• Te tere na nia i te pahi matamua
  • A haere i ni'a i te mea faufaa roa a'e

Hi'opo'araa no te parururaa i ni'a i

Te tahi noa parau i ni'a i te itenati

  • Te fare
  • No ni'a ia tatou
  • A farerei mai ia matou
  • Api no te peniraa
  • Te mau hi'opo'araa no te parururaa i ni'a i te
  • Parururaa i te vai - maitai - raa o te tino
  • TE MAU NOTA
  • Faaite i te ma'imiraa
Huna i te ma'imiraa

Hi'opo'araa no te parururaa i ni'a i te tahua itenati

Does the US Government have a cyber security regime like the UK Government Cyber Essentials Certification??

Hi'opo'araa no te parururaa i ni'a i te tahua itenati · Atete 3, 2025 ·

The United States does not have a direct equivalent to the UK’s Cyber Essentials—a government-backed certification for basic cybersecurity hygiene—but it does have several programs and frameworks that serve similar purposes for different audiences and sectors.

Here’s how the US compares:


🇬🇧 UK Cyber Essentials (for comparison):

  • Audience: All UK businesses, especially SMEs and government suppliers.

  • Purpose: Basic, affordable certification to protect against common cyber threats.

  • Mandatory for: Many UK government contracts.


🇺🇸 US Alternatives / Comparable Programs:

1. NIST Cybersecurity Framework (NIST CSF)

  • Audience: All sectors (voluntary), especially critical infrastructure and private businesses.

  • Purpose: Provides a flexible structure to manage cybersecurity risk.

  • Comparison: Broader and more detailed than Cyber Essentials, but not a certification by itself.

2. CMMC (Cybersecurity Maturity Model Certification) 2.0

  • Audience: US Department of Defense (DoD) contractors.

  • Purpose: Assesses and certifies companies on their ability to protect Federal Contract Information (FCI) e Controlled Unclassified Information (CUI).

  • Comparison: More rigorous than Cyber Essentials, but focused on defense contractors.

3. Federal Risk and Authorization Management Program (FedRAMP)

  • Audience: Cloud service providers to the US federal government.

  • Purpose: Standardized approach to security assessments and authorizations.

  • Comparison: Focused on cloud, not general business cybersecurity.

4. Cyber Trust Mark (FCC) – NEW

  • Audience: Consumer Internet of Things (IoT) device manufacturers.

  • Purpose: Labels IoT devices that meet cybersecurity standards.

  • Comparison: Transparency-focused, not a full organizational certification.


Summary:

While the US lacks a universal, government-backed basic cybersecurity certification like Cyber Essentials, it has multiple sector-specific regimes that serve similar functions—especially for government contractors e critical infrastructure. Private companies often follow NIST CSF voluntarily or pursue third-party certifications like SOC 2, ISO/IEC 27001, e aore râ, CIS Controls compliance.

If you’re looking for something like Cyber Essentials for a US-based business, implementing NIST CSF and basic CIS Controls is a close equivalent in terms of practical guidance and protection from common threats.

Cyber Trust Mark

Hi'opo'araa no te parururaa i ni'a i te tahua itenati · Atete 2, 2025 ·

Te mau tamatamataraa i ni'a i te tahua itenati:

A Crucial Step in Modern Cyber Defense

In today’s digital landscape, website security testing is essential for organizations aiming to protect sensitive data and maintain user trust. This proactive process identifies vulnerabilities in web applications before malicious actors can exploit them. Website security testing typically involves vulnerability scanning, penetration testing, code reviews, and configuration assessments to ensure that web systems can withstand cyber threats.

Governments and industries worldwide recognize the importance of standardized cybersecurity frameworks. In the UK, the Cyber Essentials scheme provides a baseline for good cybersecurity hygiene. It helps organizations guard against common threats like phishing, malware, and password attacks. Achieving Cyber Essentials certification demonstrates a commitment to safeguarding data and systems—a critical factor for UK government suppliers.

In the United States, the Cyber Trust Mark is a new initiative developed by the Federal Communications Commission (FCC) to improve cybersecurity transparency in consumer Internet of Things (IoT) devices. While not specific to websites, this mark reflects the broader trend of public accountability in digital security and serves as a model for transparent cybersecurity standards.

