FREQUENTLY ASKED QUESTIONS
Find answers to our most frequently asked questions under each category.
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks or unauthorised access.
Cybersecurity is crucial because it helps prevent unauthorised access, data breaches, identity theft, and other cyber threats that can cause significant financial and reputational damage to individuals and organisations.
Common types of cyber threats include malware (such as viruses, ransomware, and spyware), phishing attacks, social engineering, denial-of-service (DoS) attacks, and data breaches.
Install and regularly update antivirus and anti-malware software.
Keep your operating system and software up to date.
Use strong, unique passwords for each account
Enable two-factor authentication (2FA) when available.
Be cautious of suspicious emails, attachments, or links.
Regularly back up your data and store it securely.
Use a firewall and secure your Wi-Fi network.
Encryption is the process of converting information into a code to prevent unauthorised access. It is vital for cybersecurity because it ensures that sensitive data remains protected even if hackers intercept it.
Assessing and identifying vulnerabilities in your environment.
Implementing robust security measures and policies.
Monitoring your systems for potential threats and responding to incidents promptly.
Conducting regular security audits and risk assessments.
Providing employee training and awareness programs.
Assisting in incident response and recovery in the event of a breach.
If your company experiences a cybersecurity breach, you should:
Isolate affected systems to prevent further damage.
Notify the appropriate authorities and your cybersecurity provider (certs nz https://www.cert.govt.nz/individuals/report-an-issue).
Conduct a thorough investigation to determine the extent of the breach.
Inform affected individuals or customers as required.
Take steps to remediate the breach and enhance security measures to prevent future incidents.
It is recommended to regularly update your cybersecurity measures to stay protected against evolving threats. This includes updating software, patching vulnerabilities, reviewing access controls, and conducting security audits at least annually.
A penetration, or pen test, is a controlled simulated computer system or network attack to identify vulnerabilities. It helps assess the security of your infrastructure and provides insights into potential weaknesses that attackers can exploit.
Employee training plays a vital role in cybersecurity. It helps raise awareness about best practices, such as recognising phishing emails, using secure passwords, and handling sensitive data. Well-trained employees are often the first line of defence against cyber threats.
A firewall is a security device that monitors incoming and outgoing network traffic. It acts as a barrier between your internal network and the internet, filtering out malicious traffic and protecting your network from unauthorised access.
A Virtual Private Network (VPN) is a technology that creates a secure, encrypted connection over a public network (such as the internet). It helps protect your privacy and data by masking your IP address and encrypting your internet traffic, making it difficult for hackers to intercept or track your online activities.
Set a strong PIN or passcode and enable biometric authentication.
Install security updates and keep your operating system and apps up to date.
Be cautious when downloading apps and only use trusted sources.
Enable remote tracking and wiping capabilities in case your device gets lost or stolen.
Avoid connecting to unsecured public Wi-Fi networks and use a VPN when necessary.
Multi-factor authentication is an authentication method that requires users to provide multiple credentials to verify their identity. It adds an extra layer of security by combining something the user knows (e.g., password), something they have (e.g., smartphone), or something they are (e.g., fingerprint). MFA significantly reduces the risk of unauthorised access even if one factor is compromised.
Use a combination of uppercase and lowercase letters, numbers, and special characters.
Avoid using common words, sequential numbers, or personal information.
Use a unique password for each account.
Consider using a password manager to store and generate complex passwords securely.
HAVE MORE QUESTIONS?
Could not find the answers to your questions under our FAQ Section? Get in touch with us and we will be more than happy to answer any of your questions and provide additional information.