{"id":205600,"date":"2021-06-24T20:15:01","date_gmt":"2021-06-24T07:15:01","guid":{"rendered":"https:\/\/legalvision.co.nz\/?p=205600"},"modified":"2024-05-21T15:26:24","modified_gmt":"2024-05-21T02:26:24","slug":"business-cyber-security","status":"publish","type":"post","link":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/","title":{"rendered":"8 Cyber Security Tips for Your Business"},"content":{"rendered":"\n<p><span style=\"font-weight: 400\">As a small business owner operating online in any capacity, you need to take stock of applicable <\/span><a href=\"https:\/\/legalvision.co.nz\/data-privacy-it\/does-my-new-zealand-business-need-a-cybersecurity-policy\/\"><span style=\"font-weight: 400\">cyber security risks<\/span><\/a><span style=\"font-weight: 400\">. Malicious actors will launch cyberattacks on weak systems, and it may not matter what information that system protects. If there is a weak spot they can exploit, then that is a risk for your business. You need to protect your digital systems, not only for your own business\u2019 safety but also to meet legal privacy requirements. If you handle customers\u2019 <\/span><a href=\"https:\/\/legalvision.co.nz\/data-privacy-it\/personal-information-nz\/\"><span style=\"font-weight: 400\">personal information<\/span><\/a><span style=\"font-weight: 400\">, you need to ensure you do so securely and in line with your legal responsibilities. For some assistance, this article will go through some tips for improving cyber security in your business.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">1. Conduct a Cyber Security Risk Assessment<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">Firstly, you need to conduct a risk assessment of your business\u2019 cyber security systems and regularly conduct such checks as time goes on. Once you identify areas of risk or exploitable gaps in your security, then you can find ways to mitigate those risks and plug those gaps. This assessment should include:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400\">evaluating and knowing your systems;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">identifying potential threats;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">exposing risk areas and vulnerabilities;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">determining impacts of an attack on your business;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">developing a response plan; and<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">implementing security controls tailored to your needs.<\/span><\/li>\n<\/ul>\n\n\n\n<p>It is also important to conduct security risk assessments on an ongoing basis. This way, you can identify any potential vulnerabilities before they are taken advantage of.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">2. Train Your Staff<\/span><\/h2>\n\n\n\n<p>Many cybersecurity breaches occur due to human error. As such, employees are often the first line of defence against cyber threats. Having training programs that create a security-conscious workforce is one way to help employees recognise, report and respond to potential risks. <\/p>\n\n\n\n<p>Additionally, you should e<span style=\"font-weight: 400\">nsure that your employees know what suspicious activity may look like and how they can report cyber security problems. Train them so that they implement <\/span><a href=\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-secure-online\/\"><span style=\"font-weight: 400\">secure operating procedures<\/span><\/a><span style=\"font-weight: 400\"> in the course of their work.<\/span><\/p>\n\n\n\n<div  class=\"box box--icon box--info\">\n    <p>For example, make it a workplace policy that staff cannot leave devices with sensitive information on them unattended.<\/p>\n<\/div>\n\n\n\n<p>You should also consider incorporating cybersecurity clauses into your employment contracts and any other confidentiality agreements. Such clauses clearly define expectations regarding data protection and security responsibilities, leading to a strongly protected workforce. <\/p>\n\n\n\n\n<a href=\"#content-next\"\n   class=\"block p-4 mt-10 text-xl font-bold text-center text-white no-underline bg-gray-800 rounded-t-xl\">\n    Continue reading this article below the form\n    <i class=\"text-xl fa-regular fa-arrow-down\"><\/i>\n<\/a>\n<div class=\"px-6 pt-10 pb-12 mb-10 text-center bg-gray-100 rounded-b-xl sm:px-12 test\">\n    <div class=\"mb-8 text-2xl font-bold text-orange\">\n        Need legal advice?\n        <br>\n        <span class=\"text-lg not-prose\">\n                            Call <a href=\"tel:+64800005570\" class=\"not-prose\">0800 005 570<\/a> for urgent assistance.\n                <br>\n                Otherwise, complete this form, and we will contact you within one business day.\n                    <\/span>\n    <\/div>\n\n    \n\n<div class=\"not-prose flex justify-center text-left gform_input_bg_white    \">\n    <script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework lawyer-form_wrapper gplaceholder_wrapper form-with-labels-no-asterisks_wrapper has-new-validation-error-styling_wrapper' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2452' style='display:none'><div id='gf_2452' class='gform_anchor' tabindex='-1'><\/div><form method='post' enctype='multipart\/form-data' target='gform_ajax_frame_2452' id='gform_2452' class='lawyer-form gplaceholder form-with-labels-no-asterisks has-new-validation-error-styling' action='\/api\/wp\/v2\/posts\/205600#gf_2452' data-formid='2452' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2452' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2452_15\" class=\"gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_15'>LinkedIn<\/label><div class='ginput_container'><input name='input_15' id='input_2452_15' type='text' value='' autocomplete='new-password'\/><\/div><div class='gfield_description' id='gfield_description_2452_15'>This field is for validation purposes and should be left unchanged.