The Cyber Security Threat Landscape

Now, more than ever, it is important to secure your data. Cybersecurity threats to your organisation, your staff and your clients are becoming a regular occurrence here in the Waikato. As these cybersecurity threats become more significant, it's really important to understand what they are, and how to do your best to prevent them. So, let’s dig in and look at the different types of attacks and one of the most popular options for countering it - ESET Endpoint Security.
So what are the key cybersecurity threats?
Ransomware. This is a type of malware which threatens to publish or block access to your data unless a ransom is paid.
Email Virus Attachments.It’s common for viruses to be sent as email attachments to unsuspecting users, if opened these can potentially infect your whole system with unwanted viruses.
Spyware. This is another type of malware which can steal sensitive data such as passwords, credit card details and commercially sensitive data.
Endpoint Security
Endpoint security software is used on millions devices. Good endpoint protection software incorporates artificial intelligence (AI). When the endpoint detects an unknown application (potential virus) it reports directly to the manufacturer's cloud system. This means they can examine it and send out a fix if needed. They send out updates at a minimum of every 2 hours and have a team dedicated to threat security. It also has a negligible impact on computer performance. Meaning your computer won’t go super slow. Its testing system has no false positives, so if there is a notification, you know it is correct.
With so many businesses moving their files to the cloud there are additional products helping keep business safe. Cloud Office Security provides advanced preventive protection for Microsoft 365 applications against malware, spam, and phishing attacks via an easy-to-use cloud management console. Eliminate spam from Microsoft 365 inboxes and keep your OneDrive files malware-free.
A Word of Warning for Compromised Data!!
One more motivation will be around from 1st December 2020 with a new Bill from the New Zealand Government, which means that if you are compromised and your data gets taken or lost, you have to notify the Office of the Privacy Commissioner and affected individuals. If you don’t then you could be liable for up to $350,000 per EACH MEMBER of a class action.
So what next for your Cyber Security?
We recommend using our managed Endpoint Security, this protects your files and network, doesn’t hog your resources or waste your time on false positives like with Microsoft Defender - it also mitigates your risk against the NZ Privacy Act 2020.
Our managed reliable Antivirus & Firewall solutions are Sophos and Bitdefender. we apply the one appropriate for your business's situation, depending on your system, number of users and requirements. At CT Business Solutions we use these options for our Managed Services Clients as they integrate directly with our support software platform.
Bonus tip for those using Microsoft 365
For those of you that have moved your files to the Microsoft Cloud. We recommend turning on 2FA (Multi-Factor Authentication) which is included free with your Microsoft 365 subscription. Also add your Office IP address so it only prompts you for a second authentication every few months when using your office, but still prompts to authenticate when adding new devices or visiting new areas.
If you’d like help choosing the best antivirus and firewall software for your business and help with setting it up, contact us on 07 850 5742 or on or website contact page.
This blog article was written by our IT Alliance colleague: Andrew Fergus of @Computer Northland and Whangarei - November 2020
IT Alliance Members:
CT Business Solutions - Hamilton
@Computer - Northland
Technology Partners - Tauranga
Vision Lab - Te Puke
AdvancedIT - Rotorua
BlackSANZ - New Plymouth
GTB - Kapiti, Wellington
Decision1 IT Solutions - Dunedin
IT Centre - Wanaka
Voicecom - Invercargill
IT Alliance Website
#cybersecurity #security #technology #cybercrime #tech #cyber #cyberattack #malware
Back...