For organizations working with the U.S. Department of Defense, CMMC 2.0 (Cybersecurity Maturity Model Certification) is the prevailing standard. It assesses contractors’ ability to protect Federal Contract Information (FCI) e Controlled Unclassified Information (CUI) through a tiered system of cybersecurity practices. CMMC 2.0 aligns more closely with the NIST SP 800-171 framework and includes three levels of certification, ranging from foundational to advanced cybersecurity requirements.

Additional certifications help build robust web security programs. The NIST Cybersecurity Framework (CSF) provides a flexible structure for managing and reducing cybersecurity risks. Professional certifications such as CISSP (Certified Information Systems Security Professional), CompTIA CySA+ (Cybersecurity Analyst), e CISA (Certified Information Systems Auditor) equip practitioners with the expertise to implement effective security testing, risk assessment, and mitigation strategies.

As cyber threats evolve, website security testing and gaining a Cyber Trust Mark must become a regular practice, not a one-time audit. Aligning with recognized frameworks and certifications strengthens an organization’s cyber resilience and builds trust with stakeholders in both the public and private sectors.

Cyber Essentials Plus Cost: Why It’s Worth the Investment for Your Business

Hi'opo'araa no te parururaa i ni'a i te tahua itenati · Atete 2, 2025 ·

Cyber Essentials Plus Cost: Why It’s Worth the Investment for Your Business

In today’s digital world, cyber threats are an ever-present danger. For businesses of all sizes, cyber security is not optional—it’s essential. One of the most trusted ways to demonstrate your company’s commitment to cyber security is by achieving Cyber Essentials Plus certification. But what does the Cyber Essentials Plus cost? What are the benefits? And why should businesses consider hiring a consultant to guide them through the process?

In this article, we’ll break down everything you need to know about Cyber Essentials Plus, its associated costs, and how a consultant can make the process smoother and more effective using a WordPress consultant


What Is Cyber Essentials Plus?

Cyber Essentials Plus is the more rigorous version of the UK government-backed Cyber Essentials certification scheme. Managed by the National Cyber Security Centre (NCSC), it helps organisations of all sizes protect themselves from a wide variety of the most common cyber attacks.

While the standard Cyber Essentials certification is based on a self-assessment questionnaire, Cyber Essentials Plus includes an in-depth technical audit conducted by a certified assessor. This includes vulnerability scans and testing of your systems to verify that your controls and cyber security policies are correctly implemented.


Why Is Cyber Essentials Plus Important?

Achieving Cyber Essentials Plus demonstrates to clients, partners, and stakeholders that your organisation takes cyber security seriously. It’s especially important for businesses working with government contracts or handling sensitive customer data.

Here are just a few of the key benefits:

1. Enhanced Protection Against Cyber Threats

Cyber Essentials Plus ensures your organisation is protected against up to 80% of the most common cyber threats, including phishing, malware, and ransomware attacks.

2. Builds Trust with Clients and Partners

Having Cyber Essentials Plus certification on your website or tender documents is a powerful signal that your company is secure, reliable, and compliant with government standards.

3. Mandatory for Government Contracts

If your business wants to bid on certain government contracts—particularly those involving sensitive or personal information—Cyber Essentials Plus is often a mandatory requirement.

4. Insurance and Legal Benefits

Certified organisations may benefit from lower cyber insurance premiums, and in some cases, it could even help with legal or regulatory defence in the event of a breach.

5. Demonstrates Proactive Risk Management

Certification shows that your business is proactive rather than reactive about cyber risks—something that increasingly matters to investors, suppliers, and customers.


Cyber Essentials Plus Cost Breakdown

Now let’s tackle the key question: what is the Cyber Essentials Plus cost?

The cost can vary depending on a range of factors including the size of your business, the number of devices and endpoints in use, the complexity of your IT infrastructure, and whether you choose to work with a consultant.

Here’s a rough breakdown of the typical costs:

Business Size Estimated Cost Range (Cyber Essentials Plus)
Micro (1–9 employees) £1,500 – £2,000
Small (10–49 employees) £2,000 – £3,000
Medium (50–249 employees) £3,000 – £5,000
Large (250+ employees) £5,000+

These prices generally include the certification audit, vulnerability scans, and assessor testing. Tera râ,, these figures do not include remedial work or preparation costs.

