CYBER SECURITY Service in Rotorua and Taupo Regions

Ring 022 310 1879 to arrange Cyber Security Protection for your business, organisation or local government branch.

Cyber attacks are the new normal, unfortunately. Don't stay in denial: it's time to get professional help.

How?
We can painlessly Audit your System, Document it and Report to you on its current Cyber Security status. Our thorough training and years of industry experience can make a material difference to the risk you run from Cyber Attacks .


Cyber Security system audits Taupo Ransomware attacks are a daily reality here in New Zealand in 2017: endless criminals are constantly probing the home and business routers and systems in New Zealand, looking for a weakness to exploit. In fact there is a marketplace on the Dark Net where criminals buy and sell complete kits for hacking and extorting money from Internet users like you.

Office Cyber Security Support Rotorua taupo As the Yahoo debacle showed, most of the Spark Email Accounts and Passwords for Kiwis have been stolen and sold on the Dark Net, allowing anyone to hack your mailbox and read your mail, send you a virus and infect your PC with an extortion program.
What can you do? Ring us and get a plan of action within minutes, that will secure your IT against the everyday hacker. Then we can work out a longer term solution for your system as a whole.
Today a holistic approach is required: various applications and services need to be employed, not at any great cost, to make life difficult for the criminals. Let us help you with your IT Data, Email Addresses, Photos and Internet Access.

Small Business, Medium Business, Farms and Partnerships all need to be secured against Data Breaches, Extortion attacks, Ramsomware, Virus attacks, Worms and Zero Day attacks. To give an idea, attacks can come in through Email, through Java Updates, through Adobe Reader Updates, through, website visits (any website cn be infected), through Shared Photos and a USB stick, through a Smartphone charged at your Lapto or PC.

How to avoid it? Let us help you. Call 022 310 1879

Types of Threat in 2017:

Courier Post fake email, with link to fake website. Ransomware.

Email from a friend. It turns your PC into a Bot that sends infected email to your friends.

Fake Adobe Reader Update. It gets you to click it and it installs a Trojan Horse which hacks your PC.

Zero Day Exploit. It is an as yet unknown Virus that instantly executes and damages your PC. Anti Virus programs don't detect it, because it's too new.

Hack Email Account. Yahoo addresses and passwords were sold on the Dark Net. Buyers hack your mail, change your password and then ring you to offer help. They get you to let them access your PC, then they set it up as a Bot and steal your credentials. This is also a nuanced Phishing Attack.

DDOS. Distributed Denial Of Service Attack. Also DOS. Thousands of Bot Computers (like yours when it has virus) are commanded to simultaneously attack a Computer, ISP or Website. These have the power to shut down the whole Internet. Recently a large ISP in Boston Massachusetts was attacked, which resulted in loss of Internet for many people and companies in North America.

Peeping Tom. Certain weirdos hack into your Computer and use the Camera in it to spy on you, Creepy.
Many people put a little cardboard flap on their camera lens to block this. Hard to stop or detect.

Keystroke Logger. This is a program that records every key you press, on the keybord. It uploads the result every so often, to a Criminal Hacker. The hacker scans the log file for Credit Cards, Usernames and Passwords. Then they can sell those credentials on the Dark Net. The Keystroke Logger can be installed by a Trojan Horse infection, by an Infected Website, by an infected Android Smartphone or by a USB stick with some photos on it.

Direct Hacking. This is when a Criminal Hacker uses a program to probe for weaknesses in your Internet Router. Then when they find an Open Port or a Program with a weakness, they run another program that gives them direct control of your PC or Laptop.

WiFi Hack. They might sit outside your house and hack your WiFi, by guessing your Internet Router Password. Most people don't change their Internet Router Access Password, because they don't know that there is one. There is also the WiFi Access Password that can be hacked, then they can hack the Internet Router Access Password.
When they have control of your Internet Router they can send out Spam Emails through your Internet Connection. Then you'll get into trouble and your ISP will block you.

Opportunistic Hacking. This is when people just try to Remotely Login to your Computer by guessing a username and password. Many people have no password so it's pretty easy, especially if you know their name.

Social Media Hack. This is when someone gets your Facebook or Instagram account details from somewhere. They then login as you and redirect your emails to themselves. They can then try to figure out your other Social Media logins by guessing and resetting the passwords, which they can do because they intercept the Password Reset emails. They eventually work their way to your Google Profile (everyone has one) and there they can access your Saved Website Passwords. With those they can visit all your websites, like your Bank and the IRD, logging into them easily and stealing your money, your Information and your Identity.

Identity Theft and Bank Account Theft. See above. The Criminal Hackers transfer your money to themselves by accessing your Internet Banking accounts with stolen Credentials.

Proprty Theft. See above for how they start. These Criminals get access to your Emails using some Phishing method, or through a purchase on the Darknet. They then intercept Email documents that your send or recieve. They use the documents, like Land Title Deeds, Share Certificates, University Degrees directly, to obtain cash, or they transfer Title of Properties to themselves. They can also use the documents to obtain Drivers Licenses or Passports, get Pension Moneis paid out, get free Medical Procedures or whatnot.