Resources
Explore expert insights, case studies, news and more from Liverton Security.

Manage My Health Is Not an Outlier: Why Small Health Providers Are Being Targeted—and Why Email Is Still the Front Door
Latest News
See what’s happening at Liverton Security.

Liverton Security Implements Advanced Email Security Solution at Gill Jennings & Every LLP
Liverton Security, a leading provider of email security, announces the successful implementation of a new email filtering and threat management solution at Gill Jennings & Every LLP, one of Europe’s leading intellectual property firms.

Liverton Security Enhances Cyber Defenses for Innovation and Growth Leader Plexal
Liverton Security, a leading provider of SaaS-based cyber security solutions, is delighted to announce a new partnership with Plexal, a UK innovation and growth company driving national security progress, economic growth and social prosperity.
New Case Studies & Expert Insights
Deep dive into solutions and cybersecurity topics with our experts.

One of the biggest security risks in New Zealand isn’t technology. It’s misplaced responsibility
Many organisations assume cybersecurity is handled by their IT or network provider, but IT operations and security are not the same discipline. While firewalls, endpoint tools, and cloud controls are important, security fails when it becomes technology-led instead of risk-led. Real security requires governance, skilled people, and continual review—not just tools left to run on default settings. Without dedicated security leadership and maturity assessment, organisations can appear secure on paper while remaining exposed in practice.

Bridging Directly To Continuous Maturity Assessments
As organisations change, security often drifts out of alignment. Continuous maturity assessment helps identify weakening controls, workarounds, and emerging risks early—before they turn into incidents. It provides a practical way to keep security relevant, effective, and aligned with how a business operates as it evolves.

When NZ organisations get breached, the same question keeps coming up—"How did this happen when we were compliant?"
Compliance frameworks like NZISM, PSR, and the Privacy Act were never intended to be treated as annual checklists. Their underlying assumption is that controls operate continuously, risks are reviewed as environments change, and people actively protect information. When organisations treat compliance as a finish line, security drifts — and that gap between audits is where breaches occur. Real security maturity comes from ongoing assurance, not point-in-time compliance.

Why New Zealand’s Health Application Ecosystem Needs Security Baselines, Not Just Privacy Law
Privacy law plays a vital role in protecting patient information, but it does not define how that data must be secured. In New Zealand’s growing ecosystem of health applications, the absence of mandatory security baselines creates systemic risk across patient portals, practice management systems, and third-party services. Recent events have highlighted why privacy compliance alone is no longer enough to protect sensitive health data.

Complexity of Security (Part 1)
Security doesn’t fail because people don’t care—it fails when it’s too complex. With organisations juggling dozens of security tools, confusion has become a hidden vulnerability. Cybersecurity expert, Andrew Johnston, explains how over-engineered systems and technical language drive people to bypass security, and why simplicity—not more controls—is the key to building security that actually works.

Did They Lose Their Keys? A Black Box Pentest Adventure
Old code and forgotten API keys can create serious security risks. In this black box penetration test, a valid key was discovered in an abandoned repository—proving that attackers don’t always need malware or zero-days to gain access. Learn how simple oversights can open the door to sensitive data.