Additional Costs to Consider:

  • Gap analysis or pre-audit assessments
  • Remediation for failed controls
  • Staff training or policy development
  • Consultant fees, if you hire external help (which we recommend, as detailed below)

Why You Should Use a Cyber Essentials Consultant

Achieving Cyber Essentials Plus is a significant undertaking. While some businesses attempt to go through the process on their own, many quickly discover it can be time-consuming, stressful, and technically challenging.

This is where a Cyber Essentials consultant can offer immense value. Here’s how:

1. Expert Guidance

Consultants understand the latest NCSC standards and assessment criteria. They can walk you through each requirement and ensure your systems are correctly configured to pass the audit the first time.

2. Gap Analysis

A consultant will typically begin with a gap analysis, identifying any weaknesses in your current infrastructure and helping you correct them before the official assessment.

3. Save Time and Resources

Attempting to manage certification internally often leads to wasted time and potential failure on the first assessment. Consultants streamline the process, saving internal teams from trial and error.

4. Policy and Documentation Support

Many companies fail Cyber Essentials Plus because their security policies and documentation are incomplete or outdated. A consultant can help you create or update necessary documents, from access controls to incident response plans.

5. Avoid Costly Re-tests

Failing the audit can lead to additional costs, including repeat assessments and remediation fees. Working with a consultant significantly reduces this risk.

6. Tailored Advice

No two businesses are alike. A consultant provides personalised advice based on your IT environment, business sector, and growth goals—ensuring the certification not only meets standards but also strengthens your business security overall.


How Long Does Cyber Essentials Plus Take?

The timeline for certification depends on how prepared your organisation is. Here’s a typical timeline when working with a consultant:

  • Week 1–2: Initial consultation, gap analysis, and remediation planning
  • Week 3–4: Implementation of required changes
  • Week 5: Final pre-assessment checks
  • Week 6: Official Cyber Essentials Plus audit
  • Week 7: Certification (if successful)

Without a consultant, many businesses find themselves repeating stages or facing failed audits that delay certification for weeks or even months.


Is Cyber Essentials Plus Worth the Cost?

While the Cyber Essentials Plus cost may seem like a significant outlay, the benefits far outweigh the investment. In fact, the average cost of a data breach for UK small businesses ranges from £4,000 to £20,000 or more—far higher than the cost of certification.

When you consider the potential for reputational damage, loss of customer trust, and regulatory fines, Cyber Essentials Plus offers peace of mind and real financial protection.


Final Thoughts

Cyber Essentials Plus is more than just a badge—it’s a government-backed, rigorously tested certification that proves your organisation is taking cyber security seriously. While the costs vary depending on the size and complexity of your business, the Cyber Essentials Plus cost is a wise investment in your company’s long-term resilience and reputation.

Working with a consultant can simplify the process, help you avoid costly mistakes, and ensure that you pass the assessment on the first try. Whether you’re pursuing government contracts or simply looking to strengthen your cyber security posture, Cyber Essentials Plus is a powerful way to demonstrate your commitment to staying safe in an increasingly dangerous digital world.


Need Help With Cyber Essentials Plus?

If you’re unsure where to start or want to guarantee a smooth certification process, consider hiring a certified Cyber Essentials consultant. With professional guidance, you’ll save time, reduce risk, and pass your audit with confidence.

No te aha e mea faufaa te hoê Parau tuite SSL

Hi'opo'araa no te parururaa i ni'a i te tahua itenati · Mati 22, 2023 ·

An SSL certificate is important for website security because it encrypts the connection between your website and your users’ Te mau nota. This makes it much more difficult for hackers to intercept and steal your users’ Te mau mana'o tauturu no te.

SSL certificates work by creating a secure connection between your website’s server and your users’ Te mau nota. This connection uses a mathematical algorithm to encrypt the data that is being transmitted. This encryption makes it much more difficult for hackers to intercept and read the data.

SSL certificates are important for a number of reasons. First, they help to protect your users’ Te mau mana'o tauturu no te. If your website is not encrypted, hackers can easily intercept and steal your users’ Te mau mana'o tauturu no te, such as their credit card numbers, passwords, and email addresses for security services Watford Second, SSL certificates help to build trust with your users. When users see that your website is encrypted, they are more likely to trust that your website is secure and that their data will be safe. Third, SSL certificates can help you to improve your website’s search engine ranking. Search engines like Google and Bing give preference to websites that are encrypted.

