
ACT Announces Helena Roza As ACT Local Candidate For North Shore Ward
Helena cares passionately about the North Shore. A mother and entrepreneur with a background in journalism and television presenting, she co-founded a successful local business with her husband. She volunteers with Meals on Wheels and proudly supports Takapuna FC, where her husband plays goalkeeper.
She believes the current council is letting people down. Rates are rising year after year, yet core services are declining. Roads are crumbling, infrastructure is neglected, and small businesses are buried in red tape.
Instead of focusing on the basics, Council obsesses over climate targets, removes car parking, and pushes up parking fees, making everyday life harder for locals.
As a mother, business owner, and community advocate, Helena knows how to get things done. North Shore deserves fresh thinking, practical solutions, and representatives who actually listen. It's time to challenge the tired status quo and put ratepayers first, with a new generation of representatives: confident, capable, and connected to the people.
She says:
'I'll fight to keep rates affordable by cutting waste, not inventing new ways to tax people. Let's fix what's broken and build a council that works for the people—so our community can thrive.
'Mayor Wayne Brown is right to call out Auckland Transport. AT has lost touch—pushing overpriced projects and disruptive cycleways that only make traffic worse.
'Transport planning should work for the majority. We need better connections for drivers, tradies, and local businesses—not fewer lanes and more delays.' – Helena Roza
Earlier this year, ACT New Zealand announced it would be standing Common Sense Candidates for local government for the first time — after hearing from New Zealanders across the country who are sick of rising rates, ballooning budgets, and councils that ignore the basics while chasing ideological vanity projects.
Helena will also contest a seat on the Devonport-Takapuna Local Board.
When you vote ACT Local, you know what you're getting:
ACT Local Government spokesperson Cameron Luxton says:
' ACT Local candidates are community-minded Kiwis who've had enough of wasteful councils treating ratepayers like ATMs. It's time to take control on behalf of ratepayers — to restore accountability and deliver real value for money. ACT Local is about getting the basics right: maintaining roads, keeping streets clean, and respecting the people who pay the bills. Our candidates won't divide people by race or get distracted by climate vanity projects. They're here to serve, not lecture." – Cameron Luxton

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Scoop
29 minutes ago
- Scoop
Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web
Press Release – nWebbed Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. Thousands of leaked employee credentials from government departments, local banks and healthcare organisations are among more than 150 million compromised records tied to New Zealand accessible on the dark web, according to new research. The nWebbed NZ Cybersecurity Study, which analysed over 30 billion credentials available for sale on the dark web – a hidden part of the internet used as an illegal marketplace by criminals, has revealed an alarming level of vulnerability among Kiwi businesses, with compromised credentials linked to more than 198,000 New Zealand companies and entities. In addition, the usernames and passwords of more than 18,000 NZ Government workers, 3,200 banking staff and 2,000 healthcare organisation accounts with privileged access to sensitive information were also found in leaked databases on the dark web. The study analysed global breach records and cross-referenced them with local email domains to identify exposure. Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, which has built the world's fastest-growing database of dark web credentials, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. He says an urgent review of cybersecurity protocols, credential management systems and third-party access controls across the country's sensitive institutions and corporations is needed to secure exposed systems and protect the privacy of consumers whose personal data is at risk. 'We are seeing widespread exposure of compromised credentials linked to core parts of the New Zealand economy, including health providers, government agencies, banks and large-scale businesses. 'These are trusted institutions that Kiwis interact with every day, and they are real emails and passwords sitting in the wild. They're searchable, for sale and vulnerable to exploitation,' he says. Wendt says many breaches are going undetected for months or even years, and the data is still circulating. 'It's not that someone was hacked once and that's it. In many cases, credentials from five or six separate breaches are still sitting out there, waiting to be exploited,' he says. Wendt says New Zealand urgently needs to shift away from reactive cybersecurity practices. 'You can't wait for the ransom note to start caring about where your data ends up. We need a preventative model, and that starts with visibility. 'Most organisations are watching their perimeter, not what's already leaked. But if your staff credentials are out there, especially admin or technical roles, then attackers already have the keys,' he says. Wendt says their database is growing by 2 billion credentials each month as the global rate of breaches accelerates. He says in response to the volume of sensitive credentials available online, nWebbed has launched a new threat monitoring platform that uses artificial intelligence to help organisations close critical security gaps in real time, enabling businesses to act before data is weaponised. Wendt says the time between a data leak and active exploitation is narrowing, particularly for high-value targets. 'In some cases, we've seen attackers move within minutes of credentials appearing online. They're using automated tools to scan for executive logins, technical roles or access to critical systems. 'What starts as a single leaked password can escalate into a live intrusion before an organisation even realises there's been a breach,' he says. Wendt says part of the problem is cultural. 'There's still this assumption in New Zealand that cybercrime is something that happens to big overseas companies. But in reality, our companies are being targeted every day, often because we're seen as a soft entry point into larger international networks. 'Nearly half of the Fortune 500 companies worldwide have exposed employee credentials available online, and Kiwi companies are facing similar threats. Compromised credentials can be used to access corporate networks, bypass multi-factor authentication or launch phishing attacks,' he says. Wendt says too many companies rely on outdated risk assessments and miss critical external vulnerabilities. 'Even organisations with good internal cybersecurity practices are often shocked to discover what's floating around publicly. That includes old passwords, unpatched web portals or documents they thought were private. It's not about blaming anyone, it's about visibility,' he says. Wendt says the next step is to raise awareness and get more Kiwi companies treating external digital hygiene as seriously as they do internal firewalls. 'Most breaches happen because someone didn't know their login details were already out there. This is a solvable problem if you're willing to look,' he says.

1News
an hour ago
- 1News
Government forges ahead with foreshore and seabed law
The Government is forging ahead with plans to change the law governing New Zealand's foreshore and seabed, despite a Supreme Court ruling last year that appeared to undercut the rationale for the change. The proposed legislation stems from a clause in National's coalition deal with NZ First, which promised to revisit the Marine and Coastal Area (Takutai Moana) Act. That commitment was driven by fears that a 2023 Court of Appeal decision could have made it significantly easier for Māori groups to win recognition of customary rights over parts of the coastline. The Government introduced a bill to Parliament last year to prevent that, but it hit pause in December after the Supreme Court effectively overturned the earlier ruling. At the time, Justice Minister Paul Goldsmith welcomed the development and said ministers would take time to reassess their plans. ADVERTISEMENT On Tuesday, Goldsmith confirmed to RNZ that Cabinet had agreed to press ahead with the law change regardless and to pass it before October. "Everybody in New Zealand has an interest in what goes on in the coastline, and we're trying our best to get that balance right." Goldsmith said he was not convinced that last year's Supreme Court ruling had set a high enough test for judging whether customary rights should be granted. "We've had a couple of cases that have been decided since then - which have shown almost 100% of the coastline and those areas being granted customary marine title - which confirmed to us that the Supreme Court test still didn't achieve the balance that we think the legislation set out to achieve." Asked whether he expected an upswell of protest, Goldsmith said that had been an earlier concern but: "time will tell". "There's been a wide variety of views, some in favour, some against, but we think this is the right thing to do." The legislation was one of the key objections raised by Ngāpuhi leaders last year when they walked out on a meeting with Prime Minister Christopher Luxon in protest. ADVERTISEMENT More than 200 applications for customary marine title are making their way through the courts. Under the amendment bill, any court decisions issued after 25 July 2024, will need to be reconsidered. That would appear to cover seven cases, involving various iwi from around the country. "I understand their frustration over that," Goldsmith said. "But we believe it is very important to get this right, because it affects the whole of New Zealand." Goldsmith said the government had set aside about $15 million to cover the additional legal costs. The Marine and Coastal Area Act was originally passed by the National-led government in 2011, replacing the controversial Foreshore and Seabed Act 2004, which had extinguished Māori customary rights in favour of Crown ownership. The 2004 law, introduced by Helen Clark's Labour government, provoked widespread protest and led to the creation of the Māori Party, now known as Te Pāti Māori. National's 2011 replacement declared that no one owned the foreshore and seabed but allowed Māori groups to seek recognition of their rights - or "Customary Marine Title" - through the courts or in direct negotiations with the Crown. ADVERTISEMENT Customary title recognises exclusive Māori rights to parts of the foreshore and seabed, provided certain legal tests are met, including proving continuous and "exclusive" use of the area since 1840 without substantial interruption. The 2023 Court of Appeal ruling, however, declared that groups only needed to show they had enough control over the area that they could keep others from using it, and that situations where the law itself had prevented them from doing so could be ignored. The Supreme Court subsequently overturned that and said the Court of Appeal had taken an unduly narrow approach in its interpretation.


Scoop
an hour ago
- Scoop
Thousands Of Leaked NZ Govt And Health Agency Credentials On Dark Web
Thousands of leaked employee credentials from government departments, local banks and healthcare organisations are among more than 150 million compromised records tied to New Zealand accessible on the dark web, according to new research. The nWebbed NZ Cybersecurity Study, which analysed over 30 billion credentials available for sale on the dark web - a hidden part of the internet used as an illegal marketplace by criminals, has revealed an alarming level of vulnerability among Kiwi businesses, with compromised credentials linked to more than 198,000 New Zealand companies and entities. In addition, the usernames and passwords of more than 18,000 NZ Government workers, 3,200 banking staff and 2,000 healthcare organisation accounts with privileged access to sensitive information were also found in leaked databases on the dark web. The study analysed global breach records and cross-referenced them with local email domains to identify exposure. Julian Wendt, founder of Kiwi tech start-up nWebbed Intelligence, which has built the world's fastest-growing database of dark web credentials, says the findings show New Zealand organisations are underestimating the scale and frequency of cyber risk. He says an urgent review of cybersecurity protocols, credential management systems and third-party access controls across the country's sensitive institutions and corporations is needed to secure exposed systems and protect the privacy of consumers whose personal data is at risk. 'We are seeing widespread exposure of compromised credentials linked to core parts of the New Zealand economy, including health providers, government agencies, banks and large-scale businesses. 'These are trusted institutions that Kiwis interact with every day, and they are real emails and passwords sitting in the wild. They're searchable, for sale and vulnerable to exploitation,' he says. Wendt says many breaches are going undetected for months or even years, and the data is still circulating. 'It's not that someone was hacked once and that's it. In many cases, credentials from five or six separate breaches are still sitting out there, waiting to be exploited,' he says. Wendt says New Zealand urgently needs to shift away from reactive cybersecurity practices. 'You can't wait for the ransom note to start caring about where your data ends up. We need a preventative model, and that starts with visibility. 'Most organisations are watching their perimeter, not what's already leaked. But if your staff credentials are out there, especially admin or technical roles, then attackers already have the keys,' he says. Wendt says their database is growing by 2 billion credentials each month as the global rate of breaches accelerates. He says in response to the volume of sensitive credentials available online, nWebbed has launched a new threat monitoring platform that uses artificial intelligence to help organisations close critical security gaps in real time, enabling businesses to act before data is weaponised. Wendt says the time between a data leak and active exploitation is narrowing, particularly for high-value targets. 'In some cases, we've seen attackers move within minutes of credentials appearing online. They're using automated tools to scan for executive logins, technical roles or access to critical systems. 'What starts as a single leaked password can escalate into a live intrusion before an organisation even realises there's been a breach,' he says. Wendt says part of the problem is cultural. 'There's still this assumption in New Zealand that cybercrime is something that happens to big overseas companies. But in reality, our companies are being targeted every day, often because we're seen as a soft entry point into larger international networks. 'Nearly half of the Fortune 500 companies worldwide have exposed employee credentials available online, and Kiwi companies are facing similar threats. Compromised credentials can be used to access corporate networks, bypass multi-factor authentication or launch phishing attacks,' he says. Wendt says too many companies rely on outdated risk assessments and miss critical external vulnerabilities. 'Even organisations with good internal cybersecurity practices are often shocked to discover what's floating around publicly. That includes old passwords, unpatched web portals or documents they thought were private. It's not about blaming anyone, it's about visibility,' he says. Wendt says the next step is to raise awareness and get more Kiwi companies treating external digital hygiene as seriously as they do internal firewalls. 'Most breaches happen because someone didn't know their login details were already out there. This is a solvable problem if you're willing to look,' he says.