Email via Microsoft 365

How communication is rapidly evolving:

We have seen an explosion in the ways we communicate, and, in the ways, we use these forms of communication. The last few years have seen people that would have rather picked up their land line, now reaching for their laptop or tablet to make a video call. 

Our original and oldest form of distant communication, the letter, has been branded snail mail and the volume of snail mail has steadily decreased to the point that the humble letter box is on the verge of redundancy.  

We have transitioned from the art of formal letter writing, taught with passion by our English teachers, to communicating in text or even emojis. We are evolving not just our means of communication but also the way we use these tools.  

What does this mean for Business?

In Business, while an initial introduction is more commonly made in person or by voice, further contact takes the form of electronic mail. Leading to a bombardment of the recipient’s inbox and the frustration of unread emails at the end of the working day. It is true to say that if our humble letter box had to deal with our daily volume of mail, it would have long since collapsed to the ground. 

How do we deal with all our email? 

The first thing is to ask ourselves is “Should this communication take the form of an email?”. If you yourself are not part of the solution you are part of the problem. Solve as much of the problem at the source not at the destination.  

If your email is urgent, short, or to a large audience question the medium you are using. Would communication be better served by picking up the phone, chatting in teams, or holding a team’s meeting/presentation. 

When should I use email?

We all unconsciously know that email is great when we need a record of a communication, date or action. For example, if I was to respond to a work order or quote, I would reply via email and simultaneously schedule a task. If I was going to tell a colleague a joke or organize a get together, I would do that in person via voice or message via teams. 

A matter of Etiquette:

Remember to use email to “create a record or reminder”. There are certain things that you can do to ensure your message is heard. Be concise, proofread in the voice of the receipt so you more accurately convey the tone you intended. Use a grammar checker as well as a spell checker.

If you are asking a question, use a question mark? If you require a response, say so.

Ensure you have a email signature on new emails and a shorter signature on forwards and replies.

If your email recipients need to contact you outside email, how hard are you making it for them? I would personally question the practice of having your email address in your email signature. Use a relevant subject line. “Meeting request” vs “26th May at 4pm re Communication is Key!” make your email easy to search for! 

To CC or not to CC that is the question?

Using the carbon copy (CC) field is the most abused part of the email. It is NOT to shame the recipient into action it’s to record other parties to the action when they do not directly have to participate in the email.  I encourage this behavior by doing the following. 

Sorting your inbox:

Which brings me to organizing my inbox. How can I work more efficiently, giving emails the priority, they deserve?  

I take an email which has me cced as not requiring my immediate attention, I have created a rule within Outlook to move these to another folder called CCED emails. I can make this rule as simple or as complex. If the cced email has a mention of me in it, or is mark high importance, I can ignore my move rule. I do the same for group, broadcast or send to all emails.  

When it comes to the external mail, I have rules that sort emails by sender and or subject line. For example, an email from an IT alliance member with the subject containing “communication is key” goes to “webinar blogs” folder in the sub folder “ITA”. 

How you build your rules is up to you and it does take some initial work and experimentation, but the gains will be worth it. 

Case Study:

A great example is a company in New Zealand that uses some of the AI engine’s ability to determine a customer’s tone in an email to prioritize unhappy customers allowing them to be more responsive when required. It can also be implemented to send an automatic response such as “we are sorry to hear about your recent experience with Contoso and would like to speak with you to resolve this issue at your earliest convenience. Please press here to schedule a call with our team.  

Can I have emails go to a team? 

Of course. If you have all the sales team respond to emails sent to enquiries@contoso.co.nz then you can have a shared mailbox. Members that are granted access to the shared mailbox can be setup to send as enquiries@contoso.co.nz or as themselves salesguy@contoso.co.nz , however a shared mailbox does require its own license.

What about a public folder?

A public folder is designed for shared access across the whole organization, it can be enabled with a mail address so that when added to the address field can be forward to a folder for centralized record keeping but it does not allow controlled access, hence public. 

Email Security  

As with phones and postal services there will be abuse. The more a communication tool is used the more likely some people will see an opportunity to scam others. 

As “email is a record” as postulated earlier, do you retain and control access to these records. Do your emails contain personally identifiable information or other forms of sensitive information? How can you ensure emails are not sent to the wrong person? 

