Blog
Is your fibre internet running at its best?
Here’s an interesting thought: is your fibre internet connection “slow”? Or, to put it more [...]
Read moreIs your phone secure?
Here’s an interesting thought: is your phone secure? After all, your phone contains access to [...]
Read moreShould you try to fix security issues yourself?
The internet is abuzz with news of a zero-day remote code execution bug in Microsoft [...]
Read moreHow to prevent your social media accounts getting hacked
Social media impersonation is rife at the moment. Criminals posing as brands are becoming a [...]
Read moreAn easy way to find out if your business can easily be hacked
A security assessment is an in-depth look and analysis at what layers of security a [...]
Read moreIs cyber insurance worth it for small businesses?
Cyber insurance is designed to help a business recover financial losses, and maintain cashflow, after [...]
Read moreThe real cost of a cyber attack
Running a small business is not easy, and nowadays it is more complex and challenging, [...]
Read moreIs your business on the “at risk” list for cyber attacks?
The brutal reality is that any business that uses technology is vulnerable to a cyber-attack. [...]
Read moreWhat a “bait” looks like and how to avoid it
Just as a fisherman baits the hook in order to catch a fish, baiting in [...]
Read moreWhat “vishing” looks like and how to avoid it
Vishing attacks are voice-based phishing attacks where scammers attempt to trick victims into giving up [...]
Read moreWhat are all the different ways a hacker could enter your business?
Setting up and managing cyber security can be confusing and overwhelming for businesses without an [...]
Read moreWhat “SMiShing” looks like and how to avoid it
Smishing is a phishing attack that comes in via text messages (SMS) instead of email. [...]
Read moreWhat “spear phishing” looks like and how to avoid it
Spear phishing is a highly targeted phishing attack with a goal of attacking one specific [...]
Read moreWhat “phishing” looks like and how to avoid it
Phishing is one of the most common forms of social engineering. Attackers attempt to persuade [...]
Read moreWhy would anyone bother hacking a small business?
Think you’re too small for a hacker to bother with? Think again. It’s a common [...]
Read moreWhy you need to protect your data
Data is currency in today’s world. It is the most valuable item that someone can [...]
Read moreTop targets for phishing attacks in NZ – how phishing works
How phishing works Phishing is any type of attempt to trick you into doing something [...]
Read moreWhat is ransomware and what could it do to you?
Hacking is a business, and like any business, it is focused on finding innovative ways [...]
Read moreCyber Security Checklist – Make sure you’re doing these things
When a big company is hacked it’s splashed all over the news. However the majority [...]
Read moreWhy you should never use free Wi-Fi
With free Wi-Fi available for use in most places nowadays, from airports to McDonalds, it [...]
Read more6 things about data loss no one tells you
Think data loss will never happen to you? ‘No one wants my data.’ ‘Hackers are [...]
Read more