Comments for iT360 https://it360.co.nz People focused, Cloud IT Company & IT Support in Auckland, New Zealand Sun, 04 Jun 2023 19:57:00 +0000 hourly 1 Comment on 21 Cyber Security Terms Business Owners Need to Know (Including Analogies to Help You Understand Them Better) by Discover Which Email Addresses Are Used in the Dark Web https://it360.co.nz/cyber-security-terms/#comment-791 Wed, 27 Nov 2019 18:15:03 +0000 https://it360.co.nz/?p=3367#comment-791 […] a variety of tactics used here namely social engineering (impersonating the CEO) and probably taking advantage of a data breach or lack of multi-factor […]

]]>
Comment on Cyber Security 101: A Guide to Protecting Your Business Online by Canva and PDL Data Breach 2019: 3 Steps You Need to Do Now https://it360.co.nz/cyber-security-101-guide-to-protecting-your-business-online/#comment-790 Wed, 27 Nov 2019 18:14:47 +0000 https://it360.co.nz/?p=3273#comment-790 […] Cyber security is a topic you should take seriously, especially when it comes to your business. The risks and too great for you to ignore. […]

]]>
Comment on Change Your Passwords Now: Collection #1 Data Breach by Canva and PDL Data Breach 2019: 3 Steps You Need to Do Now https://it360.co.nz/change-your-passwords-now-collection-1-data-breach/#comment-789 Wed, 27 Nov 2019 18:14:25 +0000 https://it360.co.nz/?p=2548#comment-789 […] People Data Labs (PDL) contained over 622 million email addresses. While this isn’t as big as the Collection #1 breach earlier this year, this should concern you […]

]]>
Comment on 4 Emerging Security Monitoring Technologies by Digital Transformation: A Modern Business Requirement | iT360 https://it360.co.nz/4-emerging-security-monitoring-technologies/#comment-757 Mon, 25 Nov 2019 18:05:27 +0000 https://it360.co.nz/?p=2258#comment-757 […] Is your business thriving in today’s digital age? Or are you still relying on outdated technology while your competitors are investing in new, emerging technologies? […]

]]>
Comment on Cyber Security 101: A Guide to Protecting Your Business Online by How Retail Can Survive the Technology Disruption Tsunami | iT360 https://it360.co.nz/cyber-security-101-guide-to-protecting-your-business-online/#comment-715 Wed, 20 Nov 2019 10:59:32 +0000 https://it360.co.nz/?p=3273#comment-715 […] Maximising security without compromising performance is a must when you want to streamline protection across a central data centre and the cloud. This can be done with the help of hybrid cloud security to help you lower operation costs and risks – while having a rapid response to threats in real-time. This means having a peace of mind knowing that your active and dormant virtual machines are protected.  […]

]]>
Comment on iCloud Hacking: Not Just for Celebrities by Sophie Thompson https://it360.co.nz/icloud-hacking-not-just-for-celebrities/#comment-615 Thu, 31 Oct 2019 22:46:09 +0000 http://it360.marcomworks.com/?p=285#comment-615 Advice needed? One of our iPads was stolen 2 years ago and unfortunately we aren’t the most IT savvy people….. Regardless, we’ve just found a local families passwords stored on our iCloud account. We believe these people stole or bought our iPad off someone. We can’t find the serial number for this device at present, is there any other way we can get the police to prove it is our iPad in case they’ve actually changed the Apple ID by now. Or how can we find out the dates these passwords (30 of them) were stored?
Kind regards,
#ITignorant#Learningthehardway

]]>
Comment on Change Your Passwords Now: Collection #1 Data Breach by [Case Study] How We Helped Farro Fresh Focus More on Their Customers Instead of Worrying About Security Issues Causing Inefficiencies | iT360 https://it360.co.nz/change-your-passwords-now-collection-1-data-breach/#comment-609 Tue, 29 Oct 2019 13:30:12 +0000 https://it360.co.nz/?p=2548#comment-609 […] For example, the most common type of attack, email phishing, isn’t sent to a single person or a company. It’s sent to pretty much everyone in the cyber criminal’s database — which most likely would include yours. […]

]]>
Comment on No Cyber Security Policy? Your Business Could Be at Risk by Cyber Security 101: A Guide to Protecting Your Business Online | iT360 https://it360.co.nz/no-cyber-security-policy/#comment-608 Tue, 29 Oct 2019 08:50:16 +0000 https://it360.co.nz/?p=2361#comment-608 […] are your policies and how you company deals with online security and protection. This includes how you protect and […]

]]>
Comment on 5 Steps to Help You Recover from Targeted Cyber Attack by Cyber Security 101: A Guide to Protecting Your Business Online | iT360 https://it360.co.nz/5-steps-to-help-you-recover-from-targeted-cyber-attack/#comment-607 Tue, 29 Oct 2019 08:43:59 +0000 https://it360.co.nz/?p=2291#comment-607 […] This includes how you protect and backup your data, BYOD policies (Bring Your Own Device), what you do in the event of a breach, and how you communicate cyber security to your […]

]]>