In a continuation of our series of Security posts, this week we are focusing on EDR – Endpoint Detection and Response. The first question you are probably asking. What is EDR? Endpoint Detection and Response (EDR) is a new form of cyber security technology that helps continuously monitor, prevent, detect, and respond to ever-changing cyber threats and recover quickly when ransomware or other…
How a good ‘Technology Partner’ can change your business
Every business, small or large, has 3 basic levels of technology support needs. 1. Make sure it works – Every organisation, from a major corporate down to a not-for-profit, needs IT staff who are able to offer routine maintenance and support, including the updating of hardware and software, handling maintenance, and putting out daily fires. 2. Make sure it works when needed…
Phishing scams – don’t take the bait
Continuing our series of posts aligned to Cyber Awareness month, this week we are highlighting an increasingly common threat – Phishing Scams. Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request…
15 Ways to Protect your Business from a Cyber Attack
Did you know? 1 in 5 small businesses will suffer a cyber breach this year 81% of all cyber breaches happen to small and medium sized businesses 97% of breaches could have been prevented with today’s technology In this day and age, a cyberattack is, unfortunately, more of an inevitability than just a mere threat. So,…
Microsoft Customer Agreement
Please click below for a copy of the new Microsoft Customer Agreement Microsoft Customer Agreement – New Zealand Jan 2020
Windows 7 End of Life – 5 Key Questions Answered
Microsoft will terminate support for Windows 7 on 14th January 2020. Windows 7 is currently in a phase Microsoft describes as “extended support” but by 14th January 2020 all support ends and no further security updates will be issued. In this blog we have provided answers to some of the most common questions regarding “end…
Today is Safer Internet Day
Did you know that 50% of small businesses have experienced a data breach within the last 12 months? And ‘Internal Vulnerabilities’ are responsible for 70% of those data breaches!!! You’re probably asking “what the heck does that mean to me?”. In simple terms there is a 1 in 2 chance you will face some sort of compromise to your…
The Cloud drives productivity for both Management and Employees
While Cloud is still a bit of a buzzword, it is very much becoming mainstream and marks a truly major leap forward for the average business. Before, all company data had to be stored on local devices. If you wanted to work on company documents, you had to do so on a company computer in…
6 Steps to Keeping Your Data Safe
Much like biological viruses, there are many ransomware threats circulating the web. Some are well known, while some are new and others are not yet known or developed. With every occurrence, the sophistication of these viruses is increasing in a multitude of ways, including how they spread and how they encrypt data. As your IT service provider,…
For SMBs, managing technology can be complex and expensive, but it doesn’t have to be
Mitigating costly new technology risks for continued stability and profitability. Contrary to what you may read, IT costs don’t necessarily have to skyrocket as your business grows. Small and medium sized businesses (SMBs) just have to be more cognisant of where their technology investments are going and what they’re truly getting as return on their…