
infrastructure review
Misconfiguration is one of the most common and costly sources of cyber risk — yet often goes unnoticed until it's too late. This is especially true in busy, fast growing business’- moving quickly, making things work, but never quite getting back to securing the solution effectively.
In New Zealand, high-profile incidents involving data exposure, unauthorised access, or ransomware are frequently traced back to simple oversights:
Open ports or services left exposed to the internet
Incorrect cloud IAM or storage permissions
Overly permissive firewall rules
Legacy systems with default credentials or incomplete decommissioning
These aren’t exotic attacks, and they aren’t gard— they’re avoidable weaknesses in otherwise trusted systems that can be exposed via automated attacks.
Our Approach to Infrastcuture reviews
-
Let’s open all the cupboards.
We’ll find those long-forgotten Windows XP boxes, EC2 instances that were “definitely shut down last year,” firewall rules that say ALLOW ALL (because someone was in a rush), and shared admin accounts called “tempfixadmin2”.We check:
What’s exposed to the internet (intentionally or not)
Cloud resources that slipped through the cracks
Firewall and routing rules that don’t make sense anymore
Identity setups that give everyone access to everything, everywhere
-
We sift through the mess and tell you:
What’s actually risky (not just what looks scary)
What needs fixing now vs. what can wait
How attackers would likely get in (and what they'd find)
You'll get a clear, no-jargon summary and — if you want — something clean and professional enough for your board or leadership team.
-
We’re not just here to point fingers.
We help your team:Clean up configs without breaking production
Fix risky access patterns and exposed services
Document what’s fixed so it stays that way
We’ll even come back and check things are sticking — or keep an eye on things as part of an ongoing partnership.