Pages

Home

SEO Friendly Title: Technology to support growth. Unlock the power of your business through technology.

Focused on helping clients

Evongo is an IT services provider in Geelong, The Surf Coast and Ballarat, focused on helping clients turn their IT systems into the productive business asset they should be.

For more than 20 years we have been helping our clients achieve their business goals via our professional business IT support services, practical solutions and strategic technical advice. (more…)


Services

SEO Friendly Title: Geelong, the Surf Coast and Ballarat IT services providers

Is your current IT provider helping or hindering your business? As experienced IT services providers in Geelong, the Surf Coast and Ballarat, the team at Evongo is here to help your business. From basic IT support to fully customised IT solutions, businesses get better results by partnering with Evongo.

Managed IT services

Simplify the management of your technology and keep things running smoothly with a managed IT services plan from Evongo. Our managed IT services are cost-effective and can be fully customised to suit your business requirements.

​Cloud services

Implementing the right cloud services in your business can help you gain greater agility, lower your risks and reduce your costs. Evongo’s cloud specialists can help you migrate to the latest cloud technology with confidence.

Mobile device management services ​

Evongo’s mobile device management services provide anywhere, anytime access to everything your employees need while maintaining security and control of your mobile devices.

IT security services

Businesses need to take every precaution to protect themselves from both external and internal security threats. Evongo’s IT security services specialists identify and reduce risks and maximise data integrity.

Data networking services

The ability to exchange information quickly, easily and securely is a focal point for organisations of all sizes. Evongo can design, deploy and maintain a customised data networking services solution to suit your business.

Business continuity services

Gain peace of mind knowing that if an unplanned event happened, such as a natural disaster, technology failure, malicious activity or user error, you can be up and running again as soon as possible with our reliable business continuity services.

IT strategy planning services ​

Evongo’s CIO-level IT strategy planning consultants will ensure you align the right technology solutions to your business goals. We will help you avoid wasting time and money on technology by creating a clear path forward via a technology roadmap.

Hardware and software

Get the very best price on all the latest hardware and software technology through Evongo’s network of leading distributors and IT vendors. Our experienced team will help source the right products to meet your specific needs.


RTP

SEO Friendly Title: Recommended Technology Platform

Overview

At Evongo, we work hard to build what we call our ” Recommended Technology Platform”. We know that using products across this platform will give you a great platform to operate your business from (we know this because we “Eat our own dog food” and use ALL of the services below to run our own company).
Our engineers are trained in and keep up to date with technology across this core set of products to make sure that we can quickly, efficiently and expertly assist you with working with those products.
We also maintain a strong network of contract engineers that we can call on for specific expertise in high level or advanced customisation of these core services.

Recommended Technology Platform

  • HP Servers
  • HP Desktops & Laptops
  • Microsoft Surface
  • HP Switches
  • Netgear Switches
  • HP Printers
  • Draytek Routers
  • Sophos Routers and Wireless
  • Ruckus Wireless
  • Ubiquiti Wireless
  • Datto Wireless
  • Webroot Anti-Virus
  • StorageCraft ShadowProtect
  • StorageCraft ImageManager
  • APC Power Systems
  • Eaton UPS
  • Microsoft Office365 (Exchange / SharePoint)
  • Microsoft Azure
  • Microsoft Server Platforms (latest release including Exchange and SQL)
  • Microsoft Virtualisation – Hyper-V
  • VMware
  • Microsoft Windows 10 Pro and above
  • Microsoft Office 2016 and above
  • Datto Office365 Backups
  • 3CX Phone System v15.5 and above
  • Yealink IP Phones
  • Rackworld Racks and Cables

Third Party Vendors

Whilst we pride ourselves on our troubleshooting skills and abilities to solve many different types of technical problems, please bear in mind that for 3rd party products outside our Recommended Platform, it may take us some extra time to familiarise ourselves with managing and supporting these products.

If the issues can and should be supported by the 3rd party vendor, then we may help you liaise with the vendor directly to get the problem solved in the most efficient and timely manner for you.

We may still be able to purchase items from other vendors at your request (depending on whether our distributors stock it), however if any unforeseen issues arise in the setup, installation and ongoing use, we may need to invoice you separately for this time.


News

SEO Friendly Title: News from your IT services providers in Geelong, the Surf Coast and Ballarat

As leading IT services providers in Geelong, the Surf Coast and Ballarat, the team at Evongo stays up to date with the latest technology and business IT services news across cloud computing, IT security services, business continuity, data networking services, and more.


About

SEO Friendly Title: About Evongo IT support services in Geelong, the Surf Coast and Ballarat

We are committed to helping you gain greater business success through technology

Our professional IT support team is well trained in the latest technology and industry-best practice and has a thorough understanding, built up through years of practical experience, of how to apply technology to improve business performance and achieve specific business objectives.

Whether you  want to simplify mobile device management, move your business to cloud computing or need assistance with business IT services in any way, we are here to help.


Thank You

SEO Friendly Title: Thank You

Thank you for contacting Evongo, we will be in touch with you as soon as possible.


Contact

SEO Friendly Title: Contact an IT services provider in Geelong, the Surf Coast and Ballarat

Evongo is a trusted IT services provider in Geelong, the Surf Coast and Ballarat and has been servicing the local area for over 15 years. If you are interested in finding out more about our managed IT services, cloud computing services, data networking services or other business continuity services, please contact us to arrange a free no-obligation consultation.

For your free assessment of your business’s IT systems, please complete the form below.
We will contact you to book in your audit.


Legal

SEO Friendly Title: Legal

GENERAL

  1. DEFINITIONS AND INTERPRETATION

In these Conditions, the Rate Schedule and every Quote, Order, Plan contract, or other arrangement in connection with the supply of Goods or Services by Evongo Pty Ltd the following words have the following meanings:

After Hours” means from 17:00 – 08:30 Hours Monday to Friday and all day Saturday and Sunday, including Public Holidays;

Business Hours” means Monday to Friday from 08:30 to 17:00 hours excluding Public Holidays;

Client”, “You” or “Your” means a person who seeks or obtains a quote for, or who orders, Goods or Services from Us, and includes both a person whose name is on the Order or on an email attached to which is an order, a person who places an order, and a person on whose behalf an Order is placed or on whose behalf it appears and order is placed, and in any case each of their heirs, successors and assigns;

Conditions” means these terms and conditions;

“Goods” means any goods and/or services sourced by Us or provided by Us in connection with any such goods and/or services including computer hardware and Software and any goods or services provided in connection with any of those things;

“GST” has the meaning given to it under A New Tax System (Goods and Services Tax) Act 1999 (Cth):

“Order” means any order requested by You to Us for Goods or Services in any form;

