Learn how to spot the telltale signs of a phishing attack and what to do when you believe they’ve been targeted. https://www.miit.co.nz/wp-content/uploads/2022/10/robs_phishy_friday-720p-1.mp4Read more
Learn how to spot the telltale signs of a phishing attack and what to do when you believe they’ve been targeted. https://www.miit.co.nz/wp-content/uploads/2022/10/robs_phishy_friday-720p-1.mp4Read more
Watch this video to understand the cyber risks of working remotely. https://www.miit.co.nz/wp-content/uploads/2022/10/robs_worrisome_work_from_home-720p.mp4Read more
Many employees have a habit of re-using weak passwords that are easy to guess. It is important to learn secure password hygiene. https://www.miit.co.nz/wp-content/uploads/2022/10/uk422_secure_passwords-1080p.mp4Read more
Email is often the go-to attack vector for a cyber criminal to exploit an end-user. This video shines a light on how to avoid cyber risks and threats through secure email practice. https://www.miit.co.nz/wp-content/uploads/2022/10/secure_email_use-1080p.mp4Read more
In this video, you will learn how cyber criminals launch successful phishing attacks, as well as the five top tips to strengthen your security awareness https://www.miit.co.nz/wp-content/uploads/2022/10/csam_end-user_advice-1080p.mp4Read more
Technical difficulties whilst working from home, can leave you feeling frustrated. Here are a few basic best practice and troubleshooting tips so that you can power through your day. Practice cyber security awareness Some security measures that are in place at your workplace, may not be in place on your home network. These include securityRead more
It’s easy to add an extra layer of security to your accounts and devices by adding on two-step verification — also known as multi-factor, two-factor or two-step authentication. Why you need it Passwords can be guessed or stolen. With two-factor authentication, even if an attacker gets your password, it won’t be enough to sign intoRead more
In a security context, human error means unintentional actions – or lack of action – by employees and users that cause, spread or allow a security breach to take place. Almost all successful cyber breaches share one thing in common: human error. According to a study by IBM, human error is the main cause ofRead more
Cyber security protects all your computer systems from theft or damage to their hardware, software, or electronic data. If your cyber security is not up to date, it’s only a matter of time before you too will become a victim. Contact us now for a complimentary cyber security assessment. Security Check Name* Email* PhonePlease selectRead more
With the advances in technology, it is now truly possible to work from your boat – from many remote locations and at an affordable cost. Heading down to your boat early on a Friday morning is usually better than battling late Friday afternoon traffic in the summertime. You can get an early start commuting toRead more
Recent Comments