Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
Webinar Replay: A real world guide to AI
You’ve heard the hype on how amazing AI is, and then you tried it and were… underwhelmed. Or maybe you’ve read how dangerous AI is, and so you don’t want anyone in your organisation to risk using it. So, what is the AI reality for people that work in small to medium...
EchoLeak: What It Is, Why It Matters, and Why You Can Still Trust AI
The excitement around AI is plain to see, but it is tempered by an understandable caution. Many readers will be using AI to work smarter—from writing emails to analysing reports. But the caution is appropriate. Just like any powerful tool, AI needs to be used...
Have you considered the extent to which your business already depends on AI?
AI may be subtly operating behind the scenes, without your awareness. From tools that draft emails or streamline customer support to applications that analyse data trends or enhance productivity, AI is increasingly becoming an integral component of modern professional...
Drowning in Emails? 6 Tips to Conquer Your Outlook Inbox & Reclaim Your Time
Let's face it: for many of us, the Outlook inbox has become a digital black hole. Notifications ping, numbers climb, and the constant pressure to respond can feel overwhelming. It’s a modern workplace reality, but it doesn't have to control your day. You can regain...
June 2025 Report: Cyber is now the THIRD largest economy in the world
As we approach the midpoint of 2025, New Zealand’s cyber security landscape continues to evolve rapidly. With digital transformation accelerating across sectors, the country faces a growing array of cyber threats—ranging from financially motivated scams to...
AI Innovations and Legal Battles: A Month in Review
AI Innovations and Legal Battles: A Month in Review This month has been a whirlwind of advancements and legal drama in the AI industry. Alibaba's New AI Models Alibaba kicked off the month by unveiling Qwen3, a new family of AI models that reportedly match, and...
A practical guide: How much cyber security investment do I really need?
Cyber costs seem to keep increasing every year. There is always something more that is needed. Organisations can’t afford to over-invest but they can’t afford to under-invest either. It’s a tightrope so we thought it would be useful to prepare a simple guide.A...
To use, or not to use, AI to transcribe a meeting.
We understand that capturing the details of meetings is crucial. But manual note-taking is time-consuming, prone to errors, and often leaves important nuances lost. Enter AI transcription AI Transcription is a rapidly evolving technology promising accurate, efficient...
Webinar Replay -Enhancing Your Security Posture with Microsoft Secure Score
This webinar replay covers the essentials of Microsoft Secure Score. Secure Score is a powerful tool designed to help businesses assess and improve their security across Microsoft 365 workloads. We will explore what Microsoft Secure Score is, why it is crucial for...
(Finally) 3 Things I like about the New Outlook
I’ve finally switched to the New Outlook after a few false starts and here are a few things that I like.Improved "New Outlook" Copilot Features Copilot in the old desktop version of Outlook doesn’t seem to have had any improvements for over a year.However, the New...