
The bouncer at the door: Protecting your network from within
Network security is a lot like that. In a world obsessed with fending off cyber-monsters - phishing attacks, ransomware, and sophisticated malware - there's one lurking danger that's often overlooked: outdated network security hardware. If you've got a firewall or other IT equipment in your closet that's past its prime, it might be doing more harm than good. With neglect, what was once the critical gatekeeper (a/k/a Bouncer) guarding your business can become the hidden monster in your closet. Forget the Hollywood-style breaches; the real nightmare scenario comes from an unmonitored, unpatched IT stack running outdated firmware.
Who's watching your IT closet?
How well do you know the IT Bouncer in your closet? Do you know who's responsible for keeping it running at its prime? Are you using current technology that guards you against the latest attacks? For many businesses, the answer to these questions is a resounding "no." That neglected piece of hardware sitting in the back of the closet may once have been state-of-the-art. But if it's no longer supported by the manufacturer, it's a sitting duck for attackers who will be scanning the dark web, shopping for serial numbers of vulnerable devices.
End-of-life (EOL) hardware doesn't receive updates, patches, or security fixes. Attackers know exactly when a vendor stops supporting a device, and they actively exploit this knowledge. These out-of-date devices are often left connected to the internet, unwittingly providing a direct entry point for malicious actors.
The weakest link in the chain
Every business depends on its network to function, but a network is as strong as its weakest link. Unmanaged, EOL hardware can become the Achilles' heel of an otherwise robust IT security stack. Not having someone proactively paying attention to the security of your network can create a false sense of security – "but I have a Bouncer."
Take a firewall, for instance. Its primary job is to protect your network by filtering traffic, identifying threats, and enforcing security policies. But when it's no longer receiving firmware updates, it becomes increasingly ineffective. Over time, vulnerabilities pile up as cybercriminals develop zero-day exploits that target these known weaknesses.
It's not just firewalls. Switches, routers, and other network devices can also pose a risk when they reach EOL. Dated or unmanaged hardware leaves gaps in your defenses, making it easier for attackers to infiltrate your network, steal data, or disrupt your operations. The quick fix? Evaluate a managed service provider.
Why businesses hesitate
Despite these risks, many organizations delay upgrading their hardware. Why? Cost concerns: Upgrading network security hardware can seem expensive. Decision-makers often see it as a non-urgent expense, especially if the current system is still functioning.
Upgrading network security hardware can seem expensive. Decision-makers often see it as a non-urgent expense, especially if the current system is still functioning. Complexity: Replacing hardware can be daunting, requiring downtime, planning, and coordination between IT staff and vendors.
Replacing hardware can be daunting, requiring downtime, planning, and coordination between IT staff and vendors. Out of sight, out of Mind: Many organizations don't conduct regular IT audits, leaving outdated devices unnoticed in the back of a closet.
These reasons may feel valid in the short term, but the long-term consequences of inaction can be devastating. The primary objections/concerns that lead to neglect can be overcome by buying security as a service.
The real cost of ignoring EOL hardware
What happens when you ignore outdated hardware? The potential fallout includes: Data breaches: Attackers exploit vulnerabilities in EOL devices to steal sensitive customer or company data, leading to financial loss and reputational damage. Downtime: A successful attack can take your network offline, halting operations and costing you thousands - or even millions - in lost revenue. Non-compliance: Many industries have strict regulations regarding data security. Running unsupported hardware may violate compliance standards, leading to fines or legal trouble.
How to tackle the problem Leverage managed services – If managing your IT stack in-house feels overwhelming, consider outsourcing to a managed service provider (MSP). MSPs can monitor your devices, ensure firmware is up-to-date, and proactively replace hardware before it becomes a liability. Spend your money on service-oriented outcomes, not just products. Implement layered security – Upgrading your firewall is a great first step, but no single device can protect your network entirely. A layered security approach - including intrusion detection systems, endpoint protection, and robust user authentication - provides a more comprehensive defense. Get a comprehensive audit – Start by knowing all the hardware in your IT environment. Find a service provider who has tools to identify IT assets that have reached or are approaching end-of-life status. Don't just look at firewalls - include routers, switches, and even endpoint security devices. Develop a replacement plan – Once you've identified outdated hardware, work with your IT team or a trusted vendor to create a phased replacement plan. Prioritize devices that pose the greatest risk and allocate budget accordingly. Educate your team – Make sure everyone in your organization understands the importance of keeping IT hardware up to date. Cybersecurity isn't just an IT responsibility - it's a company-wide priority.