Digital communications are more secure than physical forms of communication as technology “can” ensure trust and authentication at every step of the path between sender and recipient. I stress the word “can” in the previous sentence!  

Encrypted Email

I am sure that you may be surprised to learn that you can encrypt your email so only the intended recipient can read it. Even more surprising you can encrypt the email so it can not be forwarded. printed or copied.  You can even stop sensitive information being sent outside of the organisation automatically. Technology is available to digitally sign all email from your business to stop imposters posing as your business via email. Technology can check links and attachments in emails for malicious behaviour. 

What Next? 

Casting the human eye over an email, no matter how much training they received, will never match the ability of the technology to weigh the huge amount of data necessary to make a good decision.  

Technology can make our digital communication more secure, as with all communication it is up to us to evolve to use our tools to their full potential. Talk, email, send a letter (!), or message the team at Ultra IT  to discuss how to take your next step. 

How Microsoft 365 Exchange has revolutionized and simplified communications for Kapiti Kitchen company. 

Meet Orchard Joinery 

Meet Orchard Joinery. A family-owned business from the Kapiti Coast. Orchard Joinery have crafted bespoke kitchens, bathrooms, windows, doors, stairs and furniture for over 20 years! Whilst they really know their stuff, they were struggling with their customer communications, much of which is by email these days. 

Inefficient Email 

All the company emails had been set up to come into one email address, leading to missed communication and some unhappy potential customers. The office manager had to check through emails every day to make sure that all communications had been addressed. What a headache! 

Aiming for Change 

Orchard joinery contacted an ITA member for a free consultation. Together we worked out a solution using 365’s business grade email facility – Exchange Online.

Ideally, they were after a way to split and redirect emails to the correct staff to ensure efficient and correct action and response.  

They did this by outlining a list of new addresses that were needed. Next, we set up Microsoft 365, new email addresses, and when they were all ready, they switched emails across to the new system.

They then onboarded staff onsite, so they felt supported and knew what to do from day one.

The email system now has custom access settings, and the Manager can see everything if they need to. 

The End Result 

The end result was a much clearer process for customers and staff alike. Orchard Joinery now has an easy-to-use mail system with access across all accounts. There is clear allocation of emails and tasks and there is one incredibly happy office manager who no longer has to sift through screeds of emails to find the correct recipient! 

“Very happy with the result, and with the changeover process. Our IT company made this easy and was on call to help with any adjustments promptly. Particularly impressed with the ability of the staff to translate difficult IT related information into easy-to-understand applications.” – David, Orchard Joinery 

This is just a simple case study involving email, but there is so much more that can be done to improve your internal and external communication and efficiency.   

If you are ready to empower your business with Microsoft Products like these, you can join us at our upcoming FREE event through the EMPOWER series. Click here to register. 

If you need a hand with streamlining your emails reach out to us here.

AVOID DOCUMENT DISASTER: Empowering your Business

The POWER Trifector Solution for Document Automation

The environment in which we operate has significantly changed. Businesses in Northland have been driven to embrace remote working.  

Every good business is constantly on the hunt for new ways to improve their efficiency, keep their costs down, and increase productivity and profit and decrease risk.

What if we told you that you might be sitting on a goldmine of opportunity?

Having Microsoft 365 is bit like owning a spaceship. You know what it’s used for, but how to use it? Let’s unpack it a bit further.

Most Common Problems

The most common problems we hear of through our IT Alliance network around the country are:

  • Putting your documents into the cloud, document management and approvals
  • Empowering your business while working remotely
  • Managing emails and automating them
  • Keeping your company cyber safe

Would it surprise you to know that 50% of IT Alliance clients underutilize their Microsoft 365 Teams account? So why pay for something, and not use it all? You can join in our Empower Series here to hear more, but for now let’s start with document management and approvals.

Making the most of Your Microsoft 365

Sharepoint and Power Automate are both free with your business Subscription. Did you know you could use them in these ways?

Microsoft SharePoint – SharePoint (their free document management system) can seem overly complicated because it can offer so much. But it doesn’t need to be so scary.

You can start small and use more functionality as needed or as you grow.

Basically, it’s a platform that offers content management and collaboration.

It helps with reducing duplicate files, gives you remote access (needed more than ever!) and allows you to work on the same document at the same time.

