Blogs
Check out our Blogs below and stay up to date via our LinkedIn page.
Your first 90 days with PTAAS – metrics, rituals, and realising value
By Larissa Kolver, Head of Cyber Security at Securecom. Connect ticketing and chat, fast-path retests, and track KPIs like critical fix lead time to realise value within 90 days.
Selecting and onboarding a PTAAS partner
By Larissa Kolver, Head of Cyber Security at Securecom. Lock in cadence, SLAs, privacy-safe terms, and a 90 day onboarding that delivers early value and audit-ready evidence.
How to evaluate security testing providers without checkbox security
By Larissa Kolver, Head of Cyber Security at Securecom. Separate checkbox scanning from real testing. Use NIST 800-115 and OWASP, demand exploit narratives, SLAs, and DevSecOps integration.
How to Build a PTAAS Business Case
By Larissa Kolver, Head of Cyber Security at Securecom. Show execs how continuous testing cuts risk and cost. Use KPIs like time-to-first-report and critical fix lead time.
Why Annual Penetration Tests Are Failing
By Larissa Kolver, Head of Cyber Security at Securecom. Annual penetration tests can’t keep up with rapid cloud, SaaS, and AI-driven change. Learn why NZ organisations face widening risk gaps and achieve continuous assurance that meets privacy obligations.
Assess Windows 11 Readiness with HP WXP
Is Your Business Ready for Windows 11? Evaluate with HP Workplace Experience (WXP)? With the end of support for Windows 10 approaching in October 2025, now is the time for New Zealand businesses to evaluate their readiness to transition to Windows 11.
Four hidden M365 vulnerabilities that could be costing your business
Microsoft 365 (M365) powers millions of businesses worldwide and widely adopted in New Zealand. But beneath the surface of everyday productivity lies a network of potential vulnerabilities that most organisations never discover until it’s too late. At Securecom, we conduct M365 health checks across New Zealand businesses. Time and again, we uncover the same hidden issues that drain budgets, expose data, and frustrate users.
When cloud costs grow beyond your control
You started with the best intentions. Microsoft 365 was going to streamline collaboration, reduce email headaches, and give your team the modern tools they needed. Simple subscription, predictable costs, everyone happy. Fast forward eighteen months, and your cloud bill tells a very different story. If this sounds familiar, you’re not alone. We’ve worked with dozens of Kiwi organisations facing the same challenge.
Maximising ROI from Your Data Protection Investment: Best Practices for the First 90 Days
By Steve Snook, Cloud CTO at Securecom. I’ve led and supported countless data protection rollouts, and one truth remains consistent—the first 90 days make or break your return on investment. It’s in this critical window that momentum is either built or lost, and where the gap between expectation and execution starts to show.
From Selection to Implementation: Ensuring a Smooth Transition to Your New Data Recovery Solution
By Steve Snook, Cloud CTO at Securecom. Selecting the right data recovery solution is only half the battle. Over my 20 years in the industry, I’ve seen too many promising platforms fall short—not because the technology wasn’t sound, but because the implementation was rushed, poorly scoped, or lacked the right internal champions.
Evaluating Modern Data Protection Solutions: A Framework for New Zealand Enterprises
By Steve Snook, Cloud CTO at Securecom. After two decades in IT, I’ve seen data protection evolve from tapes in a cupboard to complex, hybrid-cloud solutions spanning multiple platforms. But with more choice has come more confusion. Vendors promise the world, acronyms fly, and decision-makers are left trying to compare apples with oranges—all while the risk of data loss keeps growing.
Building a Business Case for Unified Data Recovery: Metrics That Matter to the C-Suite
By Steve Snook, Cloud CTO at Securecom. Over the past 20 years working across infrastructure, cloud, and cybersecurity, one lesson stands out – technical excellence alone doesn’t get buy-in from the top. For CIOs, CTOs, and CFOs, every decision needs to be anchored in clear business outcomes.
The Hidden Risks of Fragmented Data Recovery in Multi-Cloud Environments
By Steve Snook, Cloud CTO at Securecom. I’ve been in the trenches of backup and recovery for two decades, and one thing still amazes me – how casually backups are treated. Backups are like insurance; they can save you when disaster strikes or they’re an afterthought until the disaster has struck.