“Quote” means a quote provided to You by Us;

“Period” means a particular number of half-days, days, weeks, fortnights, months, or any other period, as may be agreed between Us and the You as the period during which some Services will be provided;

“Plan” means any arrangement between Us and You (whether alone or in conjunction with any other person) for Services (including unlimited support) and/or the provision of Goods provided by Us under an arrangement in connection with Work agreed to be done or progressed for or on behalf of You or any other person at Your request, including as set out in a Plan Schedule;

“Plan Schedule” means the key terms applicable to Plans as set, and as may be varied by Us, from time to time in its absolute discretion without notice to You;

“Public Holidays” means any day which is a public holiday throughout Victoria other than a bank holiday;

“Rates” means the hourly rates and other charges for Services (including any call-out fees and any Return/Cancellation Fees) set out in the Rates Schedule, a Plan, Plan Schedule, Quote, contract or arrangement entered into by Us and You or in these Conditions, and includes any monies payable to Us on a quantum meruit basis for any work it has done;

“Rate Schedule” means the schedule of rates, charges and conditions for the services of Ours as set, and as may be varied, by Us from time to time in its absolute discretion without notice to You;

“Reasonable Assistance Limits” has the meaning set out in clause 17.2;

 “Return/Cancellation Fee” means a fee charged pursuant to clause 12.5 as set by Us from time to time;

“Service request” means a request for service such as adds, moves, changes and technical assistance;

“Services” means the provision of any services by Us including Work, advice and recommendations;

“Software” includes software and any installation, update, associated software and any services provided in connection with any of these things;

Us”, Our” or “We” means Evongo Pty Ltd 49 151 995 756 and its heirs, successors and assigns; and

 “Work” means anything We may do, provide, customise, produce or acquire, whether or not in connection with, or for the purposes of, You or Your use or benefit, and includes testing, troubleshooting, installation and configuration of new equipment or software, consulting, scoping, planning, documenting and quoting for complex items.

In these Conditions, the Rate Schedule and every Quote, Order, Plan, contract, or other arrangement in connection with the supply of Goods or Services by Us, unless the contrary intention appears:

Words denoting the singular number only shall include the plural number and vice versa;

Reference to any gender shall include every other gender;

Reference to any Act of Parliament, Statute or Regulation shall include any amendment currently in force at the relevant time and any Act of Parliament, Statute or Regulation enacted or passed in substitution therefore;

Headings and words put in bold are for convenience of reference only and do not affect the interpretation or construction of these Conditions;

All references to dollars ($) are to Australian Dollars;

A reference to time is to Melbourne, Australia time;

A reference to an individual or person includes a corporation, partnership, joint venture, association, authority, trust, state or government and vice versa;

A reference to a recital, clause, schedule, annexure or exhibit is to a recital, clause, schedule, annexure or exhibit of or to these Conditions;

A recital, schedule, annexure or description of the parties forms part of these Conditions;

A reference to any agreement or document is to that agreement or document (and, where applicable, any of its provisions), as amended, novated, supplemented or replaced from time to time;

Where an expression is defined, another part of speech or grammatical form of that expression has a corresponding meaning;

A reference to “includes” means includes without limitation;

A reference to “will” imports a condition not a warranty; and

A reference to bankruptcy or winding up includes bankruptcy, winding up, liquidation, dissolution, becoming an insolvent under administration, being subject to administration and the occurrence of anything analogous or having a substantially similar effect to any of those conditions or matters under the law of any applicable jurisdiction and to the procedures, circumstances and events which constitute any of those conditions or matters.

  1. APPLICATIONS OF THESE CONDITIONS

Unless otherwise agreed by Us in writing, these Conditions are deemed incorporated in and are applicable to (and to the extent of any inconsistency will prevail over) the terms of every Quote, Order, Plan, contract, or other arrangement in connection with the supply of Goods and/or Services by Us to You.

The invalidity or enforceability of any one or more of the provisions of this Agreement will not invalidate, or render unenforceable, the remaining provisions of this Agreement.

  1. COMMITMENT TERM

    1. The minimum term that You acquire the service for is outlined in Our Quote to You, beginning from the first of the next month after the date of signing or approving the Quote.
    2. After the expiry of the Committed Term, an extension of the Term will automatically commence for the same period as the original Committed Term and will continue indefinitely, unless earlier terminated by you as specified in Clause 4
  1. TERMINATION

    1. This Agreement may be terminated by You upon ninety (90) days written notice if We:
      1. Fail to fulfil in any material respect its obligations under this Agreement and do not cure such failure within thirty (30) days of receipt of such written notice.
      2. Breach any material term or condition of this Agreement and fail to remedy such breach within thirty (30) days of receipt of such written notice.
      3. Terminate or suspend our business operations, unless it is succeeded by a permitted assignee under this Agreement.
    2. This Agreement may be terminated by Us upon ninety (90) days written notice to you.
    3. If either party terminates this Agreement, we will assist you in the orderly termination of services, including timely transfer of the services to another designated provider. You agree to pay us for rendering such assistance at our normal rates as outlined in our current Rate Schedule.
    4. Should You wish to terminate this Agreement before the end of the commitment term, You agree to pay all of the remaining payments up until the end of the commitment term.
  1. REPRESENTATIONS

    1. You acknowledge that no employee or agent of Ours has any right to make any representation, warranty or promise in relation to the supply of Goods or Services other than subject to and as may be contained in the Conditions.
  1. NOTICES

    1. Any notices given under the Conditions shall be in writing and sent by e-mail to the last notified e-mail address of Yours.
  1. GOVERNING LAW

    1. The Conditions shall be governed by and construed in accordance with the laws of Victoria and the parties submit to the non-exclusive jurisdiction of the Courts of Victoria.
  1. ASSIGNMENT

    1. You may not assign Your rights and obligations under this Agreement without the prior written consent of Us.
  1. VARIATION OF THESE TERMS AND CONDITIONS

    1. We may at any time vary these Terms and Conditions by publishing the varied Terms and Conditions on Our website. You accept that by doing this, We have provided You with sufficient notice of the variation. We are under no other obligation to notify You of any variation to these terms and conditions.

