Protecting your business against cyberthreats in the work from anywhere world is something you must be actively..
Personalising cybersecurity in the workplace
Most cybersecurity solutions take a one-size-fits-all approach. Everyone gets the same training and the same simulated phishing emails. Yet, we all respond to cyber threats in different ways. Our personalities and differences often play a crucial role in how we act. For this reason, training adjusted to each individual could better reduce cyber risk. Several…
5 Ways to Avoid a Ransomware Attack
“Ooops, your files have been encrypted!” That’s the dreaded message that greeted people hit with the 2017 WannaCry ransomware attack. Hundreds of thousands of computers were infected, and many people lost their computer files, money, and time and suffered immeasurable aggravation and embarrassment. It’s been a couple of years since then, and, experts agree, ransomware is still…
The importance of Cyber Resilience
Cybersecurity refers to the processes and methods used to protect your organisation from a cyberattack; cyber resilience refers to your ability to deal with those threats. An organisation’s ability to operate, function and recover from an attack determines its level of resilience. Although it is a relatively new term, cyber resilience has always been the…
Important Privacy law changes that have an impact on you
Changes have been made to the Privacy Act . If you collect, store or use personal information about your employees and/or customers, you will have new obligations. The new Privacy Act took effect on 1 December 2020. The Privacy Act 2020 replaces the Privacy Act 1993. The key change for most organisations under the new…
7 Ways to Limit the Impact of Ransomware
From local government entities to large organisations, ransomware attacks are everywhere. It’s up to all of us to help prevent them from being successful. Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Ransomware does this by encrypting files on the endpoint, threatening to…
Why you should be taking MFA seriously
It feels like every day, we hear about another data breach or ransomware attack against companies large and small. It’s one of the downsides of such rapid technological growth – just as quickly as cybersecurity professionals can increase defences, bad actors are expanding their attack arsenals. To decrease the risks, individuals and businesses alike must…
Critical Cyber Security Enhancements
What is myITmanager doing to help clients stay cyber safe? We have invested heavily in R&D over the last few months to improve our offerings and are implementing a number of key solutions that will significantly reduce the likelihood and impact of the most common cyber breaches. These changes will deliver what we consider is…
Office 365 Backup
Is your email backed up? Are all your company documents backed up? What would happen if someone accidentally or intentionally deleted all their emails and walked out the door? What would happen if a cyber criminal hacked your system and encrypted all you company files and documents? Why You Need O365 Backup! There’s a common misconception among users that backup…
Technology – the key to improved Business Productivity
A recent Stuff Article provides some interesting insights and stats around how technology can and is expected to drive future business productivity. From a labour productivity perspective New Zealand ranks poorly by OECD standards. The question is why? There are probably a number of contributing factors. We have a large percentage of small businesses with less than…