<\/div><\/div><div id=\"field_2452_1\" class=\"gfield gfield--type-text gfield--input-type-text gf_left_half gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_1'>First Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_2452_1' type='text' value='' class='medium'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2452_12\" class=\"gfield gfield--type-text gfield--input-type-text gf_right_half gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_12'>Last Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_12' id='input_2452_12' type='text' value='' class='medium'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2452_2\" class=\"gfield gfield--type-email gfield--input-type-email gf_left_half gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_2'>Email Address<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_2' id='input_2452_2' type='email' value='' class='medium'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2452_3\" class=\"gfield gfield--type-phone gfield--input-type-phone gf_right_half gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_3'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_2452_3' type='tel' value='' class='medium'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2452_14\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full custom-select gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_14'>Number of Employees in Your Business<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_14' id='input_2452_14' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' ><\/option><option value='0' >0<\/option><option value='1' >1-5<\/option><option value='6' >6-20<\/option><option value='21' >21-50<\/option><option value='51' >51-250<\/option><option value='250' >250+<\/option><\/select><\/div><\/div><div id=\"field_2452_4\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2452_4'>Tell us about your enquiry<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_2452_4' class='textarea medium'     aria-required=\"true\" aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><div id=\"field_2452_5\" class=\"gfield gfield--type-html gfield--input-type-html gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  >By submitting this form, you agree to receive emails from LegalVision and can unsubscribe at any time. View our <a href=\"https:\/\/legalvision.co.nz\/privacy-policy\/\" target=\"_blank\">Privacy Policy<\/a>. <\/div><div id=\"field_2452_8\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_8' id='input_2452_8' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='http:\/\/legalvision.co.nz\/api\/wp\/v2\/posts\/205600' \/><\/div><\/div><div id=\"field_2452_13\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_13' id='input_2452_13' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='generic_form' \/><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <button type=\"submit\" id=\"gform_submit_button_2452\" class=\"gform_button button\" onclick=\"gform.submission.handleButtonClick(this);\" data-submission-type=\"submit\"><span class=\"gform_submit_button__text\">Submit Now<\/span><\/button> <input type='hidden' name='gform_ajax' value='form_id=2452&amp;title=&amp;description=&amp;tabindex=0&amp;theme=gravity-theme&amp;hash=8d907caff460821c366ed2411b0c45b3' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2452' value='iframe' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2452' id='gform_theme_2452' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2452' id='gform_style_settings_2452' value='' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2452' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2452' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='AUD' value='F2HXC55HUMk9KpsUmgonrw0a\/kiN1C2+lGm0y6+r2iVT2QgIKbh3g1kbRWir4ldk36dL5lPXPvF9HunxxLL9cm7xurh7bJakrdD5pZwVCHj9Fbs=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2452' value='WyJ7XCIxNFwiOltcIjIyODY0N2ViMWU3NTcxZjA4YTY4NGJmMDcwMTk3Y2I0XCIsXCJiMzk3YmQ1MDBmMmFjNjk1ODE4MzdmNTBhYTA2MzQ0OFwiLFwiNGYyNGZkZGEwMzlkNDUxMWFhZGE1NGYwZmQwZmNiZTdcIixcIjUyMmJkMDE2M2I2ZmEwOTI3NDZhZjU5YTg0ZmM1NDk5XCIsXCIzODRlNjk1YjQxMTAzMWFiYmQ2ODEyMGYyZWFhMDYyNlwiLFwiYjkzNDcwNTE2MjkxOGRjZWViMjQzNzRjNmE0NGVmNTlcIixcIjQxMTliODZhMzVjYzJiMWViNDZiMmQ4NjRlNGUzZmNjXCJdfSIsIjQ3MjNiMzA2ZDIyZGVkODA2N2YyMjYyOThkYzI1ODVmIl0=' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2452' id='gform_target_page_number_2452' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2452' id='gform_source_page_number_2452' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div>\n\t\t                <iframe style='display:none;width:0px;height:0px;' src='about:blank' name='gform_ajax_frame_2452' id='gform_ajax_frame_2452' title='This iframe contains the logic required to handle Ajax powered Gravity Forms.'