Cyber Security Services

Guard your business with cutting-edge threat protection

Get started

Cyber crime is on the rise and can be a big cost for any small and medium-sized New Zealand business if compromised. In a world where many of us are working from home more frequently and for days on end with the need to securely communicate with colleagues and access work files, seamless protection is non-negotiable.

For 16+ years, CodeBlue has been helping businesses by providing proactive tools and expert support to prevent attacks.

More than 1/3 of NZ businesses have been subjected to a cyber attack in the previous 12 months

42% of businesses believed they would suffer a cyber attack in the coming 12 months

1/3 of businesses who responded believe NZ is more at risk of cyber attacks than the rest of the world

1/3 of businesses weren’t aware of the impact and fallout a cyber attack would have on them

The Importance of IT Security

CodeBlue offers a managed Cyber Security Service and also provides blended services, that is we match our services with your existing IT security solutions you may already have in place.

Our aim is to help our customers avoid the damage an IT security breach can cause. Reputational damage, loss of business, regulatory fines and safety concerns are all potential consequences of an information security breach.

The focus at CodeBlue is to minimise this risk at every turn, through security in depth, to ensure your business does not suffer these serious consequences.

Internet Protection Shield

Our Internet Protection Shield not only blocks malware, botnets and phishing over any port, protocol or application, but also detects and contains advanced internet-based attacks before they can cause wide-spread damage.

This global service blocks more than 80 million malicious requests every day, with more than 65 million active users, and is spread across 25 data centres worldwide.

Our Internet Protection Shield combines the services listed below to give New Zealand the most complete cyber security services available.

Leased Firewall

CodeBlue will recommend a firewall suitable for your network. CodeBlue can lease recommended hardware options to you for a simple monthly fee. Under this service, the firewall and accompanying warranty will remain the property of CodeBlue.

Mail Filtering

An enterprise-grade email gateway with comprehensive filtering, content control and data loss prevention capabilities, delivered from a NZ-based cloud service provider.

Inbound and outbound scanning of all email messages and attachments, removing 99.999% of spam and 100% of known viruses.

Web Filtering

With more than 100 content categories, covering billions of web pages, this option allows you to control which web sites can be accessed by users on your network for a proactive security approach.

Endpoint Protection (AV)

This option provides a combined anti-virus, anti-malware protection layer for desktops, laptops and servers across your network.

Endpoints subscribing to this service connect to CodeBlue’s central management server over the internet to ensure signature updates are distributed automatically in a timely manner, whether they are operating on or off your network.

Managed Cyber Endpoint Detection and Response (MDR)

Many EDR platforms require significant human resources to manage the various detection sources, rulesets and workflows as well as requiring experience to triage and react to alerts.

CodeBlue’s Managed EDR (MDR) service provides a turnkey solution designed to provide our customers with enterprise grade protection across their endpoints, servers, and networks; helping to defend against ever increasing cyber threats.

Additional Services

Cyber Security Awareness Training & Phishing Triage

Our Security Awareness Training & Phishing Triage service focuses on prevention through detection. This service helps train your staff to recognise and understand the risks associated with the ongoing problem of social engineering. The service makes reporting a suspicious email simple and low risk. We utilise a recognised world class, simulated attack platform combined with a library of security training material.

Cyber Security Incident and Event Management (SIEM)

SIEM technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources.

SIEM’s have incredible benefits to offer but can be a burden on the IT teams of most organisations in terms of deployment, management and ongoing staffing of an internal security operations centre (SOC).

The CodeBlue SIEM service is a combination of a leading SIEM system, a private cloud data centre and an industry leading SOC. This is packaged into a service that can provide a turnkey SIEM solution for enterprise and small to medium size businesses.

Frequently asked questions

Officially, the term “hacking” had no negative connotations; it simply denoted a term for cleverly designing or describing a “coded” piece of software.

Hacking is now widely regarded as a purposeful ‘cyber-attack’ to breach digital devices, such as computers, smartphones, tablets, and even entire networks for nefarious purposes; it is therefore considered a major felony.