Find out more about SharePoint here: https://ita.co.nz/sharepoint-shakedown

Microsoft Power Automate is another free app that allows you to automate workflows across applications. You can use it to connect email and instant message alerts, synchronize files between applications, copy files from one service to another, collect data from one app and store it in another, and much more.

Templates are available to get you started. Efficiency is key for sustained success across businesses and Power Automate assists this by simplifying workflows with the automation of repetitive tasks.

Power Apps – is a low-code application development platform that integrates with Microsoft 365, Dynamics 365, Azure and more.

With Power Apps, web and mobile applications can be built without writing code. Instead, you can use pre-built templates and components with drag-and-drop simplicity.

Power Apps has been described as a bit like a meal delivery kit. The ingredients are pre-measured and chopped. The instructions are ready to go. All you have to do is prep and cook.

Because Power Apps has advanced logic and rules built-in, development time is cut by 70%. In some cases, it takes just a few hours to build an app. Or you can customize one of the pre-built templates in just minutes. Plus, Power apps connects to hundreds of business systems and databases. Here are some impressive statistics to show how Power apps is super useful.

  • 188% ROI over three years3
  • 74% reduction in app development costs4
  • 2 hours of line-of-business employee productivity improvement per week5

Real Business, Real Change

Quality Food Services is the largest exporter of butter pastry in NZ.  Up until a few years ago they were struggling with their documents and approvals as they were complicated and manual.

They used SharePoint to create an online document management system that had version control, search features and navigation that made finding documents and using them easier. 

You could track your changes so that everyone was always up to speed on any project.

Power Automate helped QFS to automate their business processes and approvals using tailored notifications and automated data entry, saving plenty of time and increasing the accuracy of the approval process.

Power apps helped to collect information and display where everything was in the process so that the project could be managed much more easily.

All of this saved them time, money and decreased their risk significantly.

Where to from here?

If you have a process that you are helps make your document management process a little less of a headache, speak to us here. You are welcome to register to attend our next Empower Session here.

Document Management – How to Save Time, Decrease Risk and use what you already have!

Meet Quality Food Southland

Meet Quality Food Southland or QFS for short. What started as a humble bakery and Café in the 1900’s by Annie C Miller, grew into New Zealand’s leading manufacturer in butter-based bakery products and sauces. They are the largest exporter of butter pastry in NZ. Up until a few years ago they were struggling with their systems and processes.

Document Management and Approvals headache!

Their document management and approval systems were completely manual. This meant a LOT of paperwork, and complex filing systems as each product version had to be kept on hand. There could be many iterations which make things complicated.  Their approval process was also a headache. QFS had eight different approval processes. At each stage, approval had to be signed off by three different signatories. As you can imagine there was a lot of paper, storage and wasted time, not to mention the risk of making a mistake, was really high.

Aiming for Change

Ideally, the team at QFS were keen to make a few improvements. Document storage and security were key. They wanted to get rid of the complex document folder structure while managing and keeping all their file changes. They wanted to replace the manual time-consuming approval process for an online version, complete with change notifications, tracked changes and approval process stage indicators.  Essentially, they wanted to have the process more manageable, consistent and streamlined.

Empowering QFS with Microsoft

After consulting with an IT Alliance Member, the QFS team decided that the best course of action was to have these seasoned professionals cook up a nicely balanced solution using some Microsoft products called SharePoint, Power Automate, and power apps. These were all available through having Microsoft 365.

SharePoint helped create an online document management system that had version control, search features and navigation that made finding documents and using them easier. It even had a check in and out function. You could track your changes so that everyone was always up to speed on any project.

Power Automate helped QFS to automate their business processes and approvals using tailored notifications and automated data entry, saving plenty of time and increasing the accuracy of the approval process.

Power apps helped to collect information and display where everything was in the process so that the project could be managed much more easily.

The End Result

QFS ended up with a very slick looking web-based system thanks to Microsoft 365 and its added products. The best part is that it is all in one place. The new system stores all documents, manages document check-in/out, maintains all version history and records document changes.

 It allows users to check-out a document, make the required changes then completes the document approval process from start to finish. It includes notifications to stakeholders, updates progress and document control lists throughout the process. On approval, it creates a pdf version and stores it in a duplicate SharePoint suite used by “view only” staff.  The result helps their business run more efficiently, with less risk. Sounds too good to be true, right?