GOODS AND SERVICES

  1. QUOTES

    1. Term and effect: Quotes will only be valid for 7 days unless otherwise specified in the Quote. A Quote is merely an invitation to You to place an Order with Us and the acceptance of a Quote by You will not create a binding contract between You and Us.
    2. Quote is valid for 7 days only. Expiry dates on quotes are set to be able to inform Us when the quote is still active or to be discarded. Once discarded the quote will need to be requested again.
    3. Once a quote has been confirmed by Us, then the prices in the quote will be confirmed as the final agreed price. A quote is confirmed as ‘final’ as soon as both parties agree with the final price after any last changes requested by You.
    4. The price in the final quote may vary from the original request if there is any price or product changes requested by You. We reserve the right to alter product and prices in the quote, as long as the quote has not been confirmed with You.
    5. Quotes and estimates shall be deemed to correctly interpret the original specifications and are based on the cost at the time the quote or estimate is given. If You later require any changes to the quotes, and We agree to the changes, these changes will be charged at Our prevailing rate.
    6. Once the Quote has been confirmed and converted to an Order, the Order will be subjected to our normal Terms and Condition of Sale.
    7. The general minimum turnaround time for Quote request to be actioned is usually 24 hours. In the event that a quote is required urgently please let us know so that we can respond to it accordingly.
    8. When a special price or discount offer has been applied to this Quote, no other special promotion, discount or bonus offer will be applicable.
    9. In the event that products in the Quote are subjected to any price and supply fluctuations that is outside of Our control We reserve the right to update the price and product in the Quote accordingly. If a product has undergone a price drop or a price increase, the Quote will then be adjusted accordingly. If there is a product that is no longer available, the product will then be replaced or substituted based on Your request and is subject to Your final approval.
    10. Price on non-stocked products are subjected to Price and stock fluctuations and can only be confirmed once the Quote is turned into an Order. While We endeavour to honour every price quoted, if there is a price increase that is beyond our control, We reserve the right to increase the price as necessary.
    11. Once a Quote has already passed the expired date, We may cancel the quote or estimate without having to notify or receive an approval from You.
    12. ETA information is based on an estimate given by our vendors and cannot be held as the actual promised date.
    13. Freight charges will be added to the Order unless otherwise stated. Any included delivery charges are estimates only.
    14. We do not keep inventory and as such only order items once we receive a completed order from a client. If You would like to return an item or cancel an order, a restocking fee may apply. We will need to get approval from the distributor that the stock is returnable before being able to issue a refund as not all products can be returned.
    15. Prices are based upon total Quote Purchase.
    16. Unless Specified, all items on quote are covered by manufacturer’s warranty covering parts and labour for hardware only on a return to depot basis.
    17. Varying or withdrawing Quotes: We may vary or withdraw a Quote at any time in Our absolute discretion and without prior notice to You. We may do so for any reason We consider fit, including, e.g. where the Goods or Services become unavailable or the cost price of Goods or Services increases after the date of the Quote.
  1. ORDERS

    1. Order forms: You may place an Order for Goods and/or Services with Us.  Normally, We will require that You provide either a completed Order form or You approve the quote electronically via either an email or a web based system with the date and Your details, including Your full legal name or description and any applicable ABN or ACN number (including the full name or description of any person on whose behalf the order is placed), Your address together with any relevant Quote number and date.
    2. Approval of Orders: You will need to sign the Order or have it duly executed on Your behalf, unless the Order is sent by email or via the web based ordering system, in which case the Order will be treated or deemed as if signed by or on behalf of You by the person whose name appears as the sender of the email or submitter of the form.
    3. Reliance on appearance of validity: Absent actual knowledge to the contrary, We may rely upon the apparent validity of an Order. If any Order is signed or sent by email or approved through the web based ordering system by a named person, that person warrants that the Order is, and it is acknowledged the Order is deemed in favour of Us to be:
      1. signed by, and duly authorised by, both the person who signed the Order and the person who sent the email; and
      2. duly authorised by the person on whose behalf the Order is placed or apparently placed.
    4. Acceptance and Orders: An Order has no effect unless or until it is accepted by You in writing and, until We have received from You payment in clear funds for the Order and any related freight, delivery and (where applicable) in-transit insurance costs in clear funds.
    5. No obligation to deliver: We are not obliged to deliver any Order until we have received payment in clear funds from You for the Order, any related freight, delivery and (where applicable) in-transit insurance costs or where We are unwilling or unable to complete the Order for any reason provided it refunds any payment made by You in respect of the Order.
    6. Credit checks: For the purposes of ascertaining the credit standing or history of a prospective customer to whom We are considering extending credit or payment terms, You hereby consents to Us undertaking a credit reference check in respect to You.
    7. Cancellation of Orders: You will not cancel an Order unless We agree to do so in writing in Our absolute discretion. You acknowledge that, amongst other things, We cannot cancel an Order once the manufacturer or supplier has despatched the relevant Goods and that such despatch often occurs the same day as the Order is placed by Us.
    8. Processes and Procedures: We have processes and procedures that We follow in the course of the provision of Our Services and the supply of Goods. You agree to co-operate with Us and to comply with such processes and procedures as advised to You from time to time.
  1. PRICING AND RATES

  1. Rates exclude Tax: All rates and amounts charged or quoted for Goods and/or Services by Us are exclusive of Tax and any other applicable taxes or government charges (unless otherwise stated in writing by Us).
  2. Rates Schedule: You must pay for Goods and Services at the Rates set out in any applicable Plan and the Rate Schedule as applicable from time to time during the provision of the Goods and/or Services.
  3. Vary Rates: We reserve the right vary any Rate and/or the Rate Schedule from time to time (subject to any fixed pricing for specific periods in any Plan), in its absolute discretion and without notice to You.
  4. Call-out fees: You acknowledge that call-out fees may be charged in addition to the Rates at Our absolute discretion and that the amount of the call-out fee will depend upon where the Services are provided.
  5. Return/Cancellation Fee: Where We arrange a return or refund on behalf of You, or where an Order is cancelled by You after acceptance by Us, We may charge You a Return/Cancellation fee to cover the administration costs to Us in processing the return or refund, or in processing the Order, the cancellation and any refund. We may deduct the Return/Cancellation fee from out of any moneys otherwise due to be refunded to You by Us.
  6. Expenses: You must pay any out of pocket expenses incurred by Us in providing the Services to You in addition to the Rates, charges and call-out fees, upon written demand. Such expenses will include travel costs, flights, car hire, petrol, insurance, taxi fares, accommodation and related meal allowance, tolls and car parking expenses. Where appropriate, We will obtain prior written authorisation from You before such expenses are incurred.
  7. Separate charges for Goods and Services: We may in Our absolute discretion charge for Goods separately from Services or may charge for Goods and Services together.
  8. Calculation of increments: Where a charge is calculated based on increments of time, e.g. 1 hour or 30 minutes, We will charge the applicable rate for the whole increment of time even if work is done during part of, but not for the whole of, that increment of time.
  9. Change in underlying costs: Without prejudice to any other rights of Ours under these Conditions, where there is any increase in the underlying costs incurred by Us in connection with the supply of Goods or Services to You, We may, in our absolute discretion, vary any of Our Rates.
  10. Pre-Paid Blocks of Service: Where You agree to buy Pre Paid Blocks of Service during a Period, payment must be made in advance for the Pre-Paid Blocks of Service at the rate applicable pursuant to the Rates Schedule for all Services. Each such rate being less any discount agreed in writing between Us and You in respect of the Pre-Paid Blocks of Service. Services included in a Pre-Paid Block of Service rate during the Period:
    1. are calculated in accordance with the applicable minimum time periods and increments set out in the Rates Schedule; and
    2. are only provided by Us during the applicable Period. Where Services are provided for a specified Period:
      1. the Services remaining unused for that Period cannot be rolled over into any subsequent Period; and
      2. We are not liable to refund, re-imburse, pay damages or otherwise compensate or indemnify You in respect of those unused Services.
  1. SERVICES AND PLANS

