Tom HartleyDr Tom Hartley

Pro Tech
Cybersecurity Governance – the four cores to know
In past articles, we have looked at the four cores of managing cybersecurity – securing your people, your communications, your data, and your technology. This is achieved through awareness training, best-practice policies and procedures, and selective technologies. These are the foundational components that every business is expected to implement for security. Oversight of these policies and procedures however, falls to...
Pro Tech
Getting the Basics Right
Every business, regardless of industry or size, is vulnerable to cybersecurity attack- that’s just a fact; your business is not immune. As of the writing of this article, there’s an uptick in attacks across New Zealand in both the retail and manufacturing sectors, businesses that normally would be considered low on the radar, and that will only increase in these and other unexpected segments during the year....
Pro Tech
Making Security awareness a habit
Looking forward to 2022, we can expect another period of dealing with the invisible and deadly COVID-19 virus. Three years in, it has changed how we live, work and interact with others nationally and globally. We have trained ourselves to keep to our one-metre distance in public places, wash our hands thoroughly, and use sanitisers. We wear masks and use...