Why
Avoid unauthorised:
- Access to a system or device and its data
- Extraction, deletion or damage to data
- Disruption of availability to any business operation
- Activities causing financial or reputational harm
Avoid unauthorised:
Get peace of mind:
It’s easy and convenient:
RISK
Hijacking
An attacker takes control of a communication between you and another person, and pretends to be you.
RISK
Phishing
Obtaining sensitive information such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication.
RISK
ID Fraud
When you or your customers ID is stolen and used to gain a financial advantage or obtain credit or other benefits.
RISK
Ransomware
Malicious software that encrypts and threatens to publish your data unless a ransom is paid.
RISK
Data Back Up Risk
having no, irregular or unsecure, off-site back up.
RISK
Virus’s
(Trojans, bots, worms)malicious code (malware) that infects your computer and changes how it works.
RISK
User Behaviour
Your staff are an asset but also a risk if not trained regarding cyber security.
RISK
Insider Attacks
Malicious software that encrypts and threatens to publish your data unless a ransom is paid.
Got a question about how the TechSafe subscription can improve your business cyber security:
Call 04 382 8096
Email info@techsafe.nz
Sign up and we’ll arrange the first step, for one of our plain English speaking assessors to visit your business.
Order now