    1. Service and Plan Variations: Currently, We offer the Services and Plans referred to in the Rates Schedule and any Plan Schedule. We may withdraw the provision of, or vary the scope or terms of, or add to or change, the Services without notice to You, from time to time in Our absolute discretion.
    2. Copies on Request: We will provide You with a copy of the current Rates Schedule upon request. Plan Schedules are tailored for particular Plans and are available to Clients participating in the Plan.
  1.  CONTRACTING

    1. We may subcontract any or all of the Services to be performed, but shall retain prime responsibility for the Services under these terms.
  1. DELIVERY, TITLE AND RISK

    1. Delivery liability: We will use all reasonable endeavours to despatch Goods by the due date, but do not accept any liability for non-delivery or failure to deliver on time where this is caused by circumstances beyond the reasonable control of Ours, including, for example, due to failures in supply to Us or delays caused by third parties, such as delivery companies or manufacturers.
    2. Availability to accept delivery: You must be available to accept the Goods at Your nominated delivery address during Business Hours unless otherwise arranged.
    3. Passing of Risk: Delivery is deemed to take place when the Goods are delivered to Your nominated address, whereupon risks of loss, breakage and all damage and all other risks pass to You. Nothing in this clause 3 will affect title to the Goods.
    4. Obligation to insure: You will ensure that Goods are adequately insured from the time of delivery under clause 3.
    5. Retention of Title: Until We receive full payment in cleared funds for any moneys due to Us by You on any account or for any reason:
      1. title to, and property in, Goods supplied to You remain vested in Us and does not pass to You;
      2. You must hold those Goods as fiduciary bailee and agent for Us and must not sell them;
      3. You must keep those Goods separate from other goods and maintain the Goods and their labelling and packaging intact;
      4. Where You sell the goods in breach of these Conditions, You are required to hold the proceeds of any sale of those Goods on trust for Us in a separate account (however any failure to do so will not affect Your obligation to deal with the proceeds as trustee and remit them to Us);
      5. We may, without prior notice, enter into any premises where We suspect those Goods may be, take possession of those Goods and sever and remove those Goods (notwithstanding that they may have been attached to other goods not the property of Ours) and for this purpose, You hereby irrevocably authorise and direct Us (and Our employees and agents) to enter into such premises as its duly authorised agent and You hereby indemnify and hold harmless Us from and against any costs, claims, allegations, demands, damages or expenses or any other acts or omissions arising from or in connection with, such entry, repossession or removal.
      6. You irrevocably appoint Us as Your attorney to do anything We consider necessary in order to enter such premises and repossess the Goods as contemplated by this clause 5.
  1. RETURNS AND CLAIMS FOR GOODS AND SERVICES

    1. General Returns Policy: Notwithstanding anything in these Conditions, You acknowledge that We supply Goods subject to all applicable conditions, including returns and claims policies, of any relevant manufacturer or supplier. You will accept Goods subject always to these Conditions and the terms of such conditions and will indemnify and hold Us harmless in respect of any further or other obligation or any failure or default on the part of that manufacturer or supplier.
    2. Customised Goods not returnable: Where Goods have some element of customisation for You, are supplied pursuant to an Order for Goods that is in the opinion of Ours special or unusual, the Goods are obtained from overseas, the Goods are obtained from a supplier who is no longer trading, or the Goods are otherwise not readily returnable by Us to the manufacturer or supplier or any related services may not be cancelled, You may not return the Goods to Us or cancel the related services.
    3. Duty to inspect: You will inspect all Goods immediately upon their delivery. Within 7 days of such delivery You may give written notice to Us of any matter or thing, by reason of which You might wish to return the Goods, ask for a refund, or make a claim. If no such notice is given on time, You will accept the Goods without any such return, refund or claim.
    4. Return Condition: Where You are entitled to return Goods under these Conditions, You must return the Goods in their original condition and unopened, provided always that where, upon opening the packaging it becomes apparent that the Goods are different to what is described on the packaging or that the Goods are faulty, the Goods may be returned.
    5. Return costs: You will pay all costs and expenses incurred by Us in arranging the return of the Goods to a manufacturer or supplier and/or the cancellation of any related services unless that manufacturer or supplier pays such costs.
    6. Consequences of use, installation, customisation or sale: You will indemnify and hold Us harmless in respect of all allegations and claims in respect of Goods once such Goods have been used, installed, customised or re-sold by You (without prejudice to the recourse of such a customer to the manufacturer of the Goods).
  1. COMPUTER UTILITY, FUNCTIONALITY AND FITNESS FOR PURPOSE