If you have a website, it is important to get an SSL certificate. SSL certificates are relatively inexpensive and easy to obtain. There are a number of different providers that offer SSL certificates. Once you have an SSL certificate, you will need to install it on your website’s server. This can be done by your web hosting provider or by a third-party provider.

Once your SSL certificate is installed, your website will be encrypted and your users’ data will be protected. You will also be able to improve your website’s search engine ranking and build trust with your users which is important for sites conducting secure transactions like Euro 2028 tickets

Te mau rave'a tamatamataraa i ni'a i te tahua itenati

Hi'opo'araa no te parururaa i ni'a i te tahua itenati · Mati 22, 2023 ·

Eaha te mau mauhaa paruru maitai roa a'e i ni'a i te tahua itenati?

E rave rahi mau mauhaa paruru i ni'a i te tahua itenati e vai ra, te taata tata'itahi i to'na iho mau puai e to'na mau paruparu. Teie te tahi o te mau rave'a paruru tuiroo roa a'e e te maitai roa a'e i ni'a i te itenati:

  • Te mau faanahoraa no te faaohiparaa i ni'a i te Itenati (TE MAU NOTA): E nehenehe te mau matini roro uira e tauturu i te paruru i ta outou tahua itenati i te mau aroraa i ni'a i te Itenati, mai te SQL, Papa'iraa mo'a i ni'a i te itenati, e te mau papaa parau i roto i te mau ve'a. E ohipa te mau waFs na roto i te hi'opoaraa i te mau tereraa pereoo atoa i nia i ta outou reni Internet e te opaniraa i te mau aniraa atoa e tuea i te hoê hoho'a ino matauhia.
  • SSL/TLS Certificates : SSL/TLS parau faaite no ni'a i ta outou tahua itenati, te parururaa e te parururaa i te feia e faaohipa ra i te reira’ Te mau mana'o tauturu no te. E ohipa te SSL/TLS na roto i te faatupuraa i te hoê tu'atiraa papû i rotopu i ta outou tahua itenati e te feia e faaohipa ra i te reira’ Te mau nota. No teie taairaa, mea fifi roa ' tu â no te feia eiâ ia haru e ia eiâ i te feia e faaohipa ra i te reira’ Te mau mana'o tauturu no te.
  • Te feia haapao i te mau ohipa parururaa (MSSPs): E nehenehe te mau MSP e horoa mai i te hoê anairaa faanahoraa taatoa no te parururaa, Te mau nota, SSL/TLS parau faaite, e te tahi atu â. E ohipa te mau MSP na roto i te faaohiparaa i ta outou tahua itenati no te tauturu ia outou. E nehenehe te reira e riro ei ravea maitai roa no te mau taiete aita ta ratou e ravea aore ra e aravihi no te faatere i ta ratou iho reni Internet.
  • Te arairaa i te ereraa i te mau haamaramaramaraa (DLP) Te mau rave'a : E nehenehe te mau ravea DLP e tauturu ia ore te mau haamaramaramaraa fifi ia tahe aore ra ia eiâhia i nia i ta outou reni Internet. E ohipa te mau rave'a DLP na roto i te iteraa e te hi'opo'araa i te mau haamaramaramaraa fifi, mai te mau numera o te parau tuuraa tarahu, Te mau numera i te pae totiale, e te faturaa ai'a. E nehenehe ïa teie mau haamaramaramaraa e tapaohia aore ra e tapeahia ia faataehia na nia i te internet.
  • E piti i ni'a i te toru (2FA): 2A tuu i te hoê tuhaa hau no te parururaa i ni'a i ta outou tahua itenati na roto i te titauraa i te mau taata ia tomo i roto i te hoê numera mai roto mai i ta ratou niuniu afa'ifa'i, taa ê noa'tu ta ratou ta'o huna ia tomo ana'e ratou i roto i te. 2A faaohipa i te reira na roto i te faariroraa i te reira ei mea fifi roa'tu no te mau taata e haere mai i ni'a i ta outou tahua itenati noa'tu e, te vai ra ta ratou i'oa tomoraa e ta outou ta'o huna.
  • Te mau matini hi'opo'a i ni'a i te tahua itenati : E nehenehe te mau matini hi'opo'a i ni'a i te tahua itenati e tauturu ia outou ia ite i te mau fifi i ni'a i te tahua itenati. E ohipa te mau matini hi'opo'a i ni'a i te tahua itenati na roto i te hi'opo'araa i te numera o ta outou tahua itenati no te mau rave'a aravihi matauhia. E nehenehe te reira e tauturu ia outou ia ite e ia faaafaro i te mau fifi hou te reira e faaohipahia ' i e te feia eiâ.
  • Hi'opo'araa i te nuuraa o te : Ua riro te hi'opo'araa i te tereraa o te ohipa ei rave'a tamatamataraa hau atu i te faufaa o te titau i te hoê aroraa i ni'a i ta outou tahua itenati. E manuïa te hi'opo'araa na roto i te tarahuraa i te hoê taata aravihi no te tamata i te tomo i ni'a i ta outou tahua itenati. E nehenehe te reira e tauturu ia outou ia ite e ia faaafaro i te mau fifi o te ore e itehia i ni'a i te tahua itenati.

