Cyber Security NZ
Protect yourself, your information & your organisation with Kinetics Group
Cyber Security Services

Don't wait
Hackers are circling – and getting smarter all the time. We’re ready to help you with a solution that meets your needs, and to get you locked down and safe quickly. We help you protect your Clients, Data, Private information, Identities, Financial information, Operational uptime and Reputation.
Book your free assesment with us now!
Choose a protection level:
Cyber Security Foundation
Including EDR, Security Awareness Education, Phishing Tests, MFA Management, DNS Filtering/Scrubbing, Shadow IT detection and more.
THE MINIMUM LEVEL SECURITY MEASURES ORGANISATIONS SHOULD BE TAKING.
Cyber Security Plus
Foundation plus Vigilance 24/7 EDR and Active Monitoring, 365 Online Backup, Password Vault, Data Leak Protection, an extra layer of email scrubbing, Breach Activity Scans and Deep Vulnerability Scans.
IF YOUR ORGANISATION RELIES ON DATA FOR ONGOING OPERATION OR REPUTATION, YOU SHOULD HAVE SECURITY PLUS.
Both Kinetics KARE cyber security plans include a pack of services that help keep your information in, and cyber breaches out! Your data is precious and should be treated as such. The main issue with protecting information is that you can’t lock it away because you need to use it to operate.
With both plans, not only does Kinetics provide protection software, but also education for your staff so they can actively work in the safest way possible and know how to identify potential risk to your organisation. Kinetics will also test them and present you the findings, so no one gets left behind on the security front. From blocking harmful websites, to scanning emails and deep scanning with antivirus, Kinetics has you covered when it comes to cyber security services in NZ.
If you are looking for the best level of protection, the Security Plus plan provides a much deeper level of cyber security, with endpoint protection and response which alerts users to the risks of a downloaded attachment, disconnects any infiltrated devices from the network you are using, assists with the prevention of internal attacks and help organisations align with insurance compliance for a full circle or protection. Plus is the technical support that you need, when you need it, not an app or extension that has been downloaded as a cheap solution to security that has no professional on the other end overseeing security or data privacy issues.
And potentially, most important of all;
Kinetics Security Plus plan provides managed password solutions, so your staff don’t make the all-too-common error of creating easy to guess passwords and never changing them. KARE Password Vault is customised to each business and means not even Kinetics can see into your passwords, or your employees.
Still not sure what plan is best for you? Contact Us here, we’d be happy to help give you the cyber security service you need!
Download our latest executive “10 minute” briefing to share with colleagues

Read some of the latest news on Cyber-Security
Cyber-war Seminar
Stories from the Cyber-war The simple reality is that cyber-crime is now a mega-business. The cost and effort to combat it grows all the time. "Is it worth it?" Good question. Every organisation needs to choose a level of security and resulting cost, effort and...
What you need to know about the massive global ransomware cyber-attack over the weekend
The Risk Is Real. Over the weekend, thousands of businesses were caught up in a global cyber-attack that is being blamed on a Russian hacker group called Revil. It is disappointing when geo-politics impacts everyday business, and the reports talk about President Biden...
(yet) another reason Why paying ransomware demands hurts. (The FBI agrees)
We don't negotiate with terrorists Recently, we asked the question if organisations should pay ransomware demands. There is a balance between desperation and the uneasy knowledge that you might be funding further criminal attacks on the community. We’ve just read a...
Pretending to be you or your colleagues
Just because it seems safe, doesn't mean it is. On some emails, you might see a warning that marks them as being ‘external’. This gets added as the email comes into your organisation. The idea is a simple one – if you see an email marked as external, then you will be...
Avoiding ad trackers when you browse the ‘net
Your own personalised stalker It always seemed slightly creepy that your computer shows advertising that is strangely accurately targeted at things you might have been interested in. On the surface, that seems quite useful. If you have to tolerate ads on your...
Phishing emails are getting smarter every day
In the old days (ie last year!!), a dodgy email had a whiff to it – there was something that triggered your subconscious. That’s because some phishing emails were really badly written with terrible English. But others just had a sniff about them- something that made...
A cyber-criminal only needs to get lucky once. You have to stay ahead of them all day, every day
"A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.” - Combating Ransomware - A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force. The message we hear from governance boards over...
Do you know where all your organisations data is? You don’t know what you don’t know
What is 'Shadow IT'? Shadow IT refers to the various web tools informally in use within most organisations. These tools are often chosen without reference to IT or to management in general. They are often used for all the very best reasons. Your colleagues have work...
Bad news email attachments
Some emails are more than just bad news No one likes bad news! But sometimes it can’t be helped. Sometimes it sneaks up on you. One of the most common ransomware attacks is through a compromised attachment in an email. It’s easy to say “only open stuff you expect” but...
When you willingly share data, how do you stop it leaking?
Data Leak Protection (DLP) is the name of several policies in Office 365, setting up what data can, and can't be, shared and with whom. Imagine being able to automatically identify private information like passport numbers, Health IDs or bank account details and make...