Proactive measures save money and headaches
Upgrading network security hardware may seem like an expensive undertaking, but it's far less costly than recovering from a data breach or dealing with regulatory penalties. Many service providers offer opex-based solutions as a monthly service, sparing you the often large and discouraging capex investments. Proactively replacing outdated devices keeps your network secure, your operations running smoothly, and your customers' trust intact.
Plus, newer hardware often comes with advanced features that improve performance and scalability, providing additional business value. For example, modern firewalls may include AI-powered threat detection or integrated VPN capabilities, offering greater protection and functionality than older models.
The risk is real - Don't wait to act
If you've been ignoring the IT stack in your closet, now is the time to act. The risks of running EOL hardware far outweigh the inconvenience of replacing it. Hackers are constantly evolving their tactics, and outdated devices make their job easier.
Don't let your business become a statistic. Schedule a hardware audit today and make a plan to stay ahead of EOL risks. Because when it comes to cybersecurity, prevention is always better than cure.
The monsters in your closet aren't imaginary - they're outdated network devices just waiting to be exploited. Protecting your organization starts with understanding the risks and taking proactive steps to address them. By replacing EOL hardware, you're not just upgrading your network - you're securing your future.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NZ Herald
a day ago
- NZ Herald
The NZ economy is still sick, doubts are growing about the Govt prescription
Are these the right antibiotics? Are the antibiotics making me feel sick? I do feel a little better I think. But it's taking longer than I expected. Maybe I should see the doctor again. Or am I just being impatient? Ugh, so much uncertainty. Hopefully, those who've tuned in for a fresh read on the state of the economy can see where this is going. Never let a metaphor go by, I say! Anyway, here's me and the New Zealand economy, both sick in the midst of a miserable wet winter and worrying about whether our recoveries have stalled. A run of negative data has knocked the wind out of the nation's sails. The bad vibes are being pushed along by a strong political current. Both the left and right are telling us that the Government has prescribed the wrong medicine. The left blames the Government for cutting spending into a downturn. The logic is pretty simple. Any good Keynesian will tell you, when demand in the private sector falls, that's the time for the Government to come to the party. Borrow a bit more, don't slash and burn civil service, hire more teachers and nurses, build more stuff ... it won't be inflationary because it won't be crowding out private sector competition, which is in recession. The trouble is, we're still in the aftermath of the last big spend-up, which went on too long. Labour's stimulus, once we got through the initial Covid shock, did clash with a private sector boom and exacerbated inflation. That muddied the political narrative. It made it inevitable that the incoming centre-right coalition would cut back despite the extra damage that would do to economic growth. In the context of using fiscal policy to drive economic prosperity, you can make a good case that successive governments have got things completely arse about face. You'd expect this argument from the left. But Christopher Luxon and Nicola Willis are being savaged even more aggressively from their right flank. The monetarists, the supply-side guys, the neo-liberals, (whatever you want to call them) are berating the Government for not dealing with the national debt and Crown deficit by administering a Rogernomics-style reboot of the whole economy. I doubt that would make the current downturn any more pleasant, but they argue it couldn't be much worse. And the payoff would be longer-term gains as the economy found a more productive and financially secure baseline. Both arguments can be compelling and, if nothing else, add to the concern that the current strategy of subtle market-oriented tweaks risks underdelivering on all sides. But through all of this gloom, one thing we need to remember is that most economists still believe the foundations of recovery are in place. Step back a bit from the mess of ugly recent economic data – the second quarter sucked, we get it! What are we actually experiencing? The labour market is tough. Unemployment is rising, and new job creation is almost non-existent. But this is not a surprise. In fact, while economists do get things wrong, they've been forecasting unemployment to be about where it is now for more than a year. We know it's one of the last pieces of data to turn in any recovery. Unfortunately, it is now overlapping with an unwanted and unexpected spike in inflation. Like a jump scare in the final scene of a horror movie, food prices (with rates and power, and insurance) have conspired to pause Reserve Bank rate cuts and rattled our faith in the recovery. Then there are tariffs and global unrest and all of that. It's not really surprising that it all feels bleak. So it's a bit ironic to be writing an