Nahea ia ma'iti i te mau mauhaa paruru tano no ta outou ohipa imiraa faufaa

Ia ma'iti ana'e tatou i te mau mauhaa paruru i ni'a i te tahua itenati, e mea faufaa ia hi'opo'a i to outou mau hinaaro taa ê e ta outou tapura haamau'araa. Teie te tahi mau mea te tia ia hi'opoahia:

  • Te rahi o ta outou ohipa : Na te rahi o ta outou ohipa e faataa i te faito o te parururaa ta outou e hinaaro. Mai te mea e, e tahua itenati rahi ta outou e mea rahi te mau haamaramaramaraa fifi, e titauhia ia outou ia tuu i te moni i roto i te mau mauhaa parururaa maramarama a'e.
  • Ta outou tapura haamau'araa : E nehenehe te mau mauhaa parururaa i nia i te reni Internet e naeahia i te mau tausani dala marite i te ava'e. E mea faufaa ia maiti i te mau mauhaa e tano i ta outou tabula haamau'araa ma te ore e haapae i te parururaa.
  • To outou mau hinaaro : E rave rahi mau mauhaa paruru i ni'a i te tahua itenati e vai ra, te taata tata'itahi i to'na iho mau puai e to'na mau paruparu. E mea faufaa ia ma'iti i te mau mauhaa no te pahono i to outou mau hinaaro taa ê. Ei hi'oraa, mai te mea e, e titauhia ia outou ia paruru i ta outou tahua itenati i te mau aroraa a te SQL, e hinaaro outou i te hoê WAF.
  • Te mau mauhaa maramarama mai te Bard Chat e nehenehe te reira e tauturu ia taa maitai i te mau fifi i te pae no te parururaa. Access Bard Chat i ô nei.

Faaotiraa

Mea faufaa roa te vai - maitai - raa i nia i te reni Internet no te mau ohipa tapihooraa atoa. Na roto i te tuuraa i te moni i ni'a i te tahua itenati tano, e nehenehe ta outou e paruru i ta outou tahua itenati i te mau haamata'uraa hopea e ia tape'a i te feia e faaohipa ra i te reira’ Te mau mana'o tauturu no te haapiiraa.

  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

A imi i te tahi atu â haamaramaramaraa no ni'a i te mau tamatamataraa i ni'a i te tahua itenati tamoni ore Haapii rahi atu â

Hi'opo'araa no te parururaa i ni'a i

Faturaa paruruhia. © 2025 WebSite Security Test Inc. | Te ture no te oraraa omo'e WordPress Consultant

Te faaohipa nei matou i te mau faraoa monamona i ni'a i ta matou tahua itenati no te horo'a ia outou i te iteraa faufaa roa a'e na roto i te haamana'oraa i te mau mea ta outou e au e na roto i te faahiti-faahou-raa i te mau farereiraa. Na roto i te pataraa i te parau " A farii i te taatoaraa ", e farii oe i te faaohiparaa i te mau faraoa monamona atoa. Tera râ,, e nehenehe ta outou e haere e mata'ita'i "Te mau huru tupuraa i te pae no te maa" no te horo'a i te hoê parau faati'a.
Te mau huru tupuraa i te pae no te maaA farii i te taatoaraa
Faanaho i te parau faati'a

