AISA 2018 conference review

Ahmed ElAshmawy from Axenic recently attended the Australian Information Security Association (AISA) conference – in our latest blog post he shares his experience and key insights.

Ahmed ElAshmawy – Axenic Principal Consultant

Read More

Graduate Enters the ‘Real World’

My name is Camille. I’m 23 years old and I recently graduated from Victoria University of Wellington with a Bachelor of Commerce with a Major in Information Systems.

I consider myself lucky that I got a ‘job job’ (a word I define as a job in the industry you spend years at university aspiring to get) shortly after university. I consider myself luckier that I got a job at Axenic. Information Security was always an interest of mine at university and I’m happy I chose to pursue it.

Read More


Axenic sponsors Karunai Illam Trust exhibit

Axenic staff Jim Shaw and Jo Coffey support a children’s home in India; Jim giving money, Jo gives time. Recently Jo approached Axenic’s General Manager, Terry Chapman, to support a photographic exhibition at The Mahara Gallery in Waikanae.

So, what is the story of the exhibition and why is Axenic keen to support this?

Read More

Cyber Smart Week – Practical Security

Getting the basics right

Getting practical security information and guidance shouldn’t be so hard. Unfortunately, sometimes it can feel that way. Yes, there may be times when you will need to bring in specialists to assist your business to meet its security needs, but there are many aspects of security which you can choose to do, even on the leanest of budgets.

Read More


Axenic to work with the NZ Government to improve information security

Axenic has been selected for the new ICT Security and Related Services (ICTSRS) panel to provide governance, risk and assurance services to the New Zealand Government.

Axenic has worked closely with the NZ Government Chief Information Officer (GCIO) over several years to improve NZ Agency security maturity. This has included contributing to the development of the GCIO risk management framework, the GCIO assurance framework and the Office 365 and Azure Risk Assessments. Read More

From Chaos to Conformance: 4 Context of the organisation

Information security is all about context!

In my previous two articles in this series focused on developing an Information Security Management System (ISMS) based on ISO 27001:2013, I presented the common myths associated with the standard. In this article, I am going to provide an overview of the standard and section 4 Context of the organisation.

Read More