optimistic take on the economy, especially given the rough week stuck at home that I've just had. My view wouldn't have been so upbeat if I hadn't been woken from my sick bed on Friday morning by a text from investment bank HSBC's Australian head of communications. He was asking how far away I was from my scheduled meeting with their global chief economist, Janet Henry and and Australia-New Zealand chief economist Paul Bloxham. Oops ... I was a long way away. But they kindly let me Zoom in later, and I'm very glad I did. As anyone with Australian cousins will know, sometimes it's healthy to be slapped in the face with a slightly condescending, external view of the New Zealand condition. Bloxham told me his forecasts currently make him one of the gloomiest economists on Australian growth. However, he's one of the most positive on New Zealand growth. Last year, New Zealand had the single largest contraction of any economy in the developed world, Bloxham points out. That inevitably comes with a hangover. But if you believe in the fundamentals of the New Zealand economy, which he does, there is no reason to assume the cycle won't turn. 'I suspect why I'm a little bit more upbeat than others is I sit in Sydney and watch it from the outside and go: hey, you've got two big forces at work that are set to continue to lift growth and give you a recovery.' No prizes for guessing those two forces – falling interest rates and booming agricultural commodity prices. The money flowing into the rural economy must eventually flow through to the cities and lift growth, Bloxham says. It won't happen overnight, but it will happen (my words, not his). We've had a big downswing, which means we're due a pretty big upswing to get back to trend, he says. And we've got monetary policy and the terms of trade in place to drive that cyclical upswing. 'All cycles look different. We always ask the same question going through: oh, it's not quite happening as quickly as we thought. 'The question you ask yourself is: is that because it's not working? Is it that interest rates aren't going to have the same effect? That a positive-terms-of-trade shock won't have the same effect? Or are things just a bit different this time around?' Great question. And look, the sun's finally out and I think my head's clearing. Time to go for a walk and ponder it all. Liam Dann is business editor-at-large for the New Zealand Herald. He is a senior writer and columnist, and also presents and produces videos and podcasts. He joined the Herald in 2003.


Techday NZ
3 days ago
- Techday NZ
The bouncer at the door: Protecting your network from within
Imagine for a few minutes that you are the owner of an exclusive club where business VIPs gather to share information and relax. And then assume that you hired the best security detail – a "Bouncer" – to stand at the door and ensure you know exactly who comes and goes and keeps everyone safe inside. Maybe picture some combination of Daniel Craig, Lucy Liu and Duane Johnson – that's your Bouncer. At first, you shower the Bouncer with praise and money for creating a secure environment that helps draw people. Now imagine that after a couple years, you take the Bouncer's presence and influence for granted, and you stop praising and paying. In time, the Bouncer is willing to trade entry for cash "tips" and eventually stops caring altogether who comes in and what happens when they get there. Neglect has turned your guardian into a hidden monster at your door. Network security is a lot like that. In a world obsessed with fending off cyber-monsters - phishing attacks, ransomware, and sophisticated malware - there's one lurking danger that's often overlooked: outdated network security hardware. If you've got a firewall or other IT equipment in your closet that's past its prime, it might be doing more harm than good. With neglect, what was once the critical gatekeeper (a/k/a Bouncer) guarding your business can become the hidden monster in your closet. Forget the Hollywood-style breaches; the real nightmare scenario comes from an unmonitored, unpatched IT stack running outdated firmware. Who's watching your IT closet? How well do you know the IT Bouncer in your closet? Do you know who's responsible for keeping it running at its prime? Are you using current technology that guards you against the latest attacks? For many businesses, the answer to these questions is a resounding "no." That neglected piece of hardware sitting in the back of the closet may once have been state-of-the-art. But if it's no longer supported by the manufacturer, it's a sitting duck for attackers who will be scanning the dark web, shopping for serial numbers of vulnerable devices. End-of-life (EOL) hardware doesn't receive updates, patches, or security fixes. Attackers know exactly when a vendor stops supporting a device, and they actively exploit this knowledge. These out-of-date devices are often left connected to the internet, unwittingly providing a direct entry point for malicious actors. The weakest link in the chain Every business depends on its network to function, but a network is as strong as its weakest link. Unmanaged, EOL hardware can become the Achilles' heel of an otherwise robust IT security stack. Not having someone proactively paying attention to the security of your network can