><\/iframe>\n\t\t                <script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2452, 'https:\/\/legalvision.co.nz\/wp-content\/themes\/legalv-v6\/img\/spinner.svg', true );jQuery('#gform_ajax_frame_2452').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2452');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2452').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){form_content.find('form').css('opacity', 0);jQuery('#gform_wrapper_2452').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2452').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2452').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/ jQuery(document).scrollTop(jQuery('#gform_wrapper_2452').offset().top - mt); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2452').val();gformInitSpinner( 2452, 'https:\/\/legalvision.co.nz\/wp-content\/themes\/legalv-v6\/img\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2452, current_page]);window['gf_submitting_2452'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2452').replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery('#gf_2452').offset().top - mt);jQuery(document).trigger('gform_confirmation_loaded', [2452]);window['gf_submitting_2452'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2452').text());}else{jQuery('#gform_2452').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2452\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2452\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2452\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2452\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2452, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div>\n<\/div>\n<div id=\"content-next\"><!-- scroll anchor --><\/div>\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">3. Have a Strong Password Policy<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">Despite the clear security ramifications, many people still do not employ solid passwords or rely on default credentials given when starting. Ensure you do not use factory-set passwords or logins and that your staff have a unique password where necessary. Employ the use of alphanumeric passwords or passphrases to improve security.<\/span><\/p>\n\n\n\n<p>Additionally, you should limit access to certain data on an as-needed basis. This means that employees should only be able to access the information required to perform their job, thus minimising the risk of data breaches. One way you can minimise access to information is through passwords. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">4. Enable Multifactor Authentication<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">Multifactor authentication (<strong>MFA<\/strong>), or similar two-factor authentication (<strong>2FA<\/strong>), is an added step for securing logins to your digital systems and accounts. This method involves requiring a second or third mode of identity verification when logging into an account or system, such as a phone number or identity question. You can implement this both for your internal logins, as well as your customers\u2019 logins. It would be helpful to enable MFA on any storage systems or banking services.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">5. Encrypt Your Data<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">Encryption is a security process in which you encode your business\u2019 critical data. This means you transform your data into scrambled code, which only the person with the correct key can translate back into readable data. You should encrypt data used for:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400\">storage; and<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">transmission.<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400\">Your digital storage systems should encrypt any data you hold. You should also ensure your website operates on a current SSL certificate, especially when handling customer payments. This means that any data they send you is encrypted and third parties cannot easily interfere with the connection.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">6. Keep Software Updated<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">Software updates can seem constant and never-ending, particularly when you operate on multiple different systems. However, you should endeavour to make sure that all of your digital systems are up to date. Manufacturers and developers implement bug and security fixes in updates, and if your system is out of date, this can increase your risk of a cyberattack. Where possible, keep software updates automatic and do not let them build up.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">7. Keep Data Backed Up<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">You should implement a regular data recovery system, keeping your important business data backed up for later retrieval. If your business is the victim of a malware attack or similar, this can corrupt your systems, and you can lose valuable information. Dealing with the fallout of such an attack is much easier if you can go back to an unaffected backup. It is best to back up all of your essential data, including:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400\">customer information;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">business details and data; and<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400\">system files and access logs.<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400\">Ensure that you keep these backups adequately secured as well.