The digital age has brought about substantial shifts in the way we work. Typical 8 to 5 office jobs are being disrupted in favour of more flexible telecommute roles and remote positions.
Today in the Evolve IT, Lachie and Ben discuss Identity Management. How secure is your business identity? watch on here.
Today in the Evolve IT Lab, Lachie and Ben discuss secure username and passwords. We often find that users want to use simple passwords like their first name, last name or their date of birth.
Let’s take a look at some of the world’s most successful entrepreneurs day to day routines. By implementing some of these tips into your daily routine, you can become more productive too.
Today in the Evolve IT Lab Lachie and Ben answer the question what is more secure MAC or Windows? MACs are often thought as being more secure than windows. However, this is not always the case.
The benefits of public cloud services like Microsoft Azure and Amazon Web Services are well known and frequently highlighted. And with good reason – public cloud offers extremely reliable, highly available and easily scalable architecture for IT infrastructure..
Today in the Evolve IT Lab, Lachie and Ben discuss the risks of mobile devices in your workplace. Are your employees using their personal devices to connect to the corporate email or network? You may need to watch this video.
Imagine the simplicity of Skype connecting you to anyone anywhere together with Facebook’s features that brings the farthest friend closer with one tap, all these accessible in one single application. Imagine the convenient Skype and the engaging Facebook working..
Today in the Evolve IT Lab, Ben and Lachie discuss the security risks of the Internet of Things. Each organisation will find that they have 100's of IoT devices connected to their network. Although these devices help both company and user be more efficient, they..
Nonprofits have the responsibility to their staff, donors and the cause that they support to be a secure and compliant organization. Many government and private donors are now adopting minimum standards for nonprofit organisations, and if a nonprofit should fail to..
Today in the Evolve IT Lab, Lachie and Ben tackle your storeroom full of old office equipment,. We explain the security risk of having filing cabinets, phones and old computer equipment gathering dust in your store room.
Good employees are the most prominent asset an organisation can have, more important than any document, hardware or piece of software. Employees are who keep your customers and who help deliver a beneficial service. So how do you go about holding on to your best..
Today in the Evolve IT Lab, Lachie and Ben discuss the risks of public WiFi. When travelling on holidays or for business Public WiFi can be a lifesaver, allowing you to connect back home and collaborate with your colleagues. However what are the risks and is the..
Nonprofit and community organisations need to pay careful attention to cybersecurity and compliance. Cybercriminals - and the threats that today come with them - are more sophisticated, damaging, and complex.
Today in the Evolve IT Lab, Lachie and Ben talk about Cryptojacking. Now that cryptocurrency has become mainstream and a worldwide phenomenon, more people than ever are trying their luck on a coin. However, so are cybercriminals!
"Old mate Bill reckons we need a security consultant."
So, you’re with old mate Bill, having a long overdue catch-up, chewing the fat, talking some shop. He launches into a story about how his company’s CFO got scammed for $50K by a cybercriminal posing as his..
Today in the Evolve IT Lab, Lachie sits down with Ben from Sophos and discusses some of the cybersecurity predictions for 2018. In 2017 we had such a big year in cybersecurity with: increased phishing, identity theft, and ransomware.
Moving to the cloud has transformed the way we work today - no longer are we restricted to a specific location to complete our day-to-day duties. However, it also means that your organisation is more vulnerable to malicious activities such as key-logging, phishing..
We consistently talk about how to protect your virtual data. However, sometimes we neglect to think our physical security, things like filing cabinets, paperwork on our desks and unwanted guests walking into our offices. Today in the Evolve IT Lab, Lachie and Ben..
Disaster recovery (DR) and business continuity (BC) plans are often mistaken as the same thing. They are, however, two different but necessary plans that keep your business running in the event of an emergency.
There are three things that protect an organisation from cybercrime and data loss – education, products and services, and security policies. Without any one of these, especially proactive security policies, you leave yourself vulnerable to getting a virus, or even..
Today in the Evolve IT Lab, we discuss the finalpart of our three-part series on identity theft. In today's episode, Lachie and Jason discuss some proactive measures you can take to help prevent your identity from being stolen.
Traditionally, humans have kept pets - like cats, dogs, and bees. However, Cybercriminals have a new type of pet to take care of - botnets. The interesting thing about these virtual creatures is that the Cybercriminal does not even have to feed them - their victims..
Today in the Evolve IT Lab, we discuss the second part of our three-part series on identity theft. In today's episode, Lachie and Jason discuss a real-life story of a CEO that was affected by identity theft, we hear about how a cybercriminal was able to take..
Otherwise known by its acronym (IT people love acronyms) as “DLP”, it is a hot topic currently with the update to the Australian Privacy Act with the introduction of Notifiable Data Breach Laws.
Today in the Evolve IT Lab, Lachie and Jason discuss identity theft. When a cybercriminal hits your or your organisation with identity theft, it is not easy to shake and can severely hurt you and your organisation.
I don’t know about you, but up until recently, fishing was what you did with a rod and reel and spearfishing involved having a spear gun and a wetsuit, usually on some tropical beach. But, ever since the ph got swapped for the f the result is anything but fun.
Cybercrime seems to be everywhere today - whether Identity Theft, Cryptolocker, or Spear Phishing - it’s a problem that’s just not going away. We know that education is one of the most potent ways of combating it, however, how do you actually get the message across..
Today in the Evolve IT Lab, Lachie and Jason turn their attention to Phishing. Phishing emails come in all shapes and sizes, and unfortunately, no single product will fully protect your organisation from phishing attacks. A multi-layered defence against phishing..
The focus of this blog is being Cyber Safe - not just for businesses but for everyone! As a member/employee/owner, awareness of these issues is essential, but not necessarily enough in itself. It's our responsibility to keep information Cyber Safe!