Skip to content

Behind the hack: This is how easily your business can be hacked

Phishing attacks

One of the greatest risks to your business these days is hackers trying to break into your IT systems.

Thanks to automated tools, all businesses are being targeted by all hackers, all the time. They want to steal your data, your logins – or worse, hold your data to ransom.

We asked a certified ethical hacker to break into three computers using different types of attack. He filmed it from both ends – as the hacker, and what was happening on his victims’ machines.

What you’re about to see is rarely captured on video…

In this first attack, our ethical hacker encrypts all of your data, until you pay a huge ransom to get it back.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In this second attack, our ethical hacker uses a fake login portal to get you to give away your login details.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And in this final attack, our hacker reveals why it’s so important to always keep your software and operating system fully-up to date.JTNDc2NyaXB0JTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZmYXN0Lndpc3RpYS5jb20lMkZlbWJlZCUyRm1lZGlhcyUyRmplOWcwbXo5OHcuanNvbnAlMjIlMjBhc3luYyUzRSUzQyUyRnNjcmlwdCUzRSUzQ3NjcmlwdCUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGZmFzdC53aXN0aWEuY29tJTJGYXNzZXRzJTJGZXh0ZXJuYWwlMkZFLXYxLmpzJTIyJTIwYXN5bmMlM0UlM0MlMkZzY3JpcHQlM0UlM0NkaXYlMjBjbGFzcyUzRCUyMndpc3RpYV9yZXNwb25zaXZlX3BhZGRpbmclMjIlMjBzdHlsZSUzRCUyMnBhZGRpbmclM0E1Ni4yNSUyNSUyMDAlMjAwJTIwMCUzQnBvc2l0aW9uJTNBcmVsYXRpdmUlM0IlMjIlM0UlM0NkaXYlMjBjbGFzcyUzRCUyMndpc3RpYV9yZXNwb25zaXZlX3dyYXBwZXIlMjIlMjBzdHlsZSUzRCUyMmhlaWdodCUzQTEwMCUyNSUzQmxlZnQlM0EwJTNCcG9zaXRpb24lM0FhYnNvbHV0ZSUzQnRvcCUzQTAlM0J3aWR0aCUzQTEwMCUyNSUzQiUyMiUzRSUzQ2RpdiUyMGNsYXNzJTNEJTIyd2lzdGlhX2VtYmVkJTIwd2lzdGlhX2FzeW5jX2plOWcwbXo5OHclMjBzZW8lM0RmYWxzZSUyMHZpZGVvRm9hbSUzRHRydWUlMjIlMjBzdHlsZSUzRCUyMmhlaWdodCUzQTEwMCUyNSUzQnBvc2l0aW9uJTNBcmVsYXRpdmUlM0J3aWR0aCUzQTEwMCUyNSUyMiUzRSUzQ2RpdiUyMGNsYXNzJTNEJTIyd2lzdGlhX3N3YXRjaCUyMiUyMHN0eWxlJTNEJTIyaGVpZ2h0JTNBMTAwJTI1JTNCbGVmdCUzQTAlM0JvcGFjaXR5JTNBMCUzQm92ZXJmbG93JTNBaGlkZGVuJTNCcG9zaXRpb24lM0FhYnNvbHV0ZSUzQnRvcCUzQTAlM0J0cmFuc2l0aW9uJTNBb3BhY2l0eSUyMDIwMG1zJTNCd2lkdGglM0ExMDAlMjUlM0IlMjIlM0UlM0NpbWclMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRmZhc3Qud2lzdGlhLmNvbSUyRmVtYmVkJTJGbWVkaWFzJTJGamU5ZzBtejk4dyUyRnN3YXRjaCUyMiUyMHN0eWxlJTNEJTIyZmlsdGVyJTNBYmx1ciUyODVweCUyOSUzQmhlaWdodCUzQTEwMCUyNSUzQm9iamVjdC1maXQlM0Fjb250YWluJTNCd2lkdGglM0ExMDAlMjUlM0IlMjIlMjBhbHQlM0QlMjIlMjIlMjBhcmlhLWhpZGRlbiUzRCUyMnRydWUlMjIlMjBvbmxvYWQlM0QlMjJ0aGlzLnBhcmVudE5vZGUuc3R5bGUub3BhY2l0eSUzRDElM0IlMjIlMjAlMkYlM0UlM0MlMkZkaXYlM0UlM0MlMkZkaXYlM0UlM0MlMkZkaXYlM0UlM0MlMkZkaXYlM0U=These videos scared us… because we see the consequences of these attacks every day

Three questions:

  1. Do you now realise how easy it is for a determined hacker to get into your IT systems?
  2. Does your business have the right blend of software, staff training and processes to protect your IT and data?
  3. Would you like us to review it? The peace of mind you will get from this review will be tremendous.

Book a 15-minute video call at a time that suits you. There’s no obligation to buy anything, ever.

Here’s our live calendar

Facebook
Twitter
LinkedIn

Related Posts

So, in recent times we’ve seen airline Qantas falling victim to a cyberattack which hit a third-party contact centre platform potentially exposing personal details of up to 6 million customers. On the NZ side of the ditch, New World took an arrow to the knee with a password spraying attack.
The landscape of remote work has transformed dramatically over the past several years. What began as a reactive shift to keep operations going during a major global disruption has now solidified into a permanent mode of working for many organisations, especially small businesses.
On Friday, 30th June 2025, Qantas confirmed a cyber incident affecting one of its offshore third-party contact centres. Approximately six million customer records were accessed, exposing personal information including names, contact details (email and phone number), Date of Birth and frequent flyer numbers. No financial or authentication credentials (such as passwords or card data) were determined to be accessed at this time.