Cyber Security

In today’s global environment you need to be confident that your IT network is secure

Get in Touch

Home » Our Services » Cyber Security

In today’s global environment, you need to be confident that not only your IT network is secure that you prepare for a security breach, you are alerted to the breach and you contain it.

Cyber-attacks are many and varied, and server attacks can cost you money, affect your operations, or take your business website offline. For these reasons, every modern organisation must have a comprehensive IT security strategy to protect their data and IT infrastructure.

Legacy design on-premise or hybrid cloud networks can be at risk as technology and vulnerabilities move so quickly. From experience we have in-depth understanding of these risks and can re-design or harden legacy networks to minimise and mitigate a security breach.

We Feature

Cloudflare DDoS Protection

Use Cloudflare to protect against a DDoS attack

Secure Network as a Service

Securely work from anywhere without your own network firewall with network as a service

Dark Web ID Monitoring

Most hacking related breaches linked to weak passswords – user credentials are a vulnerability

Email Phishing Simulation

Over 90% of security breaches linked to human error

Mercury IT offers managed cyber security services that are accessible to organisations of all sizes, from small businesses to Trans-Tasman corporates, and are tailored to your budgets and individual security requirements. We review and work to the CIS Benchmark Controls

We design, implement and maintain a comprehensive approach to cyber security management with multiple levels:

Workstation and device security including antivirus, spam and malware protection

User identity and access management including 3rd party application use

File Encryption at rest solutions for highly sensitive data

Microsoft 365 security integrated with InTune and workstation hardening

Restriction of privileged accounts and need to have access Just In Time and Just Enough Access

Backups that extend to include a 4th copy that is immutable and/or a cold storage backup solution

Ensure Email integrity

Asset discovery tools

Password policy, management and tools

Software asset management and application allow listingand ring fencing of applications

Wi-fi and internal network security

Hosted and on-site firewall and perimeter network management and security

Security audits

Regular external vulnerability and penetration testing

Desktop and device encryption

User security policies

Our hosted firewall service creates a secure perimeter, preventing against unauthorized access to your network infrastructure, and prohibiting access to inappropriate web content, restricting downloads of infected files, and enabling secure use of your network. It can also be customised to allow employees to secure remote access to company resources.

DDoS protection – Uses Cloudflare to protect against a DDoS attack.

Secure Network as a Service – Perimeter 81 allows your team to securely work from anywhere without your own network firewall device and VPN licenses.

Dark Web ID detects your compromised credentials in real time on the Dark Web. With over 80% of hacking-related breaches linked to weak, reused or stolen passwords, user credentials are emerging as the top vulnerability for businesses.

Email Phishing Simulation tests your employees on how they will respond to real-life phishing attacks. With over 90% of security breaches linked to inadvertent, unintentional, and caused by human error.