Protecting Your Data

When you are working with a Managed IT Services Provider, it’s important to understand how they protect your information. Afterall, they hold the keys to all your data and systems.

Additionally, with Cyberthreats events becoming more frequent and more sophisticated, Cyber Security services are critical to protecting your business’s ability to operate, its intellectual property, and your customers sensitive data.


Lucidity takes our responsibility to our customers seriously. Here are some of the ways we protect your information:

  • We operate a robust Information Security Management System (ISMS) which is certified against the ISO/IEC 27001 standard.
  • We hold comprehensive insurance including cyber insurance.
  • Our primary method of access to your data is via Microsoft’s Granular Delegated Admin Privileges (GDAP). We provide staff a limited set of access permissions by default. On a needs basis, staff must elevate their rights, with the top-level rights requiring Lucidity management approval.
  • Our recommended Microsoft 365 and Intune security baselines are in-line with the CIS Framework.
  • We actively monitor the NZ Government’s Computer Emergency Response Team (CERT) alerts database and take appropriate action 24/7.
  • Our anti-malware tools are actively monitored for our managed customers so that appropriate action can be taken.
  • Our remote management tools (RMM) come with Ransomware protection built-in as an extra layer of protection and we IP block access to the management portal.
  • We keep all customer passwords and access information in a secure password manager and we IP block access to the management portal.
  • Our staff are made aware of the importance of security, and we conduct monthly security awareness training.


Additionally, our Technology Alignment Manager and Trusted Advisor (vCIO) services report on key service metrics related to security:

  • Anti-malware
  • Backup
  • Endpoints
  • Email
  • Identity