Crime doesn’t always pay. The FSB reports (if you can read Russian) that they have taken down the “Revil” band of hackers. These are the people that have caused absolute havoc, from disrupting the US oil pipelines, to the Kaseya attack that took out businesses all...
Kinetics News
Kinetics COVID Policy
Our Covid-19 approach. A number of clients and partners are asking us about our Covid-19 policy, so we thought we'd share it! Like many workplaces, we've extensively consulted our team and worked through their range of views. Our workplace requires all visitors...
5 quick tips to help you save time every day in 2022
Who knows what 2022 will bring. We’re as happy as the next person to make predictions but we’d just predict we’d be wrong! About the only certain guess is that we’ll be under more pressure and with that, it makes sense to share a few everyday IT tips. 5...
Do you need to worry about the “Log4J” Cyber Security Zero-Day breach?
Mainstream media is abuzz with the latest software vulnerability. It is in a commonly used component called Log4J 2. This component is in widespread use and the risk is real. This is a fast paced and quickly changing alert. At the time of writing, the immediate...
What’s worse than having to pay Ransomware?
The answer : Having to pay it twice - (or even more). Your Cyber-Security is under more pressure than ever. According to Infosecurity magazine, "double" extortion ransomware victims are up a massive 935% - thats a ten-fold increase year-on-year. This is driven by the...
“Phishmas” – its not that punny
Whatever it takes to draw your attention to Cyber Security is worth it. Just because we take time off at Christmas doesn't mean the hackers do. They have taken a lot of heart from the way we have all embraced home-delivery for our shopping and are doubling down with...
Is your Fingerprint effective security?
Straight out of the movies We are all used to the idea of using our fingerprints to log into our cell phones and, for some of us, our laptops. We’ve been told fingerprints are secure, and effective for ‘biometric authentication’ In the movies, we see finger prints...
Have you been vished?
What is vishing? Vishing is scamming via phone calls, effectively "phishing" by voice, hence the name, Voice phishing - Wikipedia Unfortunately, like many other cyber-attacks, incidents are on the rise. Because the damage is done over a phone call, they are even...
Beware – Social Engineering! The number one security threat to business is your people!
Every business collects data, from sales leads to financial transactions and everything in between. Increasingly data is the new ‘gold’. The problem is, unlike actual gold that you can put in a vault, data is weightless, and your staff need access to your data to get...
Dodging dodgy websites
Not too long ago, (some) businesses tried to limit websites that people could visit during working hours. They blocked social sites and Trademe and so forth. The logic was that people should be working, not surfing the net. Luckily this seems to have faded – staff are...