Featured

Guest contributor Ben Christian, Networks and Collaboration General Manager NZ at NTT Ltd, shares the five ways networks are likely to evolve over the next decade.
Guest contributor Ben Christian, Networks and Collaboration General Manager NZ at NTT Ltd, shares the five ways networks are likely to evolve over the next decade.
Car hacking is predicted to face increasing cyber security challenges in 2023, according to new predictions from Apricorn.
The biggest challenge for organisations today revolves around avoiding a data breach. Recent events in Australia - Optus, the second largest telecommunications company in the country, had identifying details of up to 9.8 million customers stolen from their database - only serve to highlight the importance of protecting your customer data.
Datto shines the spotlight on data safety for Managed Service Providers (MSPs) in this piece outlining the importance on dependable backups and a purpose-built cloud.
While Microsoft assures service availability to Microsoft Teams' 270 million monthly active users, that guarantee doesn't stretch to the data within. It's up to your organisation to implement an integrated solution that provides your Teams users with data backup plus advanced threat protection. Datto shares how they can help you do that.
Mobile Mentor rounds out their Zero Trust series with a summary of "Six pillars of Modern Endpoint Management" and a link to download the full whitepaper. It highlights why we can't continue with legacy IT operations and how disrupting the status quo will have your IT team thanking you.
As we transition into 2022, cybersecurity leaders have a lot to think about when it comes to ensuring the future protection of their organisations.
Zero Trust can be implemented with E3 but it can only be scaled effectively, with a high degree of automation, using E5. Mobile Mentor outlines the main security enhancements to a Zero Trust architecture, at scale, using Microsoft 365 E5 licenses.
Legacy security based on a network perimeter, or a castle and moat approach, is no longer fit for purpose. Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences in this second article in the Zero Trust series.
The question "How can I protect my clients' data?" is now key for MSPs - and one that's become increasingly complicated to answer. Datto takes us through the challenges and how Datto Unified Continuity offers a cohesive solution.
Mobile Mentor is a global leader in the endpoint ecosystem and Microsoft’s 2021 Partner of the Year. Certified by Microsoft, Apple and Google, their engineers live and breathe endpoint security and work tirelessly with clients to balance endpoint security with an empowering employee experience.
Building a cloud practice with Microsoft Azure presents many possibilities for innovation, flexibility, and enhancements for workloads and processes. But managing cloud environments can be challenging. If you're a Managed Service Provider, you'll want to read this.
In our Work From Home pandemic world, NTT's Patric Balmer explains what Kiwi businesses should be doing to protect themselves against mailbox attacks.
Microsoft’s Digital Defence Report for 2021 is a sobering read. Over its 134 pages, it catalogues the sophisticated playbook of a global network of cybercriminals.
Malware and ransomware infection rates are increasing, this year alone, malware increased by 358% overall, and ransomware increased by 435% as compared to 2019.
Cybersecurity specialist Fortinet has pledged to train one million people in five years in a bid to help meet a global cybersecurity skills gap.
As small and medium businesses (SMBs) move to remote work environments, their tools for collaboration, such as Microsoft 365, OneDrive, Teams, and Zoom, create openings in their networks for increased cyber threats. This switch has Cybercriminals seeing SMBs as valid targets that are much easier to infiltrate than larger organisations.
There is no question that the cybersecurity landscape is shifting rapidly and, in turn, cyber criminals are becoming more sophisticated. Incidents such as the recent breach at Waikato DHB point to the evidence of real-world consequences for organisations with dated vulnerabilities in their security infrastructure.
No one should give in to criminals’ ransomware demands. Investing upfront in security and employee education to avoid facing that awful dilemma will serve you well.
Need to get that Cyber confident feeling back after the hard-hit of Covid-19? Join industry experts as they dive deep into the way organisations manage the impact cyber-confidence can have in the digital age.
Data protection has evolved greatly over the days of on-prem tape backup. It wasn’t long ago that organisations sent their backup tapes offsite for storage in case of a disaster. And for large organisations, synchronous or asynchronous replication between data centres allowed for failover from the primary site to a secondary site in case of disaster.
It’s been working with our local and central government agencies on software projects for years.
Innovation-hungry businesses should look “up” rather than back.
Here’s a question with only one right answer: Do you want your organisation to be fragile or agile?
One of the main benefits of migrating your systems to the cloud is that it’s easier for your employees to access resources from any device and any location – all they need is an internet connection.
Monday's enforcement of the Privacy Act 2020 calls on business to pay close attention to both individual and business security of personal information, and proactively to prevent privacy harm.
On December 1st, when the Privacy Act 2020 comes into motion, all businesses who deal in Kiwi customer data will be affected. Is yours ready?
Fancy leading a cyber-rebellion through the streets of London? Then Watch Dogs: Legion is the game for you.
The tech industry's fortunes rest on who wins the White House and who has the power to pass legislation that could radically change how it does business.