13.06.2019 Views

Bay of Plenty Business News June/July 2019

From mid-2016 Bay of Plenty businesses have a new voice, Bay of Plenty Business News. This new publication reflects the region’s growth and importance as part of the wider central North Island economy.

From mid-2016 Bay of Plenty businesses have a new voice, Bay of Plenty Business News. This new publication reflects the region’s growth and importance as part of the wider central North Island economy.

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BAY OF PLENTY BUSINESS NEWS <strong>June</strong>/<strong>July</strong> <strong>2019</strong><br />

23<br />

Cyber security needs more than a firewall<br />

New Zealand has embraced digital<br />

technologies faster than many other<br />

countries. We’ve raced into the Cloud, and<br />

per capita we are one <strong>of</strong> the highest users<br />

<strong>of</strong> Micros<strong>of</strong>t Office 365 and Google Suite.<br />

But our security has not adapted to this<br />

modern environment at the same rate.<br />

The way we do business<br />

has changed dramatically.<br />

We moved online,<br />

started sharing our lives on<br />

Social Media, putting our critical<br />

business data in the Cloud<br />

and began working from our<br />

cars, homes and hotels. The<br />

Modern Workplace provides<br />

us with new ways <strong>of</strong> working.<br />

But at the same time, it<br />

has introduced new risks. Just<br />

as cyberspace has no borders,<br />

neither does cybercrime.<br />

Cyber-attacks are on the rise<br />

and New Zealand businesses<br />

are a prime target. In 2017<br />

New Zealand lost an estimated<br />

NZD$177 million to cybercrime.<br />

The cybersecurity arms<br />

race is on - basic threat protection<br />

measures such as antivirus<br />

and firewall no longer provide<br />

sufficient protection.<br />

Cybercriminals have a<br />

range <strong>of</strong> approaches as well<br />

as an agile and growing tool<br />

set. The potential rewards are<br />

huge, and the risk is relatively<br />

small.<br />

These cyber threats are not<br />

new, but they are becoming<br />

more frequent. Like Health and<br />

Safety, Cybersecurity is a very<br />

real risk and has the potential<br />

to affect the viability <strong>of</strong> your<br />

business and the livelihood <strong>of</strong><br />

your staff. We need to raise<br />

the level <strong>of</strong> the cybersecurity<br />

conversation, not just with our<br />

users and IT support teams, but<br />

with executives and boards.<br />

We recommend focusing<br />

on three key areas to help keep<br />

your systems safe:<br />

TECH TALK<br />

> BY DANIEL GOYMER<br />

Technical Director <strong>of</strong> Yorb, a <strong>Business</strong> Technology Partner. He can<br />

be reached on Daniel.goymer@yorb.tech or 0800-600-606<br />

People<br />

People are your first and last<br />

line <strong>of</strong> defence. All the security<br />

technologies and processes<br />

in the world can be brought<br />

down by a single well-meaning<br />

employee in a careless<br />

moment. Human error has<br />

become a major weak point;<br />

one that is easily exploited by<br />

cyber criminals. It is vital that<br />

businesses have some form <strong>of</strong><br />

cyber security training in place<br />

to educate their employees<br />

on the importance <strong>of</strong> protecting<br />

sensitive information and<br />

what malicious threats to look<br />

out for.<br />

Process<br />

Are your internal business<br />

processes secure, how do you<br />

verify supplier requests for a<br />

change to their bank account<br />

details? If a request was made<br />

to transfer money overseas;<br />

how is that request verified?<br />

It is key to ensure you have<br />

in place processes that are<br />

detailed, known and well<br />

understood.<br />

Technology<br />

No tool by itself can effectively<br />

secure your data. Manage your<br />

people and technology with<br />

multiple layers <strong>of</strong> protection<br />

such as firewalls, anti-virus<br />

protection and mobile device<br />

management.<br />

Security is not something<br />

that can be achieved in isolation<br />

using bigger firewalls.<br />

Cyber Security needs a holistic<br />

companywide approach.<br />

• Work with your staff to<br />

ensure they take the appropriate<br />

precautions when<br />

working with your systems.<br />

• Implement processes that<br />

help to identify unauthorised<br />

or unusual behaviour.<br />

• Invest in technologies that<br />

improve security standards<br />

to automatically block<br />

hackers or unsafe files from<br />

your networks.<br />

• Conduct ongoing security<br />

awareness training; analysing<br />

previous attacks and<br />

how these examples can<br />

be used to increase your<br />

safety.<br />

To feel confident in today’s<br />

threat landscape, you need a<br />

multi-faceted approach that<br />

also includes a security framework,<br />

staff training, data protection<br />

and more. You can<br />

only adequately address cyber<br />

risks by increasing security<br />

awareness across your entire<br />

business.<br />

GEMMA & RICHIE<br />

McCAW

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!