Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
New Zealand’s AI Revolution: How Artificial Intelligence is Transforming Productivity in 2025
New Zealand is experiencing a remarkable transformation in 2025, with artificial intelligence driving unprecedented productivity gains across diverse industries. According to recent surveys, 82% of New Zealand organisations now use AI in some capacity, representing a...
AI-Driven Productivity Gains in New Zealand (2025)
New Zealand’s businesses are experiencing notable productivity increases in 2025 due to the use of Artificial Intelligence (AI). Across diverse industries – from manufacturing floors to rural farms – AI technologies are streamlining operations, cutting costs, and...
Webinar Replay: A real world guide to AI
You’ve heard the hype on how amazing AI is, and then you tried it and were… underwhelmed. Or maybe you’ve read how dangerous AI is, and so you don’t want anyone in your organisation to risk using it. So, what is the AI reality for people that work in small to medium...
EchoLeak: What It Is, Why It Matters, and Why You Can Still Trust AI
The excitement around AI is plain to see, but it is tempered by an understandable caution. Many readers will be using AI to work smarter—from writing emails to analysing reports. But the caution is appropriate. Just like any powerful tool, AI needs to be used...
Have you considered the extent to which your business already depends on AI?
AI may be subtly operating behind the scenes, without your awareness. From tools that draft emails or streamline customer support to applications that analyse data trends or enhance productivity, AI is increasingly becoming an integral component of modern professional...
Drowning in Emails? 6 Tips to Conquer Your Outlook Inbox & Reclaim Your Time
Let's face it: for many of us, the Outlook inbox has become a digital black hole. Notifications ping, numbers climb, and the constant pressure to respond can feel overwhelming. It’s a modern workplace reality, but it doesn't have to control your day. You can regain...
June 2025 Report: Cyber is now the THIRD largest economy in the world
As we approach the midpoint of 2025, New Zealand’s cyber security landscape continues to evolve rapidly. With digital transformation accelerating across sectors, the country faces a growing array of cyber threats—ranging from financially motivated scams to...
AI Innovations and Legal Battles: A Month in Review
AI Innovations and Legal Battles: A Month in Review This month has been a whirlwind of advancements and legal drama in the AI industry. Alibaba's New AI Models Alibaba kicked off the month by unveiling Qwen3, a new family of AI models that reportedly match, and...
A practical guide: How much cyber security investment do I really need?
Cyber costs seem to keep increasing every year. There is always something more that is needed. Organisations can’t afford to over-invest but they can’t afford to under-invest either. It’s a tightrope so we thought it would be useful to prepare a simple guide.A...
To use, or not to use, AI to transcribe a meeting.
We understand that capturing the details of meetings is crucial. But manual note-taking is time-consuming, prone to errors, and often leaves important nuances lost. Enter AI transcription AI Transcription is a rapidly evolving technology promising accurate, efficient...