If you are ready to empower your business with Microsoft Products like these, you can reach out to us here. If you would like to learn more, join us at this free event by registering here.

Why you need a Password Management system

Why is a Password Management system important for Northland businesses?

With the increased need for security, and rising Cyber Security threats, it is imperative that all businesses in Northland have a strong password management system.

80% of data breaches are caused by weak, reused or stolen passwords

A password management system is able to store encrypted passwords online, making digital security accessible and simple for businesses to manage the passwords for all employees.  

In today’s world, most Northland businesses have dozens or even hundreds of passwords for different employees with different accounts, profiles, and applications.

#1. Generate secure, fool-proof passwords

With 80% of all data breaches happening because of weak passwords, having a password management system is crucial.

If you want to ensure your data safety, you must use complex passwords that include a combination of letters, numbers, symbols, and uppercase/lowercase.

A password management system will automatically generate fool-proof passwords based on your specification. This ensures you always create extremely secure passwords, thus avoiding hacks.

This also prevents your employees using generic and basic passwords such as their dogs name, or date of birth, and lets the password management system create a unique password that has all of the factors required for high security, including symbols, upper and lower case, numbers.

Let’s face it, it is much harder to hack KiUR&*!RTQ then it is Snoopy1222!

#2. Eliminate employee password reuse:

With a password management system, passwords are automatically updated and renewed with the integrated. This ensures employees practice good password hygiene.

#3. Manage passwords from one place:

There is nothing worse than trying to keep tabs on every employee’s passwords. When a staff member is on leave, the last thing you want to do is try and find the post-it note they left with the login details.

Similarly, if a disgruntled employee leaves and takes their passwords, this can create an unnecessary headache.

With a password management system, you can easily give every user their own personalized vault, while maintaining oversight of all passwords with an admin dashboard.

#4. Protect your sensitive data:

Keep everyone’s credentials, notes, and information safe using the password management system.

#5. Admin functions make managing passwords a breeze:

Have multiple employees working on a particular app? No problem. With a good password management system, you can securely share credentials where employees and clients require access and organize shared credentials by Groups.

Admin functions may include (depending on the system you use):

  • Instantly add and remove team members.
  • Safely share passwords with others.
  • Give each employee their own vault for safeguarding passwords.
  • Store digital records: WiFi logins, software licenses, employee IDs, and more.
  • Set security controls and restrictions based on your team’s needs.

#6. Notification of a data breach

A password management system will constantly monitor all of your email addresses and sends instant alerts whenever it suspects that your data has been compromised. This allows you to act promptly and change all the necessary passwords, thereby preventing your information from being used by hackers and identity thieves.

#7. Multifactor authentication for employees

Another feature available in most password systems is that is multifactor authentication. This provides a second layer of security to verify the user’s login, usually in the form of fingerprint verification, one-tap mobile notifications, SMS codes, etc. This can be used to ensure the highest levels of security in businesses.

Which password management system is right for you?

There are a number of password management systems available. Finding one that is easy for your team to use, economical and with a long track record is imperative. To find out more information about which system is right for you, please contact us here.

Top IT Tips for 2022

Top IT Tips for 2022

A New Year is a definitely a chance to kick things off the way you mean to go on.

For Northland businesses, we have compiled some key IT tips that can help your business to thrive.

#1. The Remote mobile working office is here to stay:

If Covid has taught us all one thing, it is the need for flexibility around how we work. Agility is fast becoming one of the key differentiators of a business’s success. Creating easy ways for your team to communicate by enabling an all-in-one solution for communication, collaboration, will ensure that you stay connected and productive.

#2. Security, security, security!

We know we say it all the time, but Cyber threats aren’t going anywhere. Keep the focus on security in 2022, as every business, no matter the size is at risk. Don’t risk losing time and money to a data breach or ransomware, instead talk to your IT company about the following:

  • Getting a cybersecurity audit done.
  • Securing all email.
  • Have notifications for remote workers to know when they are connecting to unsafe networks.
  • Put a disaster recovery plan in place.
  • Ensure backups of all data are secure.
  • Implement a password management system.
  • Prohibit third-party apps on work devices.

