Sentinel Cyber Security

Online threat protection services that provide security advice, support, and monitoring, to reduce your risk of data breach, financial loss, and reputational damage.

Choose your plan

Why should New Zealand businesses of all sizes consider Sentinel Cyber Security?

Cyber attacks come in all shapes and forms – some are designed to extract money (a ransom) from your business, or trick you into paying money by posing as a legitimate supplier, while others simply want to disrupt you, making it difficult for you to operate, and hence causing you to lose money.

Cyber fraud criminals are opportunist, and looking for the easiest win, not necessarily the biggest financial haul. And they have attack programs which are designed to relentlessly, automatically, test systems to find areas of vulnerability. So it's not just the 'biggest' companies they'll target.

As XX% of New Zealand business are SMBs, often with little in the way of cyber security, or, with small IT Teams with insufficient resource to monitor system attack notifications, a subscription security service can offer the peace of mind you're looking for.

How can Sentinel Cyber Security help you?

Sentinel Cyber Security has decades of experience managing security for our customers.  The key to warding off cyber crime is the following four step program:

  1. Plan
  2. Structure
  3. Constant Vigilance
  4. Continuous Improvement

As many in-house IT departments lack the time, skills, or resource to commit to this, we take on these tasks for you, working back with you and your IT specialists, if you have them, to ensure your protection updates as threats evolve.

Plan

There are three meanings to 'plan'.  The first is you need to plan your approach to managing your cyber security. The second is you need a plan for what to do when you are under attack.  And the third meaning is - you need to plan for the worst.

Working with Sentinel Cyber Security, we will assess your current state and level of risk, and create a plan to put the right level of security in place.  We'll also work with you to create a plan of attack when under attack.  And as for the last one, well, we're a Cyber Security - being paranoid is in our DNA.  We plan for the worst across a broad range of horizons and scenarios, so you can leave that part to us.

Constant Vigilance

This is where the real win comes in.  Statistics gathered by IBM show that 44% of security notifications go uninvestigated, and that on average, it takes 279 days to identify and contain a breach. 

Most businesses can't justify a dedicated resource to monitor security notifications 24/7. Sentinel Cyber Security provides monitoring and response services to ensure any breach attempt is identified, and management protocols enabled, within minutes.  This is important, as most cyber attacks, once begun, will systematically work through your defenses looking for vulnerabilities - catching this early, and managing it, is a critical part of staying protected from online threats.   

Structure

Once there is a plan, the next step is to put the structures in place.  This could range from staff training on how to fall prey to phishing, vishing or smishing attempts (yes, these are all real things!), to installing software, to introducing IT Asset management solutions.

Again, this is based on your existing security set up, your level of risk, areas of vulnerability, and unique needs.

Continuous Improvement

Cyber criminals are smart.  They're continuously evolving technology to enable their fraudulent, disruptive, damaging activities.

Which is why having 'cyber security' as a set and forget item on your annual plan can be both ineffective, and expensive - you may end up paying for a security solution that becomes ineffective in the first month.

Sentinel Cyber Security takes the combined knowledge gained from repelling breach attempts from right across Australia and New Zealand, plus from the ongoing education and training invested in our team, and apply that to ensuring your security is relevant and effective.

Customer Story

A Fusion5 customer was recently the victim of an email scam.  They are a traditional SMB wholesale-distribution company, 35 employees, based in Greater Western Sydney.  They were breached when a staff member unknowingly clicked the link in a phishing email, and this downloaded malware to the system, capturing all that employee’s digital activities – without them knowing.  This way, the attacker learnt who the business’ key suppliers were, and was able to create a fraudulent, yet very convincing email, which they sent to the Accounts Payable team, advising that the supplier’s banking details had changed, and asking them to update the bank account number for payment to that of the fraudster.  They duly did this, and as a result, paid $40,000 to the thief.  The only reason they didn’t pay a second payment to them, which they had scheduled, was because the legitimate supplier let them know that their invoice was overdue, which raised the alarm.

Had this company had [insert name of solution here] they [insert awareness and action that would have been triggered by the software], and they would not have been the victims of fraud.

The Nitty Gritty

So what does all of that translate to in 'real terms' of how Sentinel Cyber Security will protect your business?

Endpoint device protection

  • Helps protects compatible devices like laptops mobiles, tablets and USB storage
  • Helps stop sensitive files leaving the business
  • Helps identify persistent threats and blocks many of their entry points
  • Uses firewall protection to help block unwanted data from your network

Internet protection

  • Helps block many threats before they reach your network
  • Allows for consistent security policies to help your staff feel safe
  • Lets you monitor web activity on your network and devices
  • Helps stop users accessing inappropriate content

Email protection

  • Helps detect phishing, malware, ransomware, viruses and spam
  • Improves email continuity
  • Works at high speed with low latency
  • Gives you full email visibility across your network

Find the right service for your business

Plan A

For businesses with up to 50 Staff

$80 per month

includes:

24/7 phone or online support for:
- Cyber security breaches
- Questions on cyber security
- Network security
- Configuring firewalls
- Back-up and recovery plan
- Malicious software removal
- Activating internet, email and endpoint device protection

4 cyber assessments every 12 months
(limit of 1/mth)

Personalised recommendations, with email updates to help keep your security on track

Plan C

For businesses with 101 - 200 Staff

$900 per month

includes:

24/7 phone or online support for:
- Cyber security breaches
- Questions on cyber security
- Network security
- Configuring firewalls
- Back-up and recovery plan
- Malicious software removal
- Activating internet, email and endpoint device protection

4 cyber assessments every 12 months
(limit of 1/mth)

Personalised recommendations, with email updates to help keep your security on track

Plan B

For businesses with 51-100 staff

$500 per month

includes:

24/7 phone or online support for:
- Cyber security breaches
- Questions on cyber security
- Network security
- Configuring firewalls
- Back-up and recovery plan
- Malicious software removal
- Activating internet, email and endpoint device protection

4 cyber assessments every 12 months
(limit of 1/mth)

Personalised recommendations, with email updates to help keep your security on track

Plan D

For businesses with 200+ Staff

POA

includes:

24/7 phone or online support for:
- Cyber security breaches
- Questions on cyber security
- Network security
- Configuring firewalls
- Back-up and recovery plan
- Malicious software removal
- Activating internet, email and endpoint device protection

4 cyber assessments every 12 months
(limit of 1/mth)

Personalised recommendations, with email updates to help keep your security on track

Sentinel Cyber Security is here to help.  Contact us for an obligation free discussion.

Contact

Great outcomes start with great conversations