In today’s ultra-connected world, online threats are a fact of life, with even more sophisticated scams becoming increasingly hard to detect. Email threats, scams and spam are now simply a part of being online. But how can you best protect yourself to identify them?...
Blog & News Media & Press
The inside word on VPNs
We cut through the confusion around this digital tool VPNs (Virtual Private Networks) are marketed as a way to protect your privacy and get around virtual blockades. Some people use them as a sneaky way to get around region blocks and watch shows that aren't available...
Demystifying exposed services and open ports to help you protect your network
Exposed services…huh? Open ports…what? Have you heard these terms mentioned recently and wondered what on earth they are? Or why are they important? We’re here to provide some clarity. Exposed services and open ports actually mean the same thing… and they pose a...
Beef up your school’s email security
Because we use email every day, and we often use passwords to access it, email can feel safe and secure – but, unfortunately, that’s not always quite true. If you look at the statistics around cybercrime, phishing and credential harvesting are the most common types of...
Understanding safety and security online
Protecting ākonga, safeguarding systems and creating positive digital experiences A safe digital space isn’t necessarily secure, and a secure one isn’t always safe. Confused? Online safety and security are often used interchangeably – and whilst they’re closely...
Helping more students improve their cyber security skills and online safety
Following the successful launch at the end of last year, Grok Academy will be re-launching Cyber Comp this month to enable students who would have previously been focusing on exams to participate and test their cyber skills. With many new students starting the 2023...
Security steps for even the smallest of schools
When you pack up after a busy day teaching, you’ll close the windows, lock the doors and make sure anything worth taking isn’t left lying around. Basic cybersecurity works much the same way. Cyber criminals look for easy, low-hanging fruit. Like burglars, they are...