#3. Make sure I.T is in the 2022 budget

In this era, I.T is an area where you don’t want to be taking shortcuts. Budgeting for your I.T is a wise move to ensure that you have continuously upgraded internet access, software and hardware upgrades as required. Unreliable internet service can cause downtime that has a run on effect with productivity, and can even lose your business valuable clients. Skimping on your I.T budget can lead to much bigger costs further down the road.

#4. Safe and Professional Email addresses

This might sound basic, but if you haven’t already shifted to a professional email, 2022 is the time to do this. Using a gmail account or similar doesn’t make a professional first impression, and more importantly is a security risk. We can easily help you to upgrade to reliable business-grade emails. Our team at Ultra IT can easily help you to navigate this.

#5. Audit your Equipment

Taking time to do an audit of your current technology, and how it is performing can identify any potential problems and streamline processes. There are still some supply issues with computer hardware, so make sure you are aware of what your business is likely to need in 2022, including any new employees, plus upgraded equipment, so you can plan ahead. If you can give us as much notice as possible, we can make sure that we do our best to source what you require.

#6. Partner up with a managed service provider

Now is also a good time to hire a managed service provider. Partnering with an IT professional helps you make good technology decisions that can ultimately save you a lot of money. Getting advice from industry experts who understand the increasingly complex world of technology, security, and optimizing IT resources is an investment that ends up being a lot more economical then having the ambulance at the bottom of the hill.

Don’t worry if all of this feels overwhelming, our team at Ultra IT can offer you many options to help you have a stress free year with IT in 2022. If you would like further information, please feel free to contact us here.

The Christmas IT Checklist

2021 may be the Christmas that we all collectively exhale and exclaim “Thank goodness this year is over”.

However, before you rush out the office door for Christmas time, mistletoe and wine, here are a few quick IT tips, to ensure you have a relaxing break.  

Every season you’re going to need good support from IT professionals. Keep your technology in tip top shape, and you’ll have a happier holiday season. A few preparations before leaving for Christmas holidays, will ensure a relaxing time for all. Here we help you with a quick check list:

Staffing and training:

Have you got your organization covered over the Christmas and New Year period? While everyone rushes off, it pays to ensure that your organization has adequate staffing levels, and/or availability of key resources. 

If you are working on a skeleton staff, make sure that there is a backup contact in case of any information security or cyber incident. Also make sure that the staff running the show, actually know what they are doing! Many a security event has happened when staff are not adequately trained.


Business Continuity Plan:

This is also a good time to review your company’s disaster recovery/business continuity plans, to ensure they cover these scenarios:

  • Contact information for key people e.g. staff, suppliers, authorities, couriers, support.
  • Clear descriptions of responsibilities for individuals
  • Making important information readily available such as alarm codes, building access codes, passwords.
  • Have passwords and codes changed and has your plan been updated to reflect this?
  • A process for communicating important messages to your customers

Out of Office on:

Nothing irritates customers more then not getting a quick reply. Be sure to communicate your office hours clearly to your customer, along with clear back up contact numbers.

Start telling customers your availability as soon as possible. Communicate it via as many avenues as possible:

  • Social Media.
  • Email communication.
  • Invoices.
  • Posters.
  • Ensure customers receive clear contact details, back up numbers, email contacts and clarity around dates.
  • Make sure your Email out of office is switched on (possibly for external emails only), and your message is clear.
  • Add a temporary message to your mobile phone so you are not disturbed.
  • If you run social media accounts, consider archiving them for a few weeks so that you don’t have to ruin your summer monitoring social media.

Update and upgrade IT

If Christmas is a busy time for you, ensure that your technology can handle more traffic. Review system integrations to make sure front-and back-ends can communicate smoothly. Identify any issues or bottlenecks in advance to be able to upgrade or update any IT that needs help.

If you do need major IT upgrades or system changes, postpone them until after the holidays. Don’t mess with what works right now if you don’t have to do so.

Safeguard business data

Unfortunately, cyber criminals don’t seem to take a holiday. In fact, holiday season is a ripe time for cyber-attacks, as people are distracted.

In 2020, the greatest number of daily attacks in the last quarter of the year were on December 31.

Make sure you are protecting systems, detecting threats, and defending against attacks. A security assessment can help determine what you are doing well and could be doing better. Please contact your Ultra IT team member to discuss your specific concerns.

Social Media

Beware what you share!