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">8. Develop a Response Plan<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400\">Implementing security measures can never eliminate the risk of a privacy or data breach. Therefore, you need to <a href=\"https:\/\/legalvision.co.nz\/data-privacy-it\/data-breach-response-plan\/\">develop a guideline<\/a> for what to do if you are the victim of a cyberattack or system breach. Dealing with such fallout can be stressful, but you can make the process much easier if you have a clear plan to follow. Develop step-by-step procedures for mitigating fallout and how your staff will take part in this process.<\/span><\/p>\n\n\n\n<p>Collaborating with cybersecurity experts can strengthen your response plan. Since the cybersecurity landscape is evolving rapidly, cybersecurity professionals can bring specialised knowledge and skills to protect your business against cyber attacks. At the same time, obtaining adequate legal advice plays a vital role in your collaboration with these cybersecurity experts. Non-disclosure agreements and contracts must be carefully drafted to protect both parties and ensure the confidentiality of sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">Key Takeaways<\/span><\/h2>\n\n\n\n<p>All businesses must protect themselves against the increasing threat that cyberattacks impose. However, this is particularly important for start ups, who are usually engaging with new technologies and are focused on developing a strong client base built on a foundation of trust. Some key cybersecurity practices businesses should understand and implement include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>employee training;<\/li>\n\n\n\n<li>implementing robust access controls;<\/li>\n\n\n\n<li>performing regular security assessments;<\/li>\n\n\n\n<li>preparing incident response planning;<\/li>\n\n\n\n<li>utilising data encryption and protection; and<\/li>\n\n\n\n<li>collaborating with cybersecurity experts.<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400\">If you would like more information or help with cyber security at your business, our experienced <a href=\"https:\/\/legalvision.co.nz\/business-lawyers-lp-new-zealand\"><\/a><a href=\"https:\/\/legalvision.co.nz\/it-lawyers-lp\"><span style=\"font-weight: 400\">IT lawyers<\/span><\/a> can assist as part of our LegalVision membership. You will have unlimited access to lawyers who can answer your questions and draft and review your documents for a low monthly fee. Call us today at&nbsp;<a href=\"tel:+64800005570\" class=\"AVANSERnumber dynamic-number\">0800 005 570<\/a> or visit our <a href=\"\/membership\">membership page<\/a>.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400\">Frequently Asked Questions<\/span><\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1621215503857\"><strong class=\"schema-faq-question\">What is encryption?<\/strong> <p class=\"schema-faq-answer\">Encryption is a security process that encodes data so that it is not immediately readable. Your important information is scrambled, and only the person with the appropriate key can decode and read it.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1621215526849\"><strong class=\"schema-faq-question\">What does MFA stand for?<\/strong> <p class=\"schema-faq-answer\">MFA stands for multifactor authentication. This refers to a security verification process, where you provide two or more identity verification factors when logging into your accounts or systems.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1621215537453\"><strong class=\"schema-faq-question\">What is a data breach?<\/strong> <p class=\"schema-faq-answer\">Data breaches are security incidents where an unauthorised person has accessed, misused, or deleted your data. Another kind of data breach is where something is preventing you from accessing your systems, like a denial-of-service attack.<\/p> <\/div> <\/div>\n<div class=\"not-prose m-feedback-prompt\">\n    <!-- Thumbs up\/down bar -->\n    <div class=\"m-feedback-prompt__main\">\n        <div class=\"m-feedback-prompt__title\">Was this article helpful?<\/div>\n        <div>\n            <!--span class=\"m-feedback-prompt__button--text\">Thanks!<\/span-->\n            <button type=\"button\" class=\"m-feedback-prompt__button m-feedback-prompt__button--yes\"\n                    data-analytics-link=\"feedback-prompt:yes\" aria-label=\"Agree\">\n                <i class=\"fa-regular fa-thumbs-up fa-3x\"><\/i>\n            <\/button>\n            <button type=\"button\" class=\"m-feedback-prompt__button m-feedback-prompt__button--no\"\n                    data-analytics-link=\"feedback-prompt:no\" aria-label=\"Disagree\">\n                <i class=\"fa-regular fa-thumbs-down fa-3x\"><\/i>\n            <\/button>\n        <\/div>\n    <\/div>\n\n    <!-- Feedback form -->\n    <div class=\"m-feedback-prompt__form\">\n        <div class=\"m-feedback-prompt__form--thanks \">\n            <div>Thanks!<\/div>\n            <p>\n                We appreciate your feedback \u2013 your submission has been successfully received.            <\/p>\n        <\/div>\n        <form id=\"contact-form\" class=\"m-feedback-prompt__form--form\" action=\"\" method=\"post\">\n            <input type=\"hidden\" id=\"authenticity_token\" name=\"authenticity_token\" value=\"3bc3beddae\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/api\/wp\/v2\/posts\/205600\" \/>            <input value=\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\" type=\"hidden\" name=\"currenturl\"\n                   id=\"currenturl\">\n            <input value=\"8 Cyber Security Tips for Your Business\" type=\"hidden\" name=\"currenttitle\"\n                   id=\"currenttitle\">\n            <label>\n                <!-- display on thumbs-up -->\n                <span class=\"m-feedback-prompt__feedback m-feedback-prompt__feedback--yes\">\n                    Can you tell us <span class=\"font-semibold\">why<\/span> you found it helpful?\n                <\/span>\n\n                <!-- display on thumbs-down -->\n                <span class=\"m-feedback-prompt__feedback m-feedback-prompt__feedback--no text-lg\">\n                    How can we better improve this article?\n                <\/span>\n                <textarea name=\"feedbackmessage\" id=\"feedbackmessage\" required><\/textarea>\n            <\/label>\n\n            <div class=\"m-feedback-prompt__form--error\" id=\"form-submit-error\"><\/div>\n            <button id=\"submit-contact-form-button\" type=\"submit\" name=\"commit\" class=\"m-feedback-prompt__form--submit\"\n                    data-analytics-link=\"feedback-prompt:submit\">\n                Submit            <\/button>\n        <\/form>\n    <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As a small business owner operating online in any capacity, you need to take stock of applicable cyber security risks. Malicious actors will launch cyberattacks on weak systems, and it may not matter what information that system protects. If there is a weak spot they can exploit, then that is a risk for your business.<a href=\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\">Continue reading <span class=\"sr-only\">&#8220;8 Cyber Security Tips for Your Business&#8221;<\/span><\/a><\/p>\n","protected":false},"author":13267,"featured_media":201733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"217225,202186,219739,206337,213097,213573","_relevanssi_noindex_reason":"","editor_notices":[],"footnotes":""},"categories":[28],"tags":[24,74,257,258],"class_list":["post-205600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-privacy-it","tag-startup","tag-online-business","tag-cybersecurity","tag-cybersecurity-policy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 Cyber Security Tips for Your New Zealand Business | LegalVision<\/title>\n<meta name=\"description\" content=\"Secure business cyber security is essential for any business operating online. Protected digital systems ensure legal obligations are met.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Cyber Security Tips for Your New Zealand Business | LegalVision\" \/>\n<meta property=\"og:description\" content=\"Secure business cyber security is essential for any business operating online. Protected digital systems ensure legal obligations are met.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"LegalVision New Zealand\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LegalVision\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T07:15:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-21T02:26:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Young\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LegalVision_law\" \/>\n<meta name=\"twitter:site\" content=\"@LegalVision_law\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Young\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\"},\"author\":{\"name\":\"Emily Young\",\"@id\":\"https:\/\/legalvision.co.nz\/#\/schema\/person\/9c6fb29bc5cc2f7f8385fb0915dfcba1\"},\"headline\":\"8 Cyber Security Tips for Your Business\",\"datePublished\":\"2021-06-24T07:15:01+00:00\",\"dateModified\":\"2024-05-21T02:26:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\"},\"wordCount\":1202,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/legalvision.co.nz\/#organization\"},\"image\":{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg\",\"keywords\":[\"startup\",\"online business\",\"cybersecurity\",\"cybersecurity policy\"],\"articleSection\":[\"Data, Privacy and IT Articles\"],\"inLanguage\":\"en-NZ\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#respond\"]}]},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\",\"url\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\",\"name\":\"8 Cyber Security Tips for Your New Zealand Business | LegalVision\",\"isPartOf\":{\"@id\":\"https:\/\/legalvision.co.nz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg\",\"datePublished\":\"2021-06-24T07:15:01+00:00\",\"dateModified\":\"2024-05-21T02:26:24+00:00\",\"description\":\"Secure business cyber security is essential for any business operating online. Protected digital systems ensure legal obligations are met.