Hackers Perspective
Three Stages of a Cyber Attack
Cyber threats don’t strike all at once — they build up in stages. Once they’re in, they move quickly: testing systems, spreading quietly, and then applying pressure through extortion and disruption.

1
Opportunity
Bad people looking for a way in

2
Resistance
Bad people inside your organisation

3
Leverage
The bad people making demands
Greg, Technical Director
"Proactive tightens identity, email, and device controls — and gets you ready for Cyber Essentials. It’s the practical step up that blocks common attack paths before they turn into incidents."
Cyber Security Packages
Cyber attacks target weaknesses at every stage. This table shows how each package strengthens your organisation across the six key security areas — from prevention and detection to continuity and recovery.
Proactive Cyber Security FAQs
If your organisation needs stronger protection than the basics, this FAQ explains what Proactive includes, how it works, and why it’s the recommended level for most small and medium businesses.
View All FAQsYes—Proactive is designed to help you achieve Cyber Essentials, meet insurance requirements, and support other certifications.
Yes — Proactive strengthens Microsoft 365 by enforcing secure policies, improving account protection, and monitoring for risky or unusual activity.
Proactive adds 24/7 monitoring, policy management, and the ability to automatically lock down devices—far beyond basic antivirus.
If a threat is detected, Proactive acts fast — from isolating a device to stopping suspicious activity — preventing the attacker from moving any further.
No — cyber insurance doesn’t stop an attack. It helps with the financial impact after something goes wrong, but you still need strong security in place to prevent and contain an incident.
Related Services

Legacy
Basics Covered. Risks Remain - Essential protection with antivirus, patching, and basic security controls. A safe starting point, but not enough for today’s threats.

Proactive
Threats Prevented. Attacks Stopped. Advanced monitoring, detection, and awareness that strengthen your defences and stop most attacks before they start.

Mitgation & Response
Incidents Contained. Operations Restored. Rapid response, recovery, and continuity planning so you can act fast and minimise disruption when issues arise.

Certification & Compliance
Standards Met. Trust Earned. Achieve Cyber Essentials and align with recognised frameworks like IASME, GDPR, and ISO27001 to prove your resilience.

IT Support
Fast, friendly, and reliable support whenever you need it, ensuring minimal downtime and maximum productivity.

Internet
Dunedin IT delivers internet that’s fast, stable, and ready for business growth.

Microsoft 365
We help over 200 organisations maximise the benefits of Microsoft 365, improving the tools that foster collaboration, communication, and growth.

Automation & Workflow Intelligence
Repetition Removed. Productivity Unlocked. Free your team from manual tasks with AI-driven process automation and RPA that runs 24/7.
Remove Cyber Worries. Strengthen Your Continuity Today.
Dunedin IT delivers secure backups, reliable recovery, and clear continuity planning — managed by real people who know your setup. Share your details and our team will make sure your data is protected, your risks are reduced, and your organisation stays operational when it matters most.