By 2021, global cybercrime damage is predicted to reach $6 trillion dollars. This is the single greatest transfer of economic wealth in history, considered to be more profitable than the global trade of all major illegal drugs combined. (https://cybersecurityventures.com/annual-cybercrime-report-2020/)

While there are various methods of dangerous cyber-attacks, here are most common hacking examples you may have heard about or had the misfortune of being affected by.

Ransomware
Ransomware is a type of malware that encrypts files on a device=, making them unusable for the files and the systems that rely on them. Then, in exchange for decryption, malicious hackers propose a ransom to be paid off.

Malware
Malware is a software that can be used to carry out a range of destructive functions. Some malware strains are aimed to gain persistent network access, while others are designed to spy on the user, in order to obtain credentials or other useful information.

Phishing
A phishing attack occurs when an attacker attempts to deceive an unsuspecting target into divulging sensitive information, such as passwords, credit card information, intellectual property, and so on. CERT NZ’s Quarter One (Q1)in 2021 reported phishing as the most common cyberattack in New Zealand.

Distributed Denial-of-Service (DDoS) attack
A DDoS assault occurs when an attacker floods a target server with traffic in the hopes of disrupting, if not completely shutting down the target. Unlike classic denial-of-service assaults, which are detectable by most modern firewalls, a DDoS attack can use numerous compromised devices to flood the target with unwanted traffic.

We’ve all heard about the Waikato DHB’s ransomware attack in mid-March 2021, which was the country’s largest-ever cyber-strike. The ransomware was expected to cost DHB tens of millions of dollars and compromise the data integrity of the DHB.

https://www.rnz.co.nz/news/national/443589/waikato-dhb-data-breach-likely-seven-eight-figure-cryptocurrency-ransom-expert

You may have also heard of the ransomware attack on Kaseya in July 2021, which became the world’s largest ransomware attack on record, affecting thousands of businesses all across the world.
At this time, 11 New Zealand schools have been confirmed to have been impacted by the security vulnerability, with more to follow.

https://www.nzherald.co.nz/world/scale-details-of-massive-kaseya-ransomware-attack-emerge/KWI34JA7GV6U3VHU4X66ZCXT6M

According to the KPMG Global Outlook Survey, 48 percent of New Zealand businesses believe they are well prepared for a security crisis in 2019. We can only speculate whether they were prepared, considering the events of 2021.

Unpatched systems, single factor authentication, improperly configured remote access, and
inadequate malware control, account for 95% of cyber breaches. You’d be amazed how many organisations ignore the fundamentals of security.

Gone are the days where only the multinational corporations have to worry about cyber-attacks, small and medium-sized enterprises (SME) must also consider their security options.

While this isn’t an impossible endeavour, you’ll need an IT partner you can trust and who can back up
that trust with experience.

CodeBlue’s Cyber Security Service includes several product solutions which, when combined, provides a comprehensive level of protection to actively secure your systems and data from cyber threats and attacks for New Zealand businesses.

Our popular cyber security services include 8 separate managed, security solutions for maximum cyber security protection.

If you would like to find out more about our cyber security services, contact us today.

Helpful resources to keep your business secure.

Shrugging off Cyber Attacks just the tip of the CodeBlue Iceberg at Auckland’s City Sales

Read the Case Study +

Learn how companies are investing in their people to reduce security risks.

Read the Blog +

Learn how to protect your business from cyber attacks and what to do in case of a cyber attack.

Download the eBook +

MORE good reasons to transform with CodeBlue:

STRATEGIC TECHNOLOGY ROADMAP

We develop your strategic technology roadmap in alignment with your business objectives and work in partnership with you to achieve business success.

NO CONTRACT LOCK-IN

In everything we do, delivering exceptional customer experiences comes first. We are bound to our customers by ongoing quality service.

WE’RE GREAT VALUE

We provide cost transparency and deliver an enterprise-grade IT service without the enterprise grade price tag.

TALK TO US ABOUT YOUR CYBER SECURITY NEEDS

Fill out the form below to hear from one of our experts.

    • Hidden
    • Hidden
  • Hidden
  • Hidden
  • Hidden
  • This field is for validation purposes and should be left unchanged.

I’D LIKE TO KNOW MORE ABOUT CODEBLUE

SIGN UP TO OUR NEWSLETTER
CONTACT US