\",\"breadcrumb\":{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215503857\"},{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215526849\"},{\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215537453\"}],\"inLanguage\":\"en-NZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-NZ\",\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage\",\"url\":\"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg\",\"contentUrl\":\"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"How Can My NZ Startup Handle Information Security? | LegalVision NZ\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legalvision.co.nz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/legalvision.co.nz\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data, Privacy and IT Articles\",\"item\":\"https:\/\/legalvision.co.nz\/category\/data-privacy-it\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"8 Cyber Security Tips for Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legalvision.co.nz\/#website\",\"url\":\"https:\/\/legalvision.co.nz\/\",\"name\":\"LegalVision New Zealand\",\"description\":\"LegalVision is a commercial law firm in NZ with a commitment to innovation\",\"publisher\":{\"@id\":\"https:\/\/legalvision.co.nz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legalvision.co.nz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-NZ\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legalvision.co.nz\/#organization\",\"name\":\"LegalVision New Zealand\",\"url\":\"https:\/\/legalvision.co.nz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-NZ\",\"@id\":\"https:\/\/legalvision.co.nz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legalvision.co.nz\/wp-content\/uploads\/sites\/2\/2020\/11\/LegalVision_square_logo.png\",\"contentUrl\":\"https:\/\/legalvision.co.nz\/wp-content\/uploads\/sites\/2\/2020\/11\/LegalVision_square_logo.png\",\"width\":400,\"height\":400,\"caption\":\"LegalVision New Zealand\"},\"image\":{\"@id\":\"https:\/\/legalvision.co.nz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LegalVision\",\"https:\/\/x.com\/LegalVision_law\",\"https:\/\/www.linkedin.com\/company\/legalvision-group\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legalvision.co.nz\/#\/schema\/person\/9c6fb29bc5cc2f7f8385fb0915dfcba1\",\"name\":\"Emily Young\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-NZ\",\"@id\":\"https:\/\/legalvision.co.nz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96\",\"caption\":\"Emily Young\"},\"description\":\"Emily is a Legal Content Writer at LegalVision, where she is able to combine her interests of writing and the law. She graduated with a Bachelor of Laws (Hons) from Bond University in 2018.\",\"url\":\"https:\/\/legalvision.co.nz\/author\/emilyyoung\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215503857\",\"name\":\"What is encryption?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Encryption is a security process that encodes data so that it is not immediately readable. Your important information is scrambled, and only the person with the appropriate key can decode and read it.\",\"inLanguage\":\"en-NZ\"},\"inLanguage\":\"en-NZ\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215526849\",\"name\":\"What does MFA stand for?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"MFA stands for multifactor authentication. This refers to a security verification process, where you provide two or more identity verification factors when logging into your accounts or systems.\",\"inLanguage\":\"en-NZ\"},\"inLanguage\":\"en-NZ\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215537453\",\"name\":\"What is a data breach?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Data breaches are security incidents where an unauthorised person has accessed, misused, or deleted your data. Another kind of data breach is where something is preventing you from accessing your systems, like a denial-of-service attack.\",\"inLanguage\":\"en-NZ\"},\"inLanguage\":\"en-NZ\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Cyber Security Tips for Your New Zealand Business | LegalVision","description":"Secure business cyber security is essential for any business operating online. Protected digital systems ensure legal obligations are met.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"8 Cyber Security Tips for Your New Zealand Business | LegalVision","og_description":"Secure business cyber security is essential for any business operating online. Protected digital systems ensure legal obligations are met.","og_url":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/","og_site_name":"LegalVision New Zealand","article_publisher":"https:\/\/www.facebook.com\/LegalVision","article_published_time":"2021-06-24T07:15:01+00:00","article_modified_time":"2024-05-21T02:26:24+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg","type":"image\/jpeg"}],"author":"Emily Young","twitter_card":"summary_large_image","twitter_creator":"@LegalVision_law","twitter_site":"@LegalVision_law","twitter_misc":{"Written by":"Emily Young","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#article","isPartOf":{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/"},"author":{"name":"Emily Young","@id":"https:\/\/legalvision.co.nz\/#\/schema\/person\/9c6fb29bc5cc2f7f8385fb0915dfcba1"},"headline":"8 Cyber Security Tips for Your Business","datePublished":"2021-06-24T07:15:01+00:00","dateModified":"2024-05-21T02:26:24+00:00","mainEntityOfPage":{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/"},"wordCount":1202,"commentCount":0,"publisher":{"@id":"https:\/\/legalvision.co.nz\/#organization"},"image":{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg","keywords":["startup","online business","cybersecurity","cybersecurity policy"],"articleSection":["Data, Privacy and IT Articles"],"inLanguage":"en-NZ","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#respond"]}]},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/","url":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/","name":"8 