    1. Service limitations given the science of computing: You acknowledge that a reasonable incident of the Services may involve trial and error and that it is a science applied often in novel or unknown circumstances and involving experiment. In particular, You acknowledge that the Services may involve tests, troubleshooting, advice and recommendations that may prove incorrect or inappropriate, particularly in an attempt to cure a problem You are having. While We will make what We consider (in Our absolute discretion) to be all reasonable endeavours to provide appropriate tests, troubleshooting, sound advice and good recommendations in order to assist You, You will always indemnify and hold Us harmless in the provision of our Services to You.
    2. Reasonable Assistance Limits: We are only obliged to provide what We consider, in Our absolute discretion, to be reasonable assistance in the circumstances (including with the installation and customisation of new software or hardware for You or any other Work) under any Plan and You will pay for additional work at the Rates unless otherwise agreed. Without limiting the discretion of Us to determine what reasonable assistance is, normally, reasonable assistance is limited to work done during Business Hours over a period of time not exceeding any period that We have allowed or allows for the Work or has estimated or estimates the Work will take, whether or not notice of the time allowed or estimated is given by Us to You.
    3. Recommendations, suitability, functionality and fitness for purpose: The parties acknowledge that:
      1. We may recommend that You purchase Goods provided by third parties from time to time;
      2. Recommendations may be made in situations where You have made known to Us the purpose for which the Goods will be used or some function sought to be fulfilled;
      3. You acknowledge that We have no control over many factors involved with the suitability, function or fitness for purpose of Goods in an existing or new computer environment, e.g.
        1. the compatibility or ability of the Goods to fit into or perform to expectations in the receiving computer/internet environment; or
        2. the behaviour of third party supplier, e.g. in relation to support;
      4. You acknowledge that for a whole number of reasons outside of Our control, the Goods may fail to meet Your expectations, may not turn out to be fit for all or any of the purposes sought, may not be suitable or may not function properly in all or any respects;
      5. You acknowledge that the Services provided by Us may involve the very task of seeking to customise Goods so they may be fit for particular purposes and that customisation may be a very substantial project in itself;
      6. Accordingly You will accept the sole responsibility for, and indemnify and hold Us harmless in respect of:
        1. decisions as to whether or not to follow recommendations by Us;
        2. decisions as to whether or not to purchase or customise Goods or obtain Services for that or any other purpose; and
        3. any failure or defect in suitability, function or fitness for purpose of any Goods and/or Services, including a responsibility to obtain Your own independent advice or second opinion from a suitably qualified person;
      7. Where We provide Services with a view to achieving Your purposes, suitability, function or fitness for purpose (whether expressed, agreed or otherwise), You must pay for those Services on time without any set-off or counter-claim, whether or not We are able to achieve any of such purposes, suitability, function or fitness for purpose, provided always that We have acted in good faith and have made what We consider, in Our absolute discretion, to have made all reasonable endeavours to achieve those outcomes.
    4. Testing Procedures: You will follow the instructions of Ours with regard to testing or troubleshooting any problems and that if those do not resolve the outstanding problems, We will, subject to these Conditions, allocate such resources as We consider reasonable in the circumstances towards their resolution.
  2. FORCE MAJEURE

    1. Force Majeure: If We are unable to supply any Goods or Services due to circumstances beyond Our reasonable control, We may cancel the Order (even if the Order has already been accepted) or cease to provide the Services by written notice to You, in which case You will hold Us harmless.
    2. We will not be liable for any breach of contract due to any matter or thing beyond Our control, including failures by third parties to supply goods, services or transport, stoppages, transport breakdown, fire, flood, earthquake, acts of God, strikes, lock-outs, work stoppages, wars, riots or civil commotion, intervention or public authority, explosion or accident.
  3. PRODUCT SPECIFICATIONS

    1. Alterations to Specifications: We make every effort to supply the Goods in accordance with the Order however We may supply alternate Goods subject to minor variations in actual dimensions and specifications where these are changed by the manufacturer of the Goods after the Order date and before delivery.
    2. Substitute Goods: If We cannot supply the Goods ordered by You, We may supply alternate Goods of equal or superior quality provided however that You will not pay a higher price than the price Quoted or otherwise agreed for the Goods ordered.
  4. WARRANTIES

    1. Reliance on Manufacturer’s Warranty: You will rely on the warranties provided by the manufacturer of Goods supplied by Us (where applicable) and will deal direct with such manufacturer rather than Us for all claims covered by such warranties.
    2. No claim for manufacturer’s default: You indemnify and hold Us harmless in respect of the performance or otherwise, by any manufacturer of Goods supplied to You by Us, of any of the obligations of such manufacturer in respect of such Goods. This includes any damages or moneys due to You arising under, or in connection with, any breach by the manufacturer of any the manufacturer’s warranties in respect of the Goods.
  5. LIABILITY

    1. Exclusion: Except as specifically set out herein and so far as may be permitted by law, any term, condition or warranty in respect of the quality, fitness for purpose, condition, description, assembly, manufacture, design or performance of the Goods or Services, whether implied by statute, common law, trade usage, custom or otherwise, is hereby expressly excluded.
    2. No liability for program or data loss: You indemnify and hold Us harmless in respect of any allegation, claim, loss or expense of Yours or any third party for any program or data loss or damage suffered by You or that third party arising directly or indirectly from the supply of the Goods or Services by Us to You. You acknowledge You are solely responsible for backing up Your programs and data in order to mitigate Your own potential loss of programs and data.
    3. Limit on consequential damage: You indemnify and hold Us harmless in respect of any allegation or claim as to any indirect or consequential losses or expenses suffered by You or any third party, howsoever caused, including but not limited to loss of turnover, profits, business or goodwill or any liability to You or any third party.
    4. Limit on damage from a failure in supply: You indemnify and hold Us harmless for any allegation or claim for loss or damage by You or a third party where We have failed to meet any delivery date or cancels or suspends the supply of Goods or Services.
    5. General limit on liability: Except as otherwise expressly stated in these terms and conditions, We are not liable for any loss or damage of any kind however caused (including, but not limited to, by the negligence of Us) which is suffered or incurred by You in connection with:
      1. Goods or Services provided to You or any Work;
      2. these Terms and Conditions;
      3. Your use of Our website (including the use of a credit card or other debit device) or any linked website;
      4. the non-availability of Goods or Our Services for any reason;
      5. any act or omission of Ours or the provision of inaccurate, incomplete or incorrect information by You, or
      6. for any other reason whatsoever.
    6. Limitation options: To the extent that any legislation implies a condition or warranty that cannot be excluded but can be limited, clause 5 does not apply to that liability and Our liability for any breach of that condition or warranty is limited to Our doing any one or more of the following (at its election):
      1. replacing the Goods or supplying equivalent Goods, Services or Work;
      2. repairing the Goods or the Work;
      3. paying the cost of replacing the Goods or the Work or acquiring equivalent Goods, Services or Work; or
      4. paying the cost of having the Goods or the Work repaired.
    7. Laws still apply: Nothing in these Conditions is to be interpreted as excluding, restricting or modifying or having the effect of excluding, restricting or modifying the application of any State or Federal legislation applicable to the supply of the Goods or Services which cannot be excluded, restricted or modified.
    8. Severance: If any provision contained in the Conditions is unlawful, invalid or unenforceable, those provisions may be severed without prejudice to the validity and enforceability of the remaining provisions of the Conditions.
  6. ERRORS AND OMISSIONS

    1. We make every effort to ensure that all prices and descriptions quoted are correct and accurate. In the case of an error or omission, We may rescind the affected contract by written notice to You, notwithstanding that We have already accepted Your Order and/or received payment from You. Our liability in that event will be limited to the return of any money You have paid in respect of the Order.