Te hi'opoaraa i te huru oraraa o te taata tatai

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Titauhia
I te mau taime atoa
E mea faufaa rahi roa te mau hoho'a i ni'a i te tahua itenati no te tere maitai. E haapapû teie mau hoho'a i te mau faanahoraa tumu e te mau rave'a parururaa i ni'a i te tahua itenati, Te mau nota.
CookieTe roaraa o te tauFaataaraa
cookielawinfo-checkbox-analytics11 te mau ava'eUa haamauhia teie faraoa monamona e te GDPR Cookie Consent plugin. E faaohipahia te faraoa monamona no te haaputu i te parau faati'a a te taata faaohipa no te mau faraoa monamona i roto i te tuhaa "Te mau hi'opoaraa".
Cookielawinfo-checkbox-functional11 te mau ava'eE haamauhia te faraoa monamona na roto i te parau faatia a te GDPR cookie no te tapa'o i te parau faati'a a te taata faaohipa i te mau faraoa monamona i roto i te pŭpŭ "Te tere - maitai - raa".
Cookielawinfo-checkbox-necessary11 te mau ava'eUa haamauhia teie faraoa monamona e te GDPR Cookie Consent plugin. E faaohipahia te mau faraoa monamona no te haaputu i te parau faati'a a te taata faaohipa no te mau faraoa monamona i roto i te tuhaa "Titauhia".
Te mau mana'o tauturu no te haapiiraa e te aporaa i te mau papa'iraa mo'a11 te mau ava'eUa haamauhia teie faraoa monamona e te GDPR Cookie Consent plugin. E faaohipahia te faraoa monamona no te haaputu i te parau faati'a a te taata faaohipa no te mau faraoa monamona i roto i te tuhaa "Te Tahi atu.
Cookielawinfo-checkbox-performance11 te mau ava'eUa haamauhia teie faraoa monamona e te GDPR Cookie Consent plugin. E faaohipahia te faraoa monamona no te haaputu i te parau faati'a a te taata faaohipa no te mau faraoa monamona i roto i te tuhaa "Te mau ha'utiraa".
viewed_cookie_policy11 te mau ava'eUa haamauhia te faraoa monamona e te GDPR Cookie Consent plugin e e faaohipahia te reira no te haaputu e ua farii anei te taata e faaohipa ra i te faraoa monamona aore ra aita i te faaohipa i te mau faraoa monamona. Aita oia e haaputu i te mau haamaramaramaraa no ni'a ia'na iho.
Te tere - maitai - raa
E tauturu te mau hoho'a teata i te rave i te tahi mau ohipa mai te faaiteraa i te mea e vai ra i ni'a i te tahua itenati i ni'a i te mau tahua itenati sotiare, Te mau mana'o tauturu no te, e te tahi atu mau tuhaa no te toru o te tuhaa.
Te mau ha'utiraa
E faaohipahia te mau faraoa monamona no te taa maitai e no te hi'opo'a i te mau tabula ha'utiraa faufaa o te tahua itenati o te tauturu i te horo'araa i te hoê iteraa maitai a'e no te feia ratere.
Te mau hi'opoaraa
E faaohipahia te mau faraoa monamona no te taa e mea nafea te mau ratere ia ohipa i nia i te reni Internet. E tauturu teie mau faraoa monamona i te horo'a i te mau haamaramaramaraa no ni'a i te numera o te mau ratere, Te mau mana'o tauturu no te haapiiraa, te pû tereraa pereoo, e te tahi atu â.
Te mau parau faatianiani
Te faaohipahia ra te mau faraoa monamona no te horoa na te mau ratere i te mau parau faatianiani e te mau ohipa tapihooraa e tano. E hi'opoa teie mau faraoa monamona i te mau ratere na nia i te mau reni Internet e e haaputu i te mau haamaramaramaraa no te horoa i te mau parau faatianiani i matauhia.
Vetahi ê
Te tahi atu mau faraoa monamona, o te mau faraoa monamona ïa e hi'opoahia ra e o tei ore i tatuhaahia i roto i te hoê pǔpǔ mai teie atu nei.
TE MAU PARAU APÎ O TE EKALESIA & TE MAU PARAU APÎ O TE EKALESIA