Whilst social media is a great tool to share holidays snaps, it pays to remember Social media can be difficult to keep these connections private, with a potential audience of…um… the entire world! The impact on the privacy of your devices, your sensitive information and even your personal security plays as a key disadvantage of social networking.

There is an abundance of fake accounts, trolls and fraudsters online, who seek to obtain and collect your personal information for possible criminal activity. Be strict with your privacy settings and be vigilant of the things you post. Avoid accidentally sharing information that could hint at:

  • Login Details – email addresses, usernames and passwords. For example, potential answers to security questions ‘What was your first pets name”
  • Promoting that you’re out whilst your house/workplace is unoccupied

In conclusion…..

If it is a slow time in your office, it can also be an ideal time to clear out old data and perform maintenance on PC’s such as clean the dust, move old data, and clean up user information. Take a break!

Some people will be working over the Christmas and New Year period, and if you are we’d like to THANK YOU for keeping the country running and services/goods flowing!

But for those of us who are taking a break – PLEASE – make sure you do get to switch off and have a real break away from your business / mahi. We all need to switch off for a while every year. Be well, stay healthy and return ready for an awesome 2022!

Plan to refresh your IT/Online strategy

Things are moving so fast, and IT/online technologies are moving faster. What opportunities can you create, or gaps can you plug, with a smart IT/online strategy?

Ponder on this and give us a call in the new year to discuss how information, communication and online technologies can serve you. The team at Ultra IT wish you a happy Christmas and a wonderful New Year.

Cyber Insurance – Do you need it?

Cyber Security is a very real threat to businesses in New Zealand these days. Here we look at Cyber Insurance, what it is, what the laws are, and why you need it.

Why do you need Cyber Insurance?

Cyber attacks on businesses in Northland are increasing in both sophistication and frequency.

High profile companies like Air New Zealand partner Travelex, Fisher & Paykel Appliances, Toll Group, Garmin, Canon, Honda, BlueScope Steel, Lion, transport giant Toll Group, Twitter, MetService and most recently even the NZX, are just some of the organisations to have been targeted by cyber criminals.

However it is not just the big companies, many small businesses here in Northland are also being targeted.

It really is a matter of ‘when not if’.

What is Cyber insurance?

Cyber insurance is designed to fill the gap that traditional insurance policies don’t cover, minimising the impact of cyber incidents by providing cover for your own loss and third party costs. It provides your business with a structured crisis response plan and assists with returning to ‘business as usual’.

Won’t my general liability policy cover cyber liability?

General liability insurance covers bodily injuries and property damage resulting from your products, services or operations. Cyber insurance is often excluded from a general liability policy.

It pays to check your current policies and ask questions. You may find that your other business cover won’t respond to a cyber or data breach claim.

The law has changed:

The new Privacy Act 2020 which came into effect on 1 December 2020 means that all businesses now have legal requirements surrounding

The new Act requires mandatory data breach reporting if it’s reasonable to believe that the breach would cause serious harm to an individual. For example: If you’re engaging with a service provider to hold your clients’ personal data, for example a cloud-based CRM system, you remain responsible for the security and use of that personal information. If a Cyber breach were to occur, you would be held liable.

What does Cyber Insurance cover?

Ensuring business continuity and safeguarding your business from Business Interruption will enable you to return to the same financial position you were in before a Cyber event.

  • The benefits of Cyber Insurance will depend on the type of policy you take out but can include:
  • Access to a dedicated and experienced team of experts if an attack occurs
  • Protection from loss where you are legally liable to others
  • Cover for your financial loss if your business is interrupted due to a Cyber event.

Things to look out for in your Cyber Insurance policy:

  • Business Interruption: Look for a policy that covers the costs of any business interruption as you can lose time and money trying to get your business back up and running after a cyber attack.
  • Hacker Theft Cover: A plan that covers compensation for loss incurred, including theft or destruction of stored data, hardware, or cyber extortion from employees.
  • Restoration costs: Compensation for expenses incurred to research, replace, restore, or recollect digital assets during the period of restoration.
  • Public Relations: Reimbursement for any costs involved with public relations.
  • Network Extortion: Indemnity for the amount paid to avoid, defend, preclude or resolve a network extortion attempt
  • Data Forensic Expenses: Costs incurred to investigate, examine and analyse a computer network
  • Third-Party Liability: Indemnity for the sums claimed and incurred defending claims in relation to alleged privacy breaches, network security wrongful acts or media and social media wrongful acts.

