Why Tightening Your Business Security Often Goes Wrong
Your practice has been running well for years. You have good staff, solid client relationships, and a reputation worth protecting. Then someone suggests it is time to take security more seriously, and the next thing you know there is talk of new systems, new policies, and a project that keeps growing. Six months later, half the changes are done, staff are frustrated, and you are not sure if you are actually more secure or just more complicated.
This is what happens when security improvements are treated as an IT project rather than a business one. The technical side gets prioritised, and the human side - how your team actually works, what they need access to, and what happens when something goes wrong - gets left behind. The result is a patchwork of controls that looks thorough on paper but has gaps that matter.
The most common mistake is trying to do everything at once. A business that has never had formal security controls cannot jump to having strict access rules across every system overnight. Staff end up locked out of things they need, workarounds appear, and those workarounds are almost always less secure than what was there before. The same thing happens when a business applies new rules to new systems but forgets about older tools that still hold sensitive client data. The weakest point is where a breach will happen, and old software rarely makes the priority list.
Another pattern that causes real problems is assuming that outside contractors and service providers are automatically trustworthy because they have always had access. Reviewing who has access to what - and whether that access is still appropriate - is one of the most valuable things a professional services business can do. The same applies inside the business. Someone who started as a receptionist and is now a practice manager probably has permissions set up years ago that no longer match their actual role.
What good security looks like in practice is not complicated from your perspective as a business owner. Your team can get to what they need without jumping through hoops. Access to sensitive files is limited to the people who genuinely need it, and that list is reviewed regularly rather than set once and forgotten. When something looks suspicious - a strange login, an unusual request - there is a process for flagging it that does not require your staff to be IT experts. And when someone leaves the business, their access is gone the same day.
Getting there requires someone who understands both the technical side and how your business actually operates. Security that does not fit how your team works will be bypassed, and bypassed security is worse than none because it gives you false confidence. For practices handling sensitive client information, the NZ Privacy Act 2020 creates real obligations around protecting that data - obligations that apply regardless of whether a breach was deliberate or the result of an overlooked gap. If an incident does occur, CERT NZ is the right first call.
The businesses that handle this well tend to work with a managed IT provider who treats security as an ongoing conversation, not a one-time setup. They review access, test assumptions, and flag problems before they become incidents. ITstuffed works with professional services businesses in Canterbury to do exactly that. If you want to understand where your practice actually stands, a 15-minute IT Fit Check with ITstuffed at itstuffed.co.nz/booking is a good place to start.
