{"id":13306,"date":"2025-02-19T11:42:14","date_gmt":"2025-02-18T22:42:14","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=13306"},"modified":"2025-02-19T11:42:14","modified_gmt":"2025-02-18T22:42:14","slug":"webinar-replay-what-are-the-nz-government-recommendations-for-sme-business-cyber-security","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=13306","title":{"rendered":"Webinar Replay &#8211; What are the NZ Government recommendations for SME Business cyber-security?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2>What are the NZ Government recommendations for SME Business cyber-security?<\/h2>\n<h2>How does your business match up?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_video src=&#8221;https:\/\/youtu.be\/YtBHs_mw3-Y&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_video][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>CertNZ has been rolled into the new National Cyber Security Centre.<\/p>\n<p>They&#8217;ve released the 10 Critical Controls and a Cyber-Security Framework?<\/p>\n<p>What do they mean and how does your business cyber-security compare?<\/p>\n<p>Watch Kinetics CTO Bill Lunam as he unpacks the details, and how your current security matches up.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>Briefing from Bill Lunam, CTO of Kinetics Group<\/h3>\n<h4>Key Topics Covered:<\/h4>\n<h4>1. Introduction to New Zealand&#8217;s 10 Critical Controls for Cyber Security:<\/h4>\n<p>Importance of having a framework for cyber security.<br \/>Comparison with Australia&#8217;s Essential 8 framework. 8:37<\/p>\n<h4>2. Patching and Software:<\/h4>\n<p>Emphasis on patching desktops, laptops, servers, and firewalls.<br \/>Managed patching services provided by Kinetics, including third-party applications and Mac OS. 10:24<\/p>\n<h4>3. Multi-Factor Authentication (MFA):<\/h4>\n<p>Importance of enabling MFA on all platforms, including 365 and other cloud services.<br \/>Need for a company policy to ensure MFA is enforced. 12:42<\/p>\n<h4>4. Asset Life Cycle Management:<\/h4>\n<p>Importance of replacing old equipment for security and productivity.<br \/>Tools provided by Kinetics to track hardware and software assets. 14:08<\/p>\n<h4>5. Backups:<\/h4>\n<p>Necessity of backing up data from servers, desktops, and cloud services.<br \/>Kinetics&#8217; backup solutions and the importance of verifying vendor backups for SaaS applications. 16:19<\/p>\n<h4>6. Security Awareness:<\/h4>\n<p>Regular training and phishing testing for staff.<br \/>Creating a cyber security committee within the organisation. 17:11<\/p>\n<h4>7. Application Control:<\/h4>\n<p>Explanation of application control and the role of modern endpoint protection (EDR).<br \/>Encouragement to use password managers. 19:56<\/p>\n<h4>8. Centralised Logging:<\/h4>\n<p>Importance of centralized logging for security events.<br \/>Introduction of Kinetics&#8217; Key Vigilance product for managed detection and response (MDR). 23:25<\/p>\n<h4>9. Principle of Least Privilege:<\/h4>\n<p>Reducing unnecessary access rights to minimise attack surfaces.<br \/>Use of privileged access managers (PAM) to manage elevated rights. 26:06<\/p>\n<h4>10. Network Segmentation:<\/h4>\n<p>Segregating IoT devices and guest Wi-Fi from the main network.<br \/>Registering devices for network access based on MAC addresses. 29:40<\/p>\n<h4>Action Points and Call to Action:<\/h4>\n<ul>\n<li><strong>Review and Implement Cyber Security Framework:<\/strong><\/li>\n<li>Assess your current cyber security measures against New Zealand&#8217;s 10 critical controls.<\/li>\n<li>Consider adopting Kinetics&#8217; managed services for patching, backups, and centralized logging.<\/li>\n<li><strong>Enable and Enforce MFA:<\/strong><\/li>\n<li>Ensure MFA is enabled on all critical platforms and services.<\/li>\n<li>Develop and enforce a company-wide policy for MFA usage.<\/li>\n<li><strong>Regular Security Training:<\/strong><\/li>\n<li>Schedule regular security awareness training and phishing tests for all staff.<\/li>\n<li>Form a cyber security committee to oversee and improve security practices.<\/li>\n<li><strong>Asset Management:<\/strong><br \/>Utilize Kinetics&#8217; tools to track and manage hardware and software assets.<\/li>\n<li>Plan for the replacement of outdated equipment to enhance security and productivity.<\/li>\n<li><strong>Backup Verification:<\/strong><\/li>\n<li>Verify that all critical data, including SaaS applications, are backed up and can be restored.<\/li>\n<li><strong>Implement Application Control and PAM:<\/strong><\/li>\n<li>Use modern endpoint protection and password managers.<\/li>\n<li>Implement privileged access management to control elevated rights.<\/li>\n<li><strong>Network Segmentation:<\/strong><\/li>\n<li>Segregate IoT devices and guest Wi-Fi from the main network.<br \/>Register devices for network access based on MAC addresses.<\/li>\n<\/ul>\n<h4>For further details or assistance, please reach out to your account manager at Kinetics Group.<\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><span>The webinar, led by Matt Patterson, CEO of Kinetics, and guest Duncan Morrison from Aon, focused on the critical topic of cyber insurance, exploring whether businesses are truly insured against cyberattacks. They discussed the importance of having the right protections in place to qualify for cyber insurance and the evolving landscape of cyber threats and insurance expectations. Key points included the necessity of regular hardware and software updates, strong passwords, multi-factor authentication, and employee training to mitigate risks. Duncan emphasized the insurers&#8217; perspective on assessing risk, highlighting the significance of access controls, incident response plans, and the culture of cybersecurity within organizations. The session concluded with insights into how cyber insurers assess risk and the consequences of inadequate protection, stressing the importance of aligning with insurers&#8217; expectations to ensure comprehensive coverage.<\/span>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are the NZ Government recommendations for SME Business cyber-security? How does your business match up?CertNZ has been rolled into the new National Cyber Security Centre. They&#8217;ve released the 10 Critical Controls and a Cyber-Security Framework? What do they mean and how does your business cyber-security compare? Watch Kinetics CTO Bill Lunam as he unpacks [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":13313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5,11],"tags":[],"class_list":["post-13306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","category-webinar-recording"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/13306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13306"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/13306\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}