OUR RESPONSIBILITIES

  1. PRIVACY STATEMENTS AND YOUR RIGHTS

    1. We are collecting Your personal information for the fulfilment of Quotes, Orders and the provision of Goods or Services to you and it may retain and use it for any such purposes (“Authorised Purposes”).
    2. You are required to provide your personal information to Us for Authorised Purposes.
    3. We may disclose Your personal information to other persons for the purposes of the fulfilment of Quotes, Orders and Work for you or in order to provide Goods or Services to You, to verify the information You provide, for enquiries about Goods or Services that may be suitable for your purposes, or to confirm Your requirements, to anyone proposing to supply Goods or Services to You, or to acquire Goods or Services on Your behalf, or in respect of enquiries relating to any of the foregoing.
    4. Otherwise We will not disclose Your personal information without Your consent unless authorised by law.
    5. Your personal information will be held by Us at Our Principal Place of Business and You can contact Us to request to access or correct it.
    6. We rely on You to submit correct information and details where requested. You accept that You may incur additional expenses if you submit incorrect information.
  2. OUR WEBSITE

    1. We make no representations or warranties in relation to information available on Our website, including without limitation:
      1. that the information on Our website is complete or correct;
      2. that Our website will be continuously available or free from any delay in operation or transmission, virus, communications failure, internet access difficulties or malfunction in hardware or software; and that We endorse any internet site linked to Our website or any third party products or services referred to on Our
  1. INSURANCE COVERAGE

    1. We will maintain at Our own expense, commercial general liability insurance for personal injury and property damage for a general aggregate of $2,000,000. At Your request We will provide You with certificates, including renewal certificates evidencing such coverage within thirty (30) days of commencing this Agreement, at every renewal and at other times as may be reasonably requested by You.

YOUR RESPONSIBILITIES

  1. LODGING OF SERVICE REQUESTS

    1. In order for Us to provide You with the agreed Service, You agree to follow Our process for lodging of Service Requests as outlined in Appendix A.
  2. ACCESS TO SYSTEMS, SITES AND PEOPLE

    1. In order to provide You with the agreed Service, You agree to give Us access to various items of Yours including but not limited to, equipment, people and sites as and when required.
    2. You agree to allow Us to install software on Your Equipment that allows Our technicians to access Your systems at any time. This software allows Us to view system statuses, send monitoring information, see users’ desktops and control Your PC’s. This may require that devices are left on overnight or weekends.
  3. THIRD PARTY AUTHORISATIONS

    1. At times We may need to contact Your third party providers on Your behalf, such as Your internet provider. Some of these providers may require Your authorisation for Us to deal on Your behalf. It is Your responsibility to ensure that We are able to deal freely with these providers.
  4. PAYMENT, LATE PAYMENT AND DEFAULT

    1. Payment due date: All invoices issued to You are due and payable to Us within the terms stated on the invoice (unless otherwise agreed in writing). by cash, cheque, credit card or direct deposit in accordance with these Terms and Conditions and in the way set out in the Invoice.
    2. 7 days late: Where You fail to pay an invoice within seven (7) days of the due date, We may, in Our absolute discretion and without prior notice, suspend or discontinue the supply of Goods and/or Services to You.
    3. Recoveries: All legal and other costs and expenses incurred in connection with the recovery of late payments will be added to the amount due by You to Us and will be recoverable from You, in addition to the original invoice cost. If You default in payment of any invoice on time, moneys which would have become due by You at a later date shall be immediately due and payable without any further notice to You. Collectively, all of these moneys are referred to in these Conditions as a “Sum Due”.
    4. Interest: If payment of any Sum Due is not made on time, We will charge interest daily on the Sum Due at the maximum rate allowed by law, calculated and charged daily on and from the due date until the Sum Due is paid in full.
    5. Application of funds: All payments of the Sum Due made by You to Us will be applied as follows:
      1. first in or towards payment of any costs (including legal costs), charges, expenses or outgoings paid by Us in relation to any dishonoured cheque fees, collection costs or any other action taken by Us for the recovery of any amounts owing by You to Us;
      2. secondly, in or towards payment of any interest due or payable hereunder, and
      3. thirdly, in or towards payment of Your debts to Us in order from the longest standing due to the most recently incurred.
    6. Security: We may require You to provide security over Your property (including the Goods or any other property of Yours) as collateral to be held as security for any Sum Due or as a condition precedent to the continuation of supply of Goods or Services by Us to You.
    7. Payment arrangements: In the event that a repayment arrangement is made in relation to any Sum Due and the supply of Goods or Services is resumed, but then a repayment due under that arrangement is not made on time, We may, in Our absolute discretion and without prior notice, again suspend or discontinue the supply of Goods or Services to You.
    8. Power of Attorney: You hereby irrevocably appoint Us as Your attorney to do anything We consider fit for the recovery of the Sum Due or the creation, perfection or enforcement of any collateral held or to be held as security for any Sum Due.
    9. Other remedies: We may exercise any of Our rights and remedies including taking legal action against You for the recovery of any moneys due to Us, notwithstanding it may have exercised other rights under these Conditions.
  1. NON SOLICITATION OF CLIENTS AND EMPLOYEES

    1. You agree that employees are one of Our most valuable assets, policy and professional ethics require that Our employees not seek employment with, or be offered employment by You during the course of engagement and for a period of two (2) years thereafter (or the maximum amount permissible by a Court).
    2. You agree that Our damages resulting from breach of this clause 1 would be impracticable and that it would be extremely difficult for Us to ascertain the actual amount of damages. Therefore in the event You violate this provision, You agree to immediately pay Us 100% of the employee’s total annual salary, as liquidated damages and We shall have the option to terminate this Agreement without further notice or liability to You. The amount of liquidated damages reflected herein is not intended as a penalty and is reasonably calculated based upon the projected costs We would incur to identify, recruit, hire and train suitable replacements for such personnel.
  2.  SOFTWARE

    1. All Software licences are the responsibility of You and not that of Us. It is the duty of Yours to store all licences for all Software used, so that that they can be reproduced if and when required. This includes all Software installed by Us.
    2. You indemnify and hold Us harmless against any claim, allegation, loss, damage or expense arising directly or indirectly from:
      1. any unauthorised Software use by You;
      2. any breach of any Software licence in respect of Software provided to Us by You to be installed on one of Your computers;
      3. otherwise as a result of Us installing Software at Your where You are not authorised to use the Software; and
      4. any problem, defect or malfunction associated with any Software (or related services) supplied by third parties.
    3. All copyright in custom software remains the sole property of Ours unless alternate arrangements are made as part of a separate software agreement.
  3. COPYRIGHT AND CONFIDENTIALITY

    1. Warranty and breach: You warrant that any confidential or copyright information or intellectual property (of any kind and in any form held) or provided by You to Us belongs to You. In the event of any breach of this warranty, You will pay all sums due to Us as If such warranty had not been breached (and regardless of any non-performance of any obligation by Us on account of or in connection with the breach of such warranty). You indemnify and hold Us harmless in respect of any allegations, claims, loss, costs or expenses in connection with such breach of warranty by You.
    2. Retention of title: All copyright and other intellectual property rights in any Work created, commissioned or acquired by Us in the course of the supply of Services by Us to You will be the exclusive property of Ours unless otherwise agreed in writing by Us and You.
    3. Confidential Information: We acknowledge that in the course of providing Services to You, We may learn from You certain non-public personal and otherwise confidential information relating to You, including Your customers, consumers or employees. We shall regard any and all information We receive which in any way relates or pertains to You, including Your customers, consumers or employees as confidential.
    4. You also acknowledge that all information and services, consulting techniques, proposals, and documents disclosed by Us or which comes to Our attention during the course of business and provided under this agreement constitute valuable assets of, and confidential and/or proprietary information to Us.