create a false sense of security – "but I have a Bouncer." Take a firewall, for instance. Its primary job is to protect your network by filtering traffic, identifying threats, and enforcing security policies. But when it's no longer receiving firmware updates, it becomes increasingly ineffective. Over time, vulnerabilities pile up as cybercriminals develop zero-day exploits that target these known weaknesses. It's not just firewalls. Switches, routers, and other network devices can also pose a risk when they reach EOL. Dated or unmanaged hardware leaves gaps in your defenses, making it easier for attackers to infiltrate your network, steal data, or disrupt your operations. The quick fix? Evaluate a managed service provider. Why businesses hesitate Despite these risks, many organizations delay upgrading their hardware. Why? Cost concerns: Upgrading network security hardware can seem expensive. Decision-makers often see it as a non-urgent expense, especially if the current system is still functioning. Upgrading network security hardware can seem expensive. Decision-makers often see it as a non-urgent expense, especially if the current system is still functioning. Complexity: Replacing hardware can be daunting, requiring downtime, planning, and coordination between IT staff and vendors. Replacing hardware can be daunting, requiring downtime, planning, and coordination between IT staff and vendors. Out of sight, out of Mind: Many organizations don't conduct regular IT audits, leaving outdated devices unnoticed in the back of a closet. These reasons may feel valid in the short term, but the long-term consequences of inaction can be devastating. The primary objections/concerns that lead to neglect can be overcome by buying security as a service. The real cost of ignoring EOL hardware What happens when you ignore outdated hardware? The potential fallout includes: Data breaches: Attackers exploit vulnerabilities in EOL devices to steal sensitive customer or company data, leading to financial loss and reputational damage. Downtime: A successful attack can take your network offline, halting operations and costing you thousands - or even millions - in lost revenue. Non-compliance: Many industries have strict regulations regarding data security. Running unsupported hardware may violate compliance standards, leading to fines or legal trouble. How to tackle the problem Leverage managed services – If managing your IT stack in-house feels overwhelming, consider outsourcing to a managed service provider (MSP). MSPs can monitor your devices, ensure firmware is up-to-date, and proactively replace hardware before it becomes a liability. Spend your money on service-oriented outcomes, not just products. Implement layered security – Upgrading your firewall is a great first step, but no single device can protect your network entirely. A layered security approach - including intrusion detection systems, endpoint protection, and robust user authentication - provides a more comprehensive defense. Get a comprehensive audit – Start by knowing all the hardware in your IT environment. Find a service provider who has tools to identify IT assets that have reached or are approaching end-of-life status. Don't just look at firewalls - include routers, switches, and even endpoint security devices. Develop a replacement plan – Once you've identified outdated hardware, work with your IT team or a trusted vendor to create a phased replacement plan. Prioritize devices that pose the greatest risk and allocate budget accordingly. Educate your team – Make sure everyone in your organization understands the importance of keeping IT hardware up to date. Cybersecurity isn't just an IT responsibility - it's a company-wide priority. Proactive measures save money and headaches Upgrading network security hardware may seem like an expensive undertaking, but it's far less costly than recovering from a data breach or dealing with regulatory penalties. Many service providers offer opex-based solutions as a monthly service, sparing you the often large and discouraging capex investments. Proactively replacing outdated devices keeps your network secure, your operations running smoothly, and your customers' trust intact. Plus, newer hardware often comes with advanced features that improve performance and scalability, providing additional business value. For example, modern firewalls may include AI-powered threat detection or integrated VPN capabilities, offering greater protection and functionality than older models. The risk is real - Don't wait to act If you've been ignoring the IT stack in your closet, now is the time to act. The risks of running EOL hardware far outweigh the inconvenience of replacing it. Hackers are constantly evolving their tactics, and outdated devices make their job easier. Don't let your business become a statistic. Schedule a hardware audit today and make a plan to stay ahead of EOL risks. Because when it comes to cybersecurity, prevention is always better than cure. The monsters in your closet aren't imaginary - they're outdated network devices just waiting to be exploited. Protecting your organization starts with understanding the risks and taking proactive steps to address them. By replacing EOL hardware, you're not just upgrading your network - you're securing your future.


