Industry insider news for New Zealand's technology resellers
These search results are from across the Techday Network of sites
InternetNZ retires NZRS brand to streamline operations
InternetNZ has merged with its subsidiary NZRS in order to bring the elements of .nz domain management under the same umbrella.
New guide for NZ boardrooms tackles cybersecurity crisis management
How do New Zealand's boards start dealing with cyber security, and where should they start? A new book aims to address those very issues.
Government focuses on domain name security
“People want websites that are safe and trusted."
Broadbandmap.nz: What technologies can you access?
With the NZ UFB roll out making great headway, interest in what broadband technology you can get has never been stronger.
Shorter .nz domain names reach critical mass
Those with a keen eye may have noticed a new-look type of .nz name recently - one that’s shorter and more direct.
Harness the power of the internet with a .nz domain name
The internet is a cornerstone of the modern world, and as such is a crucial tool for businesses to engage with customers.
Domain name strategies for business
Domains should form part of any branding strategAy. They can help reinforce with potential customers the type of business you wish to be perceived as.
Six key steps to growing your MSP business
In order to remain competitive, MSPs are being forced to become not just good in their operations, but great - here's some expert advice.
The quick guide to understanding cybercriminals' motivations
Check out this incredibly helpful and interesting guide to exactly what cybercriminals are after, and how you can keep yourself safe.
Whitepaper: How businesses can buff up their cyber defences
By 2020, 60% of digital businesses will suffer major service failures due to the inability of IT security teams to manage digital risk.
The ultimate guide to selling Disaster-Recovery-as-a-Service
The key is being able to steer the discussion towards the business impact the lack of the service may have and work backwards to the offering.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?