 

As such, both parties shall take all commercially reasonable steps to not disclose, reveal, copy, sell, transfer, assign, or distribute any part or parts of such information in any form, to any person or entity, or permit any of its employees, agents, or representatives to do so for any purpose except unless permitted in writing by the disclosing party or as required by applicable law.

 


Terms and Conditions

SEO Friendly Title: Terms and Conditions

Terms and Conditions of Supply of Products & Services

Every quotation or purchase of Products and/or Services from Evongo Pty Ltd, are subject to the following terms and conditions without limitation or qualification. Evongo reserves the right to change these terms and conditions at any time, effective upon the posting of new terms and conditions on its website. It is the Customers responsibility to ensure that they have read, understood and agree to the most recent terms and conditions available on the website.

DEFINITIONS
“Agreement” means these Terms and Conditions of Supply of Products and Services.”Confidential Information” includes trademarks, service marks, domain names, logos and other branding elements (“Marks”); and patents, copyrights, inventions, know-how, processes and software; and all associated rights in these. “Customer” means a person, firm or corporation, jointly and severally if there is more than one, acquiring Products or Services from Evongo; “Evongo ” means Evongo Pty. Ltd; “Intellectual Property Right” means any patent, trademark, service mark, copyright, moral right, right in a design, know-how and any other intellectual or industrial property rights, anywhere in the world whether or not registered; “Managed Equipment” means networking equipment and devices that Evongo has agreed to support under a Managed Services plan; “Managed Services” means a service provided by Evongo to the Customer to support the Customer’s Managed Equipment and end users; “Products” means any item, goods, equipment supplied by Evongo to the Customer; “Services” means Managed Services, hosting services, training services, consultation services supplied by Evongo or a third party to the Customer. “Services Schedule” means a document identifying the Managed Equipment and number of users that Evongo has agreed to support under a Managed Services Agreement. “Term” means the minimum duration of the Managed Services plan.

1. BASIS OF THE AGREEMENT
a. Unless otherwise agreed by Evongo in writing, these terms and conditions apply exclusively to every sale of Products or Services by Evongo to the Customer and cannot be varied or supplanted by any other conditions without the prior written consent of Evongo.
b. Any written quotation provided by Evongo to the Customer concerning the proposed supply of Products or Services is valid for as per quote expiry and is an invitation only to the Customer to place an order based upon that quotation.

2. TRADING HOURS
a. Normal business hours are from 8.30am to 5pm Monday to Friday (except Victorian public holidays).
b. Any work done outside of normal business hours will be considered after hours and will be charged at Evongo’s current after hours rate.

3. PAYMENT OBLIGATIONS
a. Payment for all Products and Services must be made by cash, cheque or EFTPOS.
b. The Customer shall make all payments due according to the due date on the invoice, without any deduction whether by way of set-off, counterclaim, discount, abatement or otherwise unless the Customer has a valid court order requiring an amount equal to such deduction to be paid by Evongo to the Customer.
c. The Customer must notify Evongo of any dispute within 7 days of receipt of an invoice. Failure to notify Evongo within this time, will be construed as a waiver of any of its rights to dispute the invoice.
d. If the Customer fails to pay Evongo any sum due, Evongo may without prejudice to any other remedy available to it:
i. charge the Customer interest at the current legal rate on any sum due for the period from the due date until the date of payment in full;
ii. charge the Customer for all expenses and costs (including legal costs, debt collection fees and dishonoured cheque fees) incurred by Evongo resulting from the default and in taking whatever action it deems appropriate to recover any sum due;
iii. suspend or terminate the supply of any Products or Services to the Customer by giving written notice to the Customer and Evongo shall not be liable for any damages whatsoever resulting from the action taken.
e. Evongo shall be entitled at any time and from time to time to increase its fees by giving the Customer not less than 90 days prior written notice.

4. RETENTION OF TITLE
a. Until full payment in cleared funds is received by Evongo for all Products supplied by it to the Customer, as well as all other amounts owing to Evongo by the Customer, title and property in all Products remain vested in Evongo and do not pass to the Customer.
b. Until ownership of the Products has passed to the Customer, the Customer must:
i. hold the Products on a fiduciary basis as Evongo’s bailee;
ii. store the Products (at no cost to Evongo) separately from all other Products or any third party in such a way that they remain readily identifiable as property of Evongo;
iii. not destroy, deface or obscure any identifying mark or packaging on or relating to the Products;
iv. maintain the Products in a satisfactory condition and keep them insured on behalf of Evongo for their full price against all risks to Evongo’s
reasonable satisfaction.
c. Until ownership of the Products has passed to the Customer, the Customers right to possession of the Products shall terminate immediately if:
i. the Customer has a bankruptcy order made against them or makes an arrangement or composition with creditors, or otherwise takes the benefit of any statutory provision for the time being in force for the relief of insolvent debtors, or (being a body corporate) the Customers convenes a meeting of creditors (whether formal or informal), or enters into liquidation (whether voluntary or compulsory) except a solvent voluntary liquidation for the purpose only of reconstruction or amalgamation, or has a receiver and/or manager, administrator or administrative receiver appointed of the Customers undertaking or any part thereof, or a resolution is passed or a petition presented to any court for winding up or for the granting of an administration order in respect of the Customer, or any proceedings are commenced relating to the insolvency or possible insolvency of the Customer; or
ii. the Customer suffers or allows any execution, whether legal or equitable, to be levied on its property or obtained against the Customer, or the Customer fails to observe/perform any of its obligations under this agreement or any other contract between the Customer and Evongo, or the Customer is unable to pay its debts within the meaning of the Insolvency Act 2008 or the Customer ceases to trade; or the Customer encumbers or in any way charges any of the Products.
d. Evongo shall be entitled to recover payment for the Products notwithstanding that ownership of any of the Products has not passed from Evongo.
e. The Customer grants Evongo, its agents and its employees an irrevocable licence at any time to enter any premises where the Products are or may be stored in order to inspect them, or, where the Customers rights to possession has terminated, to recover them and Evongo would be indemnified from and against all costs, claims, demands or actions by any party arising from such action.