What is the likely cost of Cyber Insurance?

Like most insurance, premiums vary by insurer, the type of cover selected and your risk profile. As an estimate a policy with $100,000 cover could cost as little as $600 per annum.

All businesses need a security plan to protect their business and they should consider a Cyber Insurance policy as an essential part of this plan.

What else can you do in the war against Cybercrime?

There are basic things that you can do to ensure good Cyber security. In this recent blog we share some top tips for your company.

Top tips to avoid cyber security threats:

CERT NZ has a number of useful and practical resources for businesses on keeping systems and data safe from cyber security attacks, including cyber security risk assessments for business, cyber security awareness for staff, phishing scams and your business and protecting your business online.

CERT NZ offers the following tips for simple, practical steps for businesses:

1. Install software updates

2. Implement two-factor authentication (2FA)

3. Back up your data

4. Set up logs

5. Create a plan for when things go wrong

6. Update your default credentials

7. Choose the right cloud services for your business

8. Only collect the data you really need

9. Secure your devices

10. Secure your network

11. Manually check financial details

For more info and links click here:

So in Summary….

Cyber Security is a very real issue facing business owners these days. If you would like to discuss your individual needs, we provide security assessments to ensure that your business has the best protection.

Please feel free to reach out to us at support@ultrait.nz

Upgrading to improve productivity & Security:

It’s hard to know where to start when prioritising the upgrade of hardware. Here are the top things we see that businesses could upgrade to improve productivity and add security.

Upgrading those ‘old school’ phones

First, let’s start with those traditional landline phones. Sure, they’ve done their job well for decades, but switching to Voice over Internet Protocol (VoIP) has many advantages. Don’t overlook the benefits of:

  • streamlining voice and data services to save on bills and long distance;
  • employees using VoIP communications wherever they have access to an internet connection;
  • accessing features such as call waiting, screening, recording, auto attendant, and voicemail transcription;
  • gaining greater flexibility to scale up and down as needed so you don’t need to pay for phone lines you don’t need;
  • integrating calls with customer relationship management software for better data insights.

Saving, Sharing, and Revising Documents

Next up, those filing cabinets. For one, they may be an eyesore, plus, they’re taking up valuable real estate in your space. Today, many printers allow you to scan many pages at once and easily scan documents into content management software.

Moving to online document management also opens you up to many productivity gains. The software often supports optical character recognition (OCR), which makes scanned content searchable. Plus, the documents are available online, where and when employees need them. This is helpful in remote or hybrid work setups, but it also helps ensure you have a backup of critical documents if disaster strikes.

If you’re still filing documents in cabinets, you may have paper-based processes, too. Forms and folders get passed around for different people to sign off at various stages. This makes it easy for workflow to bottleneck or, worse, for documentation to get lost in the physical shuffle from place to place.

In a step up from this, a business might at least move documents around via email attachments. Everyone gets a chance to see the document and make comments. Then, some poor soul takes all responses and correlates them for the next round of revisions.

Replace these old-school approaches with online business tools built to enable collaboration. Microsoft 365, for example, allows people to work on documents at the same time. There are no more worries about version control, and everyone can track the file’s progress.

Enabling Remote/Hybrid Work

Cloud-based collaboration software not only helps with document exchange. Microsoft 365 also allows users to communicate efficiently via the Teams channels. They can also start video meetings, share screens, and co-work on files and PowerPoints. Plus, integrating Outlook contacts and calendars helps efficiency and scheduling.

All this helps support employees working remotely or coming into the office only some of the time. With online documents and databases, everyone can get work done without coming on-site. Plus, VoIP business calls forward directly to phones or laptops for seamless communication.

Put Away the Post-its, Too

One last thing we’d love to see people replace in their offices? Those Post-its with handwritten passwords stuck to the bottom of computer monitors or oh-so-stealthily under the paperclip organizer in their top desk drawers.

We all have many passwords, and we understand the impulse to write them down, but a safer strategy is to use a password manager. A password manager stores, generates, and manages passwords in an encrypted database. A password management solution – such as Keeper, LastPass, or LogMeOnce – is more cyber secure than that sticky notes.

Feel free to reach out here to discuss any questions you may have about your individual business needs.

Written by Gill Brown