800-115 and OWASP, demand exploit narratives, SLAs, and DevSecOps integration.
How to Build a PTAAS Business Case
By Larissa Kolver, Head of Cyber Security at Securecom. Show execs how continuous testing cuts risk and cost. Use KPIs like time-to-first-report and critical fix lead time.
Why Annual Penetration Tests Are Failing
By Larissa Kolver, Head of Cyber Security at Securecom. Annual penetration tests can’t keep up with rapid cloud, SaaS, and AI-driven change. Learn why NZ organisations face widening risk gaps and achieve continuous assurance that meets privacy obligations.
Assess Windows 11 Readiness with HP WXP
Is Your Business Ready for Windows 11? Evaluate with HP Workplace Experience (WXP)? With the end of support for Windows 10 approaching in October 2025, now is the time for New Zealand businesses to evaluate their readiness to transition to Windows 11.
Four hidden M365 vulnerabilities that could be costing your business
Microsoft 365 (M365) powers millions of businesses worldwide and widely adopted in New Zealand. But beneath the surface of everyday productivity lies a network of potential vulnerabilities that most organisations never discover until it’s too late. At Securecom, we conduct M365 health checks across New Zealand businesses. Time and again, we uncover the same hidden issues that drain budgets, expose data, and frustrate users.
When cloud costs grow beyond your control
You started with the best intentions. Microsoft 365 was going to streamline collaboration, reduce email headaches, and give your team the modern tools they needed. Simple subscription, predictable costs, everyone happy. Fast forward eighteen months, and your cloud bill tells a very different story. If this sounds familiar, you’re not alone. We’ve worked with dozens of Kiwi organisations facing the same challenge.
Maximising ROI from Your Data Protection Investment: Best Practices for the First 90 Days
By Steve Snook, Cloud CTO at Securecom. I’ve led and supported countless data protection rollouts, and one truth remains consistent—the first 90 days make or break your return on investment. It’s in this critical window that momentum is either built or lost, and where the gap between expectation and execution starts to show.
From Selection to Implementation: Ensuring a Smooth Transition to Your New Data Recovery Solution
By Steve Snook, Cloud CTO at Securecom. Selecting the right data recovery solution is only half the battle. Over my 20 years in the industry, I’ve seen too many promising platforms fall short—not because the technology wasn’t sound, but because the implementation was rushed, poorly scoped, or lacked the right internal champions.
Evaluating Modern Data Protection Solutions: A Framework for New Zealand Enterprises
By Steve Snook, Cloud CTO at Securecom. After two decades in IT, I’ve seen data protection evolve from tapes in a cupboard to complex, hybrid-cloud solutions spanning multiple platforms. But with more choice has come more confusion. Vendors promise the world, acronyms fly, and decision-makers are left trying to compare apples with oranges—all while the risk of data loss keeps growing.
Building a Business Case for Unified Data Recovery: Metrics That Matter to the C-Suite
By Steve Snook, Cloud CTO at Securecom. Over the past 20 years working across infrastructure, cloud, and cybersecurity, one lesson stands out – technical excellence alone doesn’t get buy-in from the top. For CIOs, CTOs, and CFOs, every decision needs to be anchored in clear business outcomes.
The Hidden Risks of Fragmented Data Recovery in Multi-Cloud Environments
By Steve Snook, Cloud CTO at Securecom. I’ve been in the trenches of backup and recovery for two decades, and one thing still amazes me – how casually backups are treated. Backups are like insurance; they can save you when disaster strikes or they’re an afterthought until the disaster has struck.


















