Today in the Evolve IT Lab, Lachie and Ben discuss a nonprofits guide to cybersecurity. What risks are your nonprofit exposed to and how can you protect it? Watch on here where we touch on a few of these risks.
Workplaces are constantly evolving with advances in technology and changes in the way that businesses are being conducted. As we run into the second half of 2018, here are four top trends that are being deemed highly important in modern working environments.
We live in an age where there is no escape from technology, no matter what business you’re involved in. Even the most offline, land-based business will have a requirement for technology in some way, shape or form, be it through a point-of-sale system or their..
Today in the Evolve IT Lab, Ben and Lachie discuss how artificial intelligence has impacted the cybersecurity world. In this video you will see how AI is giving the good guys the advantage.
We all know that communication is key when it comes to a properly-functioning workplace. Without effective communication, there is no collaboration or engagement, without collaboration between engaged employees, things start to fall apart.
We’ve all been called into meetings where no agenda has been set. The equipment in the meeting room doesn’t work, people are late, and a lot of banter gets thrown around before any productive use of time has been made.
The digital age has brought about substantial shifts in the way we work. Typical 8 to 5 office jobs are being disrupted in favour of more flexible telecommute roles and remote positions.
Today in the Evolve IT, Lachie and Ben discuss Identity Management. How secure is your business identity? watch on here.
Today in the Evolve IT Lab, Lachie and Ben discuss secure username and passwords. We often find that users want to use simple passwords like their first name, last name or their date of birth.
Let’s take a look at some of the world’s most successful entrepreneurs day to day routines. By implementing some of these tips into your daily routine, you can become more productive too.
Today in the Evolve IT Lab Lachie and Ben answer the question what is more secure MAC or Windows? MACs are often thought as being more secure than windows. However, this is not always the case.
The benefits of public cloud services like Microsoft Azure and Amazon Web Services are well known and frequently highlighted. And with good reason – public cloud offers extremely reliable, highly available and easily scalable architecture for IT infrastructure..
Today in the Evolve IT Lab, Lachie and Ben discuss the risks of mobile devices in your workplace. Are your employees using their personal devices to connect to the corporate email or network? You may need to watch this video.
Imagine the simplicity of Skype connecting you to anyone anywhere together with Facebook’s features that brings the farthest friend closer with one tap, all these accessible in one single application. Imagine the convenient Skype and the engaging Facebook working..
Today in the Evolve IT Lab, Ben and Lachie discuss the security risks of the Internet of Things. Each organisation will find that they have 100's of IoT devices connected to their network. Although these devices help both company and user be more efficient, they..
Nonprofits have the responsibility to their staff, donors and the cause that they support to be a secure and compliant organization. Many government and private donors are now adopting minimum standards for nonprofit organisations, and if a nonprofit should fail to..
Today in the Evolve IT Lab, Lachie and Ben tackle your storeroom full of old office equipment,. We explain the security risk of having filing cabinets, phones and old computer equipment gathering dust in your store room.
Good employees are the most prominent asset an organisation can have, more important than any document, hardware or piece of software. Employees are who keep your customers and who help deliver a beneficial service. So how do you go about holding on to your best..
Today in the Evolve IT Lab, Lachie and Ben discuss the risks of public WiFi. When travelling on holidays or for business Public WiFi can be a lifesaver, allowing you to connect back home and collaborate with your colleagues. However what are the risks and is the..
Nonprofit and community organisations need to pay careful attention to cybersecurity and compliance. Cybercriminals - and the threats that today come with them - are more sophisticated, damaging, and complex.
Today in the Evolve IT Lab, Lachie and Ben talk about Cryptojacking. Now that cryptocurrency has become mainstream and a worldwide phenomenon, more people than ever are trying their luck on a coin. However, so are cybercriminals!
"Old mate Bill reckons we need a security consultant."
So, you’re with old mate Bill, having a long overdue catch-up, chewing the fat, talking some shop. He launches into a story about how his company’s CFO got scammed for $50K by a cybercriminal posing as his..
Today in the Evolve IT Lab, Lachie sits down with Ben from Sophos and discusses some of the cybersecurity predictions for 2018. In 2017 we had such a big year in cybersecurity with: increased phishing, identity theft, and ransomware.
Moving to the cloud has transformed the way we work today - no longer are we restricted to a specific location to complete our day-to-day duties. However, it also means that your organisation is more vulnerable to malicious activities such as key-logging, phishing..
We consistently talk about how to protect your virtual data. However, sometimes we neglect to think our physical security, things like filing cabinets, paperwork on our desks and unwanted guests walking into our offices. Today in the Evolve IT Lab, Lachie and Ben..
Disaster recovery (DR) and business continuity (BC) plans are often mistaken as the same thing. They are, however, two different but necessary plans that keep your business running in the event of an emergency.
There are three things that protect an organisation from cybercrime and data loss – education, products and services, and security policies. Without any one of these, especially proactive security policies, you leave yourself vulnerable to getting a virus, or even..
Today in the Evolve IT Lab, we discuss the finalpart of our three-part series on identity theft. In today's episode, Lachie and Jason discuss some proactive measures you can take to help prevent your identity from being stolen.
Traditionally, humans have kept pets - like cats, dogs, and bees. However, Cybercriminals have a new type of pet to take care of - botnets. The interesting thing about these virtual creatures is that the Cybercriminal does not even have to feed them - their victims..
Today in the Evolve IT Lab, we discuss the second part of our three-part series on identity theft. In today's episode, Lachie and Jason discuss a real-life story of a CEO that was affected by identity theft, we hear about how a cybercriminal was able to take..