[VIDEO] Why Secure Passwords Are Important

Today in the Evolve IT Lab, Lachie and Ben discuss secure username and  passwords. We often find that users want to use simple passwords like their first name, last name or their date of birth. 

11 May, 2018

8 Best Daily Routines of Highly Productive People to Drive Success

Let’s take a look at some of the world’s most successful entrepreneurs day to day routines. By implementing some of these tips into your daily routine, you can become more productive too.

09 May, 2018

[VIDEO] What Is More Secure MAC V Windows

Today in the Evolve IT Lab Lachie and Ben answer the question what is more secure MAC or Windows? MACs are often thought as being more secure than windows. However, this is not always the case.

03 May, 2018

The limitations imposed by software-layer networking on Public Cloud

The benefits of public cloud services like Microsoft Azure and Amazon Web Services are well known and frequently highlighted. And with good reason – public cloud offers extremely reliable, highly available and easily scalable architecture for IT infrastructure..

01 May, 2018

[VIDEO] - Securing Mobile Devices

Today in the Evolve IT Lab, Lachie and Ben discuss the risks of mobile devices in your workplace. Are your employees using their personal devices to connect to the corporate email or network? You may need to watch this video.

26 April, 2018

8 Microsoft Teams tips and tricks

Imagine the simplicity of Skype connecting you to anyone anywhere together with Facebook’s features that brings the farthest friend closer with one tap, all these accessible in one single application. Imagine the convenient Skype and the engaging Facebook working..

24 April, 2018

[VIDEO] The Hidden Security Risks Of the IoT

Today in the Evolve IT Lab, Ben and Lachie discuss the security risks of the  Internet of Things. Each organisation will find that they have 100's of IoT devices connected to their network. Although these devices help both company and user be more efficient, they..

20 April, 2018

How the cloud can help secure Nonprofits

Nonprofits have the responsibility to their staff, donors and the cause that they support to be a secure and compliant organization. Many government and private donors are now adopting minimum standards for nonprofit organisations, and if a nonprofit should fail to..

17 April, 2018

[VIDEO] Disposing Of Old Assets

Today in the Evolve IT Lab, Lachie and Ben tackle your storeroom full of old office equipment,. We explain the security risk of having filing cabinets, phones and old computer equipment gathering dust in your store room.

12 April, 2018

Why employee retention is essential to your business

Good employees are the most prominent asset an organisation can have, more important than any document, hardware or piece of software. Employees are who keep your customers and who help deliver a beneficial service. So how do you go about holding on to your best..

10 April, 2018

[VIDEO] Public WiFi Risks

Today in the Evolve IT Lab, Lachie and Ben discuss the risks of public WiFi. When travelling on holidays or for business Public WiFi can be a lifesaver, allowing you to connect back home and collaborate with your colleagues. However what are the risks and is the..

05 April, 2018

Why Nonprofits need to pay careful attention to cybersecurity

Nonprofit and community organisations need to pay careful attention to cybersecurity and compliance. Cybercriminals - and the threats that today come with them - are more sophisticated, damaging, and complex.

04 April, 2018

[VIDEO] What is Cryptojacking

Today in the Evolve IT Lab, Lachie and Ben talk about Cryptojacking. Now that cryptocurrency has become mainstream and a worldwide phenomenon, more people than ever are trying their luck on a coin. However, so are cybercriminals!

29 March, 2018

Why you should be getting a review from a security consultant

"Old mate Bill reckons we need a security consultant." 

So, you’re with old mate Bill, having a long overdue catch-up, chewing the fat, talking some shop. He launches into a story about how his company’s CFO got scammed for $50K by a cybercriminal posing as his..

27 March, 2018

[VIDEO] Cybersecurity Predictions of 2018

Today in the Evolve IT Lab, Lachie sits down with Ben from Sophos and discusses some of the cybersecurity predictions for 2018. In 2017 we had such a big year in cybersecurity with: increased phishing, identity theft, and ransomware.

