Kordia_logo_svg
  • Products & services
      Connectivity
      • Connectivity
      • Intelligent Wan
      • Cloud connect
      • Voice
      • Cloud Calling
      • DialPad
      • Teams
      • Webex
      • Cloud PBX
      Cloud
      • Cloud Transformation
      • Cloud Strategy & Design
      • Application modernisation
      • Containers & Kubernetes
      • DevOps Frameworks
      • Modern Workplace
      • Managed IT Services
      • IT Project Management
      Cyber security
      • Cyber security
      • Managed Security Services
      • Incident Response & Forensic Services
      • Protect
      • Redshield
      • Aura Information Security
      • Penetration Testing
      • Advisory
      • Education & Training
      Communication
      • Wholesale
      • Broadcast
      • Field services
      • Safety of life
  • Customer stories
  • Resources
      Learn more
      • News & Views
      • Resources
      • Cyber Smart Hub
      • Celebrating 60 years of mission-critical
      Stay up to date
      • NZ Business Cyber Report 2025
      • AI Usage Policy Checklist
      • Getting Started with Zero Trust
  • About
      OUR STORY
      • Get to know Kordia
      • Our workplace
      • Diversity and inclusion
      • Sustainability
      • Careers
      COMPANY
      • Shareholder
      • Partners
      • Wholesale
      • Customer Portal
Wholesale Connect
Wholesale Connect
Welcome to Kordia Chats

Meet Stephanie Knight

Meet our Service Delivery Practice Manager, Stephanie Knight. Steph shares what her role at Kordia involves, how a typical day looks and why she enjoys being part of the Kordia team.

 

Related Content
LEARN MORE ABOUT OUR MANAGED SERVICE EXPERTISE
CHECKLIST
CYBER INCIDENT RESPONSE CHECKLIST
When a cyber-attack or security breach happens, you need to be ready to respond. Download our checklist to ensure you’re prepared for the worst-case scenario.
Get the Checklist
BLOG
CONTINUOUS MONITORING IS ABOUT REDUCING RISK
From firewalls and anti-virus software to MFA and regular patching cycles, there’s plenty you can do to secure your business against the various threats in cyber space.
Read now
BLOG
WHY ENDPOINT SECURITY CLOSES OFF OPTIONS FOR CYBER CRIMINALS
Every device, or endpoint, running an operating system is a potential inroad for a hacker to breach your business.
Read now
View all resources
Kordia_logo_

© KORDIA LIMITED 2025 | 

Legal Disclaimer |  Privacy Statement |  QHSE Policy Statements