RESOURCES Security Awareness

The best ways to build cyber security resilience in your organisation is to have strong systems in place and staff that are well-informed of security risks and follow best-practices.

Check out below guidance and video trainings to help you detect and respond to phishing attacks and other cybersecurity threats.

Security awareness

Phishing Attacks

If you think you’ve been sent a phishing email, here’s what to do next.

  1. If you haven’t done anything with the email, delete it.
  2. If you gave out some personal or financial details:
    • contact us and tell us what happened
    • change the passwords for any online accounts you think might be at risk
    • enable Multi-Factor Authentication for any online accounts if available
  3. Review CERT NZ recommendations, keep calm and read on…
Example of Netflix phishing attempt

How to recognise phishing attempts

Although you can’t prevent a phishing attack, there are things you can do to make sure you recognise one:

  • Know what to look for in a phishing email. You might notice that:
    • you don’t recognise the sender
    • the sender name doesn’t sound quite right
    • you don’t recognise the name of the company
    • the company logo doesn’t look like it should
    • the email refers to you in a generic or odd way — for example, ‘Dear You…’
    • the email contains bad grammar or spelling
    • if you hover over a link in the email with your mouse, the address that you see doesn’t match the place it’s saying it’ll take you.
  • Don’t click on web links sent by someone you don’t know, or that seem out of character for someone you do know. If you’re not sure about something, contact the person you think might have sent it to check first.
  • Use bookmarks or favourites to access websites rather than links in emails.
  • Check to see how the companies you deal with — like your bank — will contact you, so you’re more likely to recognise what’s a legitimate request and what isn’t.
  • If you have your own business, make sure you keep your support contracts (with your antivirus provider or your firewall provider, for example) up to date.
  • Follow us on Twitter and LinkedIn and look out for our real-life phishing examples in our Phish of the Day series.

Remember — if you don’t click on any links or attachments in a phishing email, your system is safe.

Password Training

Best practices for better passwords

Complete Cyber Risk Assessment Platform CyberScient

Get CyberSmart with CyberScient is our most recent initiative and  focuses on increasing cybersecurity awareness using self-assessment, training, and testing.

The online platform provides a free Kickstarter program to help organizations and individuals learn how to protect against online threats and cyber risks.

It all started with a desire to help all businesses lift their cyber posture since SMEs are at risk more than ever before, doing nothing is no longer an option and as specialists, we want to provide our customers and community a cost-effective solution.

Private DNS Firewall CyberShield

CyberShield is a managed security service utilizing the a private DNS Firewall to protect all users and devices against online threats such as Phishing, Malware, Botnets, and Ransomware, leveraging global and local threat feeds at the DNS layer.

When you use CyberShield, websites that contain malicious software or engage in phishing are blocked at the DNS layer. This means that no connection to the bad websites or web applications is established. provides dedicated NZ health cyber immunity using the community feedback loop strategy and continuous improvement to detect and respond to zero-day threats and minimize false positives.

Network and Application Vulnerabilities was created to provide New Zealand businesses and organizations access to a suite of cybersecurity services with cost-effectiveness top of mind. To give you the best value, we use a commonsense approach by prioritizing your most critical and vulnerable risks, and helping you address them in the most effective way.

Our Pentest service is including a full Network Penetration Testing, a complete Vulnerability Assessments, Source Code Review and much, much more.

All ethical hacking that takes place in a Pentest procedure is done manually by our expert team. Our team will identify specific risks to your business systems and data and provide proven mitigation strategies. was created to provide affordable penetration testing services for New Zealand businesses.