Our Tech

Blog

The Cybersecurity Threat Landscape

Protecting your business with ESET Security

Written by: Andrew Fergus, IT Alliance

Now, more than ever, it is important to secure your data. Cybersecurity threats to your organisation, your staff and your clients are becoming a regular occurrence here in the Welington/Wairarapa region. As these cybersecurity threats become more significant, it's really important to understand what they are, and how to do your best to prevent them. So let’s dig in and look at the different types of attacks and one of the most popular options for countering it - ESET Endpoint Security.

 

So what are the...

Navigating the Dangers of VoIP

Security issues you need to be aware of before considering VoIP

By Jim Carroll

Times used to be simpler when phone lines were just that, but today there are more and more companies moving to the more complicated VoIP (Voice over Internet Protocol) system for their phone lines. This is in part due to advances in technology, but also partly enforced by telecoms companies like Spark suggesting they won’t support the legacy phone lines in future.

While VoIP can work well in the right circumstances due to

...

Managing Your Staff Remotely

How to Make the Most Out of Working From Home!

Written by: Delia Gill

Due to recent world events, most people have now had the opportunity to try out working remotely in one way or another, especially those who work in an office environment. It’s also been an opportunity to test out our IT systems when working from home and to see if they’re up to the task of simulating being in an in-person environment.

 

Pros and Cons of Working from Home

There are of course some professions who are unable to work from home, such as nursing and hospitality....

Why you should be using Multi-Factor Authentication

In today's online environment, the traditional “username and password” approach to account security can often be easily breached by those online bandits. Many passwords can be compromised in a matter of minutes, if not seconds, and your private data; such as your personal and financial details, are under threat of falling into the wrong hands.

One way to keep yourself and your business safe is to use a passphrase instead (you can read this excellent article on why passphrases are better than passwords) but even these are not impregnable and so you will want some form of multi-factor authentication...

Why is a passphrase better than a password?

Why should I use a random passphrase?

Because humans are terrible at creating secure passwords. The famous xkcd comic got it right: humans have been trained to use hard-to-remember passwords that are easy for computers to guess.

Try as we might, humans usually end up using one of a few predictable patterns when creating passwords. We base them on things we can remember, such as names, locations, dates or just common English words. Then, we add some spice with a capital letter, some numbers, or a symbol.

 

Is it really that easy to crack a password? How is it done, exactly?

The method for...

What is Contact Tracing?

Preparing your business for contact

Levels two and three are on their way and it is time to prepare for what that might look like for your business here in Masterton. It can feel a little overwhelming, so let’s break down some of the key areas that might help your business to manage all the changes. We will cover contact tracing, what it is and why it’s so important. Two key steps to defining it for your business and lastly some brilliant business IT tools that could save time, money, and possibly even lives.