What is Cyber Security?
Cyber Security (also referred to as IT Security) is the practice of protecting the confidentiality, integrity and availability of business assets and systems. The term is broad-ranging and applies to everything from computer security to disaster recovery and end-user education
Cyber Security is a series of business processes and security technologies to safeguard the protection of your intellectual property from malicious threats and attacks
Current state in New Zealand
The number of reported Security breach events rises significantly each quarter in NZ. Despite most businesses not bothering to report these events – the trend is unwavering and shows no sign of slowing down. Bearing in mind that the vast majority of businesses do not report security breaches, financial losses are still in the millions per quarter and although difficult to quantify the reputational and operational impact is significant
New Zealand businesses understand that Cyber Security is important and you’ve all heard horror stories about various attacks and even accidental data leakage here in NZ – however, the “out of sight – out of mind” mentality still exists and businesses still do not protect themselves sufficiently … if at all
When it comes to Cyber Security you’re only as strong as your weakest link
How can we help?
Being a Cloud Service Provider we know a bit about Cyber Security … in fact, security is our number 1 priority and it will remain so
Our Security expertise, principles, policies and technology that is applied to our own hosted Cloud Services can be deployed to your own IT systems and services providing a robust, managed security solution
We believe Security is a process – a mix of people, business procedures and technology striving for continuous Security improvement. It is not a one size fits all approach, nor is it a set and forget exercise … it requires a rhythm of monitoring, reporting, upgrading and testing to ensure you remain protected
Cyber Security risks are here to stay – businesses should be focused on proactive threat detection and prevention rather than reactive remediation of attacks
Quality Cyber Security involves people, process & technology … it is about defining internal business policy, educating end users, deploying appropriate security technology and having your Security monitored, maintained, reported on and managed to ensure you remain proactive, current and secure
Contact us today to discuss your Cyber Security, understand the likelihood of a potential security breach & what can be done to avoid this occurring
Go2Host Cyber Security Services
Security Operations Management
End to end monitoring, reporting, maintenance and managed security operations from Cloud to the Desktop and everything in between
Network, Perimeter & Firewall Management
Focusing on prevention of perimeter breaches and security hardening of your Internal Networks
Intrusion Detection System (IDS) & Intrusion Prevention System (IPS) Management
Granular monitoring, blocking and remediation based on user and event analysis
Security Testing
Vulnerability Scanning and Penetration Testing of Infrastructure, Systems & applications to identify and remediate known and potential vulnerabilities
Private & Hybrid Cloud Security Management
Safeguarding your Cloud services and assets
Business Continuity
Plan B to maintain business operations and return to service after a security breach
Web Application Firewall (WAF) & Reverse Proxy solutions
Best practice web app security solutions
End User Security Education
Training on end user Security best practices and the implications for not adhering to those best practices
CERT NZ recently reported that scams, fraud, phishing, credential harvesting, and malware remain the highest reported incident categories (accounting for 81% of all reported incidents)
Many of these breaches can be avoided by educating your end users on basic do and dont’s in their roles as PC operators … knowledge of what to look out for can be very valuable and could save your business from a security breach
Talk to us about how we approach End User Security Education and the real life examples and consequences of why your staff are vital to the success of your overall Cyber Security
Security Assessments
Security posture base-lining and consultation for on premise Infrastructure, Endpoints, Cloud Infrastructure & hosted Applications
Security Strategy
Focusing on developing security and risk mitigation strategies
Cyber Security Risks
Potential Security gaps are broad and varied – here a few common attack vectors and Security challenges
IT Infrastructure
Network Infrastructure … physical & virtual networking services & appliances
Firewall … misconfiguration, insecure perimeter devices, insecure DMZ, remote access, EDI
End Point … client PC’s, mobile devices, BYOD, malware, ransomware, antivirus
Database & Operating Systems … Servers, platforms, middleware, SQL injection, Cross Site Scripting
Physical Access … lack of physical secure access controls, Internet of Things (IoT)
Software & Applications
IT Lifecycle … patch management, system updates, lack of compliance with updated security standards
Application Code … software source-code exploits
Computer Standards … lack of a PC Standard Operating Environment with non-compliant software and version controls
Web Applications … brute force attacks, CMS logon, DDoS, API security
People & Social
Phishing … & credential harvesting, spam, social engineering, impersonations, hacktivism
Internet & Email misuse … lack of web content management and filtering systems
Education … lack of end user education and security awareness, lack of business policy and governance
Data Loss Prevention (DLP) … accidental data loss or external leakage, employee data theft
Business Processes … lack of on/off boarding processes, lack of IT change control
IT Administration
Authorisation … privileges, permissions and systems administration abuse, untrusted 3rd party access
Authentication & Communications … lack of encryption, lack of password complexity, password policies, password storage management and user account sharing
FAQ’s
Service Portfolio
Multiple Services, 1 Service Provider … how can we help you today?
