{"id":15073,"date":"2025-08-20T11:26:55","date_gmt":"2025-08-19T23:26:55","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=15073"},"modified":"2025-08-20T11:26:55","modified_gmt":"2025-08-19T23:26:55","slug":"webinar-replay-rethinking-endpoint-security-smarter-strategies-for-a-safer-business","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=15073","title":{"rendered":"Webinar Replay: Rethinking Endpoint Security: Smarter Strategies for a Safer Business"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221; sticky_enabled=&#8221;0&#8243;]<h2><strong>Cyber-protection keeps getting more complex, more restrictive and more expensive.<\/strong><\/h2>\n<p>This month we are talking with expert Thomas Shobbrook.\u00a0 He updates us on the latest security trends and help us understand how well protected your device is out-of-the-box.\u00a0<\/p>\n<p><strong>We ask Thomas that hardest of all security questions <em>&#8220;what do I need to do to be secure?&#8221;<\/em><\/strong><\/p>\n<p>We explore what you can do to stay ahead. \u00a0Whether you&#8217;re shaping IT strategy or managing day-to-day operations, this session will give you actionable ideas to strengthen your security posture\u2014without the technical overload.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_video src=&#8221;https:\/\/youtu.be\/r1N-iiv5hU8&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221; sticky_enabled=&#8221;0&#8243;]<ul>\n<li>\n<div><strong>Meeting Introduction:<\/strong><span>\u00a0<\/span>Scott, Bill, and Thomas discussed the logistics of the meeting, including the attendance of Thomas and the use of Microsoft Teams for the webinar.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-2-timestamp-0\" title=\"Go to reference\">2:02<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Endpoint Security Webinar:<\/strong><span>\u00a0<\/span>Scott introduced the webinar topic on endpoint security, mentioning the roles of Bill and Thomas in the discussion. Bill and Thomas will talk about endpoint security, with Bill being the Chief Technology Officer and Thomas being a Senior Solutions Engineer at Enable.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-3-timestamp-0\" title=\"Go to reference\">8:50<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Thomas&#8217;s Background:<\/strong><span>\u00a0<\/span>Thomas introduced himself, explaining his background in managed services and his focus on security, including configuration of firewalls, endpoint security, and web filtering.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-4-timestamp-0\" title=\"Go to reference\">10:47<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Current Cyber Threats:<\/strong><span>\u00a0<\/span>Thomas and Bill discussed the current cyber threat landscape, highlighting the increase in phishing attacks and the sophistication of ransomware. They emphasized the importance of protecting against these threats.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-5-timestamp-0\" title=\"Go to reference\">12:58<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Antivirus vs. EDR:<\/strong><span>\u00a0<\/span>Thomas explained the difference between traditional antivirus software and Endpoint Detection and Response (EDR). While antivirus relies on known threats, EDR focuses on detecting suspicious behavior, making it more effective against modern threats.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-6-timestamp-0\" title=\"Go to reference\">20:14<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Importance of Multi-layered Security:<\/strong><span>\u00a0<\/span>Thomas emphasized the need for a multi-layered security approach, including protecting user credentials, using dark web monitoring, and continuous user training to defend against various cyber threats.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-7-timestamp-0\" title=\"Go to reference\">25:11<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>SMB 1001 Framework:<\/strong><span>\u00a0<\/span>Bill introduced the SMB 1001 framework, a standard for small and medium businesses to follow for cybersecurity. This framework offers different tiers based on risk profile, budget, and practicality.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-8-timestamp-0\" title=\"Go to reference\">32:29<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Upcoming Webinar:<\/strong><span>\u00a0<\/span>Bill announced the next webinar, which will cover real-world examples of AI being used in businesses, including a recent implementation at Kinetics.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-9-timestamp-0\" title=\"Go to reference\">37:58<\/button><\/span><\/div>\n<\/li>\n<li>\n<div><strong>Q&amp;A Session:<\/strong><span>\u00a0<\/span>Scott addressed questions from the attendees, including the importance of password management and the SMB 1001 standard. Bill and Thomas provided additional insights and resources for further information.<span>\u00a0<\/span><span><button class=\"responseTimestampButton-384\" id=\"56fc5df0-dae4-4f3e-bdf4-154ad5aaf178-10-timestamp-0\" title=\"Go to reference\">39:18<\/button><\/span><\/div>\n<\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;][et_pb_text disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;et_body_layout&#8221;]<p><span>The webinar, led by Matt Patterson, CEO of Kinetics, and guest Duncan Morrison from Aon, focused on the critical topic of cyber insurance, exploring whether businesses are truly insured against cyberattacks. They discussed the importance of having the right protections in place to qualify for cyber insurance and the evolving landscape of cyber threats and insurance expectations. Key points included the necessity of regular hardware and software updates, strong passwords, multi-factor authentication, and employee training to mitigate risks. Duncan emphasized the insurers&#8217; perspective on assessing risk, highlighting the significance of access controls, incident response plans, and the culture of cybersecurity within organizations. The session concluded with insights into how cyber insurers assess risk and the consequences of inadequate protection, stressing the importance of aligning with insurers&#8217; expectations to ensure comprehensive coverage.<\/span>.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Cyber-protection keeps getting more complex, more restrictive and more expensive. This month we are talking with expert Thomas Shobbrook.\u00a0 He updates us on the latest security trends and help us understand how well protected your device is out-of-the-box.\u00a0 We ask Thomas that hardest of all security questions &#8220;what do I need to do to be [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":15078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5,11],"tags":[],"class_list":["post-15073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","category-webinar-recording"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15073"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15073\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}