Cyber Security Tips for Your New Zealand Business | LegalVision","isPartOf":{"@id":"https:\/\/legalvision.co.nz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg","datePublished":"2021-06-24T07:15:01+00:00","dateModified":"2024-05-21T02:26:24+00:00","description":"Secure business cyber security is essential for any business operating online. Protected digital systems ensure legal obligations are met.","breadcrumb":{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215503857"},{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215526849"},{"@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215537453"}],"inLanguage":"en-NZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-NZ","@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#primaryimage","url":"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg","contentUrl":"https:\/\/img.legalvision.com.au\/wp-content\/uploads\/sites\/2\/2021\/01\/11151227\/myriam-jessier-eveI7MOcSmw-unsplash.jpg","width":2000,"height":1333,"caption":"How Can My NZ Startup Handle Information Security? | LegalVision NZ"},{"@type":"BreadcrumbList","@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legalvision.co.nz\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/legalvision.co.nz\/articles\/"},{"@type":"ListItem","position":3,"name":"Data, Privacy and IT Articles","item":"https:\/\/legalvision.co.nz\/category\/data-privacy-it\/"},{"@type":"ListItem","position":4,"name":"8 Cyber Security Tips for Your Business"}]},{"@type":"WebSite","@id":"https:\/\/legalvision.co.nz\/#website","url":"https:\/\/legalvision.co.nz\/","name":"LegalVision New Zealand","description":"LegalVision is a commercial law firm in NZ with a commitment to innovation","publisher":{"@id":"https:\/\/legalvision.co.nz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legalvision.co.nz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-NZ"},{"@type":"Organization","@id":"https:\/\/legalvision.co.nz\/#organization","name":"LegalVision New Zealand","url":"https:\/\/legalvision.co.nz\/","logo":{"@type":"ImageObject","inLanguage":"en-NZ","@id":"https:\/\/legalvision.co.nz\/#\/schema\/logo\/image\/","url":"https:\/\/legalvision.co.nz\/wp-content\/uploads\/sites\/2\/2020\/11\/LegalVision_square_logo.png","contentUrl":"https:\/\/legalvision.co.nz\/wp-content\/uploads\/sites\/2\/2020\/11\/LegalVision_square_logo.png","width":400,"height":400,"caption":"LegalVision New Zealand"},"image":{"@id":"https:\/\/legalvision.co.nz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LegalVision","https:\/\/x.com\/LegalVision_law","https:\/\/www.linkedin.com\/company\/legalvision-group"]},{"@type":"Person","@id":"https:\/\/legalvision.co.nz\/#\/schema\/person\/9c6fb29bc5cc2f7f8385fb0915dfcba1","name":"Emily Young","image":{"@type":"ImageObject","inLanguage":"en-NZ","@id":"https:\/\/legalvision.co.nz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad516503a11cd5ca435acc9bb6523536?s=96","caption":"Emily Young"},"description":"Emily is a Legal Content Writer at LegalVision, where she is able to combine her interests of writing and the law. She graduated with a Bachelor of Laws (Hons) from Bond University in 2018.","url":"https:\/\/legalvision.co.nz\/author\/emilyyoung\/"},{"@type":"Question","@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215503857","name":"What is encryption?","acceptedAnswer":{"@type":"Answer","text":"Encryption is a security process that encodes data so that it is not immediately readable. Your important information is scrambled, and only the person with the appropriate key can decode and read it.","inLanguage":"en-NZ"},"inLanguage":"en-NZ"},{"@type":"Question","@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215526849","name":"What does MFA stand for?","acceptedAnswer":{"@type":"Answer","text":"MFA stands for multifactor authentication. This refers to a security verification process, where you provide two or more identity verification factors when logging into your accounts or systems.","inLanguage":"en-NZ"},"inLanguage":"en-NZ"},{"@type":"Question","@id":"https:\/\/legalvision.co.nz\/data-privacy-it\/business-cyber-security\/#faq-question-1621215537453","name":"What is a data breach?","acceptedAnswer":{"@type":"Answer","text":"Data breaches are security incidents where an unauthorised person has accessed, misused, or deleted your data. Another kind of data breach is where something is preventing you from accessing your systems, like a denial-of-service attack.","inLanguage":"en-NZ"},"inLanguage":"en-NZ"}]}},"_links":{"self":[{"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/posts\/205600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/users\/13267"}],"replies":[{"embeddable":true,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/comments?post=205600"}],"version-history":[{"count":17,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/posts\/205600\/revisions"}],"predecessor-version":[{"id":226821,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/posts\/205600\/revisions\/226821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/media\/201733"}],"wp:attachment":[{"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/media?parent=205600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/categories?post=205600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/legalvision.co.nz\/api\/wp\/v2\/tags?post=205600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}