Servers
Run your business apps and IT services from our VPS, Dedicated or Container Servers. Host your Servers on best of breed Hypervisor, Storage & High Availability Server Infrastructure. Cost effective, custom specifications and scalable on demand
HA Clusters
All compute services are delivered from our own High Availability clusters in Auckland. Our HA clusters are built for availability, reliability, scalability and performance. Our Infrastructure is 100% owned, built and operated by us
Platform as a Service (PaaS)
Test, Dev, Pre-Prod, Staging, UAT, QA … whatever your phase of the development lifecycle host your apps on our Platform as a Service (PaaS) and / or Database as a Service (DBaaS) Clusters. Focus on development without having to manage the underlying Infrastructure and middleware
Infrastructure as a Service (IaaS)
Cost effective, high availability, scalable Infrastructure on demand. Our Infrastructure as a Service (IaaS) offering eliminates capital investment and operational overhead, is fully customisable and super secure with amazing performance
Containers
Containers are highly portable and offer the best density on a hardware to application ratio … this delivers great scalability and ensures they’re a viable proposition particularly with application development
Storage as a Service (StaaS)
Enterprise Block, Object & File Storage built on high performance fault tolerant Storage clusters for your Servers, Databases and everyday business Storage requirements
IT Managed Services & Operations Management
Go2Host’s proactive IT Managed Services provides fixed cost, guaranteed resource availability and “all you can eat” IT management with unlimited scope options – reach out to Go2Host, your experts for IT Managed Services
Strategic Management
Owners of your IT leadership and strategic management. Valued partners for solution architecture design, service delivery, IT cost out opportunities and overall strategic direction
About Us
Check out a bit about who we are and what we care about, our values, technologies and datacentres
Consultancy & Project Management
IT Consulting, Project and Programme Management expertise for your next IT project. Also offering consultancy for LEAN Six Sigma, IT licensing, auditing, PCI and IT industry compliance
IT Operations & Support
For all your IT operations, systems administration, Infrastructure management, end user client support, maintenance break / fix, systems integration and networking requirements
Lifecycle Management
Our IT infrastructure and asset lifecycle programme management includes asset refresh, firmware upgrades, version controls, patching schedules and functionality enhancements for all hardware, software, platforms, appliances and toolsets. Call us today and avoid a situation where your business is hamstrung by legacy systems that haven’t been maintained or upgraded
Change Management
Disciplined, mature IT Change Management eliminates human error which is the number 1 reason for IT failures. Adopt a change control process and avoid unnecessary disruption from failed changes
Internet Service Provider
Fast, reliable, UFB Fibre Broadband and dedicated, uncontended Business grade Fibre Internet circuits. All links are monitored and include unlimited data, no contracts, no install charge, no shaping and plenty of optional extras
Managed Networks & Firewalls
Network design, build, integration, monitoring and management services for LAN, WAN, Firewalls, Routers, WiFi, VPN’s, Load balancing, Proxy and Content Management. Specialist Managed Network service for customers who value performance, traffic optimisation and robust network security
Wide Area Networks
Multi-site inter-connectivity providing private, dedicated, layer 3 WAN services. Best in class networking performance for your site locations
VoIP & Cloud PBX
Our Enterprise grade Cloud PBX services offer high performance, amazing quality, secure, reliable Voice over Internet Protocol (VoIP) communications. Super flexible calling and call routing options to suit every business size and Voice requirements
Email Hosting
Email services rivalling Office 365 functionality with all the bells and whistles you’d expect from a modern Email solution. Plenty of configuration options from our secure, high availability hosted Email service
Phone Numbers
New or existing local, regional or international phone numbers and free-call numbers available with custom phone number selection. Significant cost savings and numerous VoIP end point options available from IP handsets, Softphones, SIP on cell phone and analogue telephone adapters to choose from
Cyber Security
Check out our Cyber Security offerings and why this is important to your business. Everything from Security and risk assessments, Security breach remediation and vulnerability scanning from perimeter to end points. Chat to us on how we manage, monitor, report & maintain security operations
Virtual Private Networks (VPN)
Still the most secure, cost effective and seamless method for external remote access to internally (or externally) hosted business resources. We provide robust Virtual Private Network as a Service (VPNaaS) gateways providing secure, encrypted VPN tunnels for always on site-to-site VPN’s or on demand client based VPN access
SSL Certificates
A must have for any website. Protect your website, improve customer perception and increase customer visitation with SSL encryption. Get yourself a cost effective certificate today
Network & Perimeter Security
Network security is a vital component of your overall Cyber Security posture. Not just Internet and perimeter but internal Local Area Networks (LAN’s) … have a chat to us about our Managed Firewall and Managed Networks & Security services to safeguard your IT assets, data and intellectual property
Web Design & Development
Custom website design and development including mobile responsive and eCommerce built on modern Open Source PHP frameworks with Content Management Systems (CMS). Also offering Website performance optimisation, repairs, maintenance, security, CMS training and cosmetic content changes
Web Hosting
World class, high performance Web Hosting on our High Availability Cluster with industry leading cPanel or Plesk control panel options. Flexible, cost effective, managed or unmanaged hosting plans to choose from with plenty of bundled extras
Domain Names
A domain name will instantly make your business appear more professional, trustworthy and add credibility. Endless domain name extensions to choose from. Domain registration includes unlimited DNS changes and support. Speak to us today about registering your new domain name
Business Continuity & Disaster Recovery (BC/DR)
Despite the threat of natural disasters and significant business disruption, BC / DR is something NZ business is yet to fully embrace. We provide IT risk consultancy and BC / DR solutions to ensure your downtime is eliminated or minimised and business operations are restored quickly
Backups
Our Cloud Backup as a Service (BaaS) eliminates capital expenditure on backup Infrastructure and avoids the administrative headaches of managing backups. Backup data is housed on our High Availability clusters, is replicated to a secondary Datacentre and all backup solutions receive custom scheduling, custom data retention periods and data restore testing as standard