Blog

Is your fibre internet running at its best?

Here’s an interesting thought: is your fibre internet connection “slow”?  Or, to put it more [...]

Read more
Is your phone secure?

Here’s an interesting thought: is your phone secure? After all, your phone contains access to [...]

Read more
Should you try to fix security issues yourself?

The internet is abuzz with news of a zero-day remote code execution bug in Microsoft [...]

Read more
How to prevent your social media accounts getting hacked

Social media impersonation is rife at the moment. Criminals posing as brands are becoming a [...]

Read more
An easy way to find out if your business can easily be hacked

A security assessment is an in-depth look and analysis at what layers of security a [...]

Read more
Is cyber insurance worth it for small businesses?

Cyber insurance is designed to help a business recover financial losses, and maintain cashflow, after [...]

Read more
The real cost of a cyber attack

Running a small business is not easy, and nowadays it is more complex and challenging, [...]

Read more
Is your business on the “at risk” list for cyber attacks?

The brutal reality is that any business that uses technology is vulnerable to a cyber-attack. [...]

Read more
What a “bait” looks like and how to avoid it

Just as a fisherman baits the hook in order to catch a fish, baiting in [...]

Read more
What “vishing” looks like and how to avoid it

Vishing attacks are voice-based phishing attacks where scammers attempt to trick victims into giving up [...]

Read more
What are all the different ways a hacker could enter your business?

Setting up and managing cyber security can be confusing and overwhelming for businesses without an [...]

Read more
What “SMiShing” looks like and how to avoid it

Smishing is a phishing attack that comes in via text messages (SMS) instead of email. [...]

Read more
What “spear phishing” looks like and how to avoid it

Spear phishing is a highly targeted phishing attack with a goal of attacking one specific [...]

Read more
What “phishing” looks like and how to avoid it

Phishing is one of the most common forms of social engineering. Attackers attempt to persuade [...]

Read more
Why would anyone bother hacking a small business?

Think you’re too small for a hacker to bother with? Think again. It’s a common [...]

Read more
Why you need to protect your data

Data is currency in today’s world. It is the most valuable item that someone can [...]

Read more
Top targets for phishing attacks in NZ – how phishing works

How phishing works Phishing is any type of attempt to trick you into doing something [...]

Read more
What is ransomware and what could it do to you?

Hacking is a business, and like any business, it is focused on finding innovative ways [...]

Read more
Cyber Security Checklist – Make sure you’re doing these things

When a big company is hacked it’s splashed all over the news. However the majority [...]

Read more
Why you should never use free Wi-Fi

With free Wi-Fi available for use in most places nowadays, from airports to McDonalds, it [...]

Read more
6 things about data loss no one tells you 

Think data loss will never happen to you?   ‘No one wants my data.’ ‘Hackers are [...]

Read more

Let’s talk

Service Desk taking too long?

Why wait! With over 30 years industry experience, our confident team of expert engineers can help now!

Phone

0274 974 053

Email

[email protected]

Contact Form

This field is for validation purposes and should be left unchanged.