5. PRODUCT RETURNS
a. It is not the policy of Evongo to accept the return of Products that were correctly supplied, except by the approval of management of Evongo. If Evongo in it’s sole discretion agrees to accept the returned Products, all such Products must be returned in their original condition including packaging and manuals.
b. A restocking fee may be charged at the sole discretion of Evongo. Before returning any Products an RA number must be obtained from Evongo, this should be clearly affixed to the item.

6. RISK AND INSURANCE
a. The risk in the Products and all insurance responsibility for theft, damage or otherwise in respect of the Products will pass to the Customer immediately upon delivery of the Products to the premises nominated by the Customer.

7. LATE DELIVERY
a. Any period or date for delivery of Products or provision of Services stated by Evongo is intended as an estimate only and is not a contractual commitment.
b. Evongo will not be liable for any consequences of late delivery howsoever caused.
c. If, through circumstances beyond the control of Evongo, Evongo is unable to effect delivery or provision of Products or Services, then Evongo may cancel the Customer’s order (even if it has already been accepted) by notice in writing to the Customer.

8. WARRANTIES
a. Evongo warrants that all Services will be carried out with reasonable care and skill by personnel whose qualifications and experience will be appropriate for the tasks to which they are allocated.
b. Evongo warrants that all Products supplied to the Customer will be free from material defect for a period of 30 days from the date of delivery. This warranty shall be limited to the replacement of or repair of the faulty Products, or the issue of a credit note, or the granting of a refund or other such compensatory measures as Evongo at its discretion considers appropriate in the circumstances, and shall be conditional upon the Customer complying with the conditions of the manufactures warranty (where applicable). Such measures shall relate only to the actual faulty Products or their value.
c. Where possible Evongo will transfer to the Customer the benefit of any warranty or guarantee given to Evongo.
d. Except as expressly provided in these Terms and Conditions, no warranty, condition, undertaking or term, express or implied, statutory or otherwise is given or assumed by Evongo, and all such warranties, conditions, undertakings and terms are hereby excluded to the fullest extent permitted by law.

9. LIABILITY
a. Evongo does not exclude its liability to the Customer for direct damage to tangible property caused by the negligence of Evongo’s employees in connection with the performance of their duties or by defects in any Product supplied. Evongo’s total liability under this clause shall be limited to $2,500 for any one event or series of connected events.
b. Save in respect of claims for death or personal injury arising from Evongo’s negligence, in no event will Evongo be liable for any damages resulting from lost profits, loss of anticipated savings, nor for any damages that are an indirect or secondary consequence of any act or omission by Evongo, whether such damages were reasonably foreseeable or actually foreseen.
c. Except as provided above in the case of personal injury, death and damage to tangible property, Evongo’s maximum liability to the Customer for any cause whatsoever (whether in the form of the additional cost of remedial Services or otherwise) will be for direct costs and damages only and will be limited to the amount received by Evongo from the Customer in respect of the managed services in the previous 12 months.
d. The Customer is responsible for the safety of Evongo’s employees or of its subcontractors whilst on the Customer’s premises, and must comply with all relevant statutory requirements and maintain adequate insurance against the appropriate risks.
e. Evongo shall have no liability to the Customer for any loss of original data due to any error or omission by the Customer, or due to any event that takes place at the Customer’s Premises, unless such event is caused by Evongo’s negligence.
f. The Customer’s statutory rights as a consumer (if any) are not affected. All liability that is not expressly assumed in this agreement is hereby excluded to the fullest extent permitted by law. These limitations will apply regardless of the form of action, whether under statute, in contract or tort, including negligence, or any other form of action. Nothing in this Agreement shall exclude or limit liability for fraudulent misrepresentation.
g. The parties hereby acknowledge and agree that the limitations contained in this clause 9 are reasonable in light of all the circumstances.

10. CONFIDENTIALITY
a. Unless the relevant party has prior written consent of the other or unless required to do so by law, neither party will disclose or make any Confidential Information available to any other person, or use the same for its own benefit, other than as contemplated by these terms and conditions.
b. Each party’s obligations under this clause will survive termination of these terms.
c. The provisions of clauses 10.a and 10.b shall not apply to any information which:
i. is or becomes public knowledge other than by a breach of this clause;
ii. is received from a third party who lawfully acquired it and who is under no obligation restricting its disclosure;
iii. is in the possession of the receiving party without restriction in relation to disclosure before the date of receipt from the disclosing party; or
iv. is independently developed without access to the Confidential Information.

11. SOFTWARE
a. Evongo will not be responsible to the Customer or any third party for any breach of any software license in respect of software provided to Evongo by the Customer to be installed on a Customer’s computer.
b. All software (third party or line of business applications) require a vendor support agreement
c. The Customer hereby indemnifies Evongo against any loss, damage, costs, harm or other expense whatsoever arising either directly or indirectly as a result of Evongo installing software at the request of the Customer.
d. Where Evongo provides software to enable the Customer to use its Services, Evongo grants the Customer a non-exclusive, non-transferable licence to use the software solely in connection with those Services.
e. The Customer hereby agrees to comply with any terms and conditions reasonably required by the owner of the copyright in any software to protect the owner’s interest in that software.

12. PRIVACY POLICY
a. Evongo undertakes to comply with the provisions of the Data Protection Act 1998 and any related legislation insofar as the same relates to the provisions and obligations of this Agreement.
b. Evongo gathers and holds personal data about the Customer, including name, physical and email addresses, and telephone numbers.
c. Evongo does not hold credit card information.
d. The obligations set out in this clause 12 shall remain in force notwithstanding termination of this Agreement.
e. The Customer understands that in certain situations Evongo’s employees may be in a position to see the contents of the Customers files.
f. It is the Customer’s obligation to use encryption and personal security programs to increase the security and privacy of their files if any of their files are particularly private or are required under any professional or statutory regulations to be kept confidential.
g. All Evongo employees sign a client data confidentiality agreement, a copy of which is available on request.

13. MANAGED SERVICES CONDITIONS
a. Where Evongo agrees to support the Customer’s end users via a Managed Services plan:
i. the Managed Service will only be available for the Managed Equipment and number of users as set out in the Services Schedule.
ii. the Managed Services will cover up to 3 devices per user (1 x mobile phone, 1 x tablet, 1 x PC or laptop) devices must be used in the business by