Techday NZ
4 days ago
- Techday NZ
Cyber scams soar in New Zealand as AI & crypto drive threats
Gen's latest threat report for the second quarter of 2025 details a significant surge in cyber threats ranging from cryptocurrency scams to sextortion and data breaches across both global and New Zealand contexts. The analysis, compiled by Gen's team of cybersecurity researchers, recorded a substantial year-on-year increase in scams and malicious activity, suggesting that both criminal tactics and the scale of potential harm are evolving, largely fuelled by economic pressure and the availability of AI-powered tools. Crypto scams and economic uncertainty According to Gen, crypto scams have become an area of particular concern, with blocked attacks rising from thousands to millions within a few short months. The reported increase was 69,508% globally, with New Zealand experiencing an even sharper uptick of 77,721%, markedly above the worldwide average. "This quarter's global trends reveal a troubling surge in cyber threats, from AI-powered ransomware to cryptocurrency scams and sextortion," said Mark Gorrie, Managing Director APAC for Gen Digital. "With the rise of AI and widespread data breaches, scams have become faster, more personalised, and harder to spot. New Zealand is not immune to these trends." Gorrie added, "In a weaker economy, people facing financial uncertainty are increasingly drawn to quick fixes like crypto, creating fertile ground for scammers to exploit." Sextortion and personalisation The report highlights a 170% rise in sextortion scams within New Zealand during Q2/2025, compared to a 100% global increase. New Zealand now ranks 19th on Gen's list of the top 20 countries most at risk of sextortion. This list spans a diverse range of affected countries, including Japan, Czechia, Singapore, and South Africa. Sextortion scams typically involve criminals threatening to release compromising content unless a ransom, often in cryptocurrency, is paid. Recent tactics reportedly include the use of personal data harvested from major breaches, along with the manipulation of services such as Google Maps to make threats appear more credible and invasive. Attackers have used actual names, addresses, and email addresses to heighten victims' anxiety and pressure them into complying with demands. Facebook and technical support scams Elsewhere, the report identified a significant rise in scams exploiting social media. Worldwide, 14% of blocked Facebook-related threats in Q2/2025 were tied to so-called Technical Support Scams. These frequently present as fake Messenger-style pages that attempt to lock browsers and prompt users to call fraudulent help lines, leveraging Facebook's global reach and advertising platform for scalability. Push notifications and phishing In New Zealand, there was a 278% rise in malicious push notifications during the quarter. These deceptive pop-ups, often disguised as system alerts or video players, direct users to phishing websites or trigger unwanted downloads. The tactic is being increasingly employed to lure users into scams or malware installations. "Scammers are counting on panic clicks; they exploit the split second where you react before you think. And that single click can take a person straight to a scammer's doorstep," Gorrie explained. "If an alert feels aggressive or off, trust your instincts and double-check through your antivirus software directly, and avoid giving notification permissions to untrusted websites." AI involvement and ransomware Gen also revealed that Q2/2025 saw the takedown of the first known ransomware strain built with the assistance of generative AI. The malware, named FunkSec, managed to encrypt data and demand payment, but Gen's research team was able to discover a cryptographic flaw and, in coordination with law enforcement, help victims restore their files without payment using a free decryptor issued by Avast. Since this intervention, there has been no reported activity from the FunkSec group. Other key findings The global threat landscape continues to expand, as highlighted by a 21% rise in data breach events, and almost a 16% increase in breached email addresses. The report also notes that financial scams climbed by 340% and that small businesses continue to be vulnerable to infostealers, exploits, and remote access attacks. Of particular concern is the resurgence of older threats such as DealPly adware in markets including the United States, Brazil, France, and India. Malvertising and various scam types - especially phishing, generic scams, and e-shop or dating scams - ranked among New Zealand's top threats for the quarter. Remote access attacks grew by 62% and malicious push notifications spiked by 317% globally, indicating a broadening portfolio of tactics used by cybercriminals. Efforts to counter these risks are ongoing, with Gen's researchers continuing to collaborate on threat mitigation tools and public awareness campaigns.