22 March, 2018

5 Reasons You Need To Consider Multi-factor Authentication.

Moving to the cloud has transformed the way we work today - no longer are we restricted to a specific location to complete our day-to-day duties. However, it also means that your organisation is more vulnerable to malicious activities such as key-logging, phishing..

20 March, 2018

[VIDEO] Why Physical Security Is So Important

We consistently talk about how to protect your virtual data. However, sometimes we neglect to think our physical security, things like filing cabinets, paperwork on our desks and unwanted guests walking into our offices. Today in the Evolve IT Lab, Lachie and Ben..

15 March, 2018

The Importance Of A Disaster Recovery and Business Continuity Plan

Disaster recovery (DR) and business continuity (BC) plans are often mistaken as the same thing. They are, however, two different but necessary plans that keep your business running in the event of an emergency.

13 March, 2018

Top 5 security policies to protect your business

There are three things that protect an organisation from cybercrime and data loss – education, products and services, and security policies. Without any  one of these, especially proactive security policies, you leave yourself vulnerable to getting a virus, or even..

06 March, 2018

[VIDEO] Introduction To Identity Theft {Part 3}

Today in the Evolve IT Lab,  we discuss the finalpart of our three-part series on identity theft. In today's episode, Lachie and Jason discuss some proactive measures you can take to help prevent your identity from being stolen. 

01 March, 2018

Botnets - A Cybercriminal’s best friend that fetches your computing power

Traditionally, humans have kept pets - like cats, dogs, and bees. However, Cybercriminals have a new type of pet to take care of - botnets. The interesting thing about these virtual creatures is that the Cybercriminal does not even have to feed them - their victims..

27 February, 2018

[VIDEO] Introduction To Identity Theft {Part 2}

Today in the Evolve IT Lab,  we discuss the second part of our three-part series on identity theft. In today's episode, Lachie and Jason discuss a real-life story of a CEO that was affected by identity theft, we hear about how a cybercriminal was able to take..

22 February, 2018

Why data loss prevention should be your goal in 2018

Otherwise known by its acronym (IT people love acronyms) as “DLP”, it is a hot topic currently with the update to the Australian Privacy Act with the introduction of Notifiable Data Breach Laws.

20 February, 2018

[VIDEO] Introduction To Identity Theft {Part 1}

Today in the Evolve IT Lab, Lachie and Jason discuss identity theft. When a cybercriminal hits your or your organisation with identity theft, it is not easy to shake and can severely hurt you and your organisation.

15 February, 2018

How does spear phishing work?

I don’t know about you, but up until recently, fishing was what you did with a rod and reel and spearfishing involved having a spear gun and a wetsuit, usually on some tropical beach. But, ever since the ph got swapped for the f the result is anything but fun.

13 February, 2018

Data Security - A Beekeeper's Guide

Cybercrime seems to be everywhere today - whether Identity Theft, Cryptolocker, or Spear Phishing - it’s a problem that’s just not going away. We know that education is one of the most potent ways of combating it, however, how do you actually get the message across..

06 February, 2018

[VIDEO] Introduction to Phishing

Today in the Evolve IT Lab, Lachie and Jason turn their attention to Phishing. Phishing emails come in all shapes and sizes, and unfortunately, no single product will fully protect your organisation from phishing attacks. A multi-layered defence against phishing..

01 February, 2018

Why Your Company Needs to get Cyber Safe Now

The focus of this blog is being Cyber Safe - not just for businesses but for everyone! As a member/employee/owner, awareness of these issues is essential, but not necessarily enough in itself. It's our responsibility to keep information Cyber Safe!

30 January, 2018

[Video] - Why education is so important in the fight against cybercrime

Today in the Evolve IT Lab - Lachie and Jason discuss education on cybersecurity. We answer why is it so essential for all organisations and how you can get started today.

25 January, 2018

Cyber Security Compliance: Australia’s new data-breach law

Last year saw the passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017 which established the Notifiable Data Breaches (NDB) Scheme – introducing for the first time government guidelines and requirements for cyber security compliance when handling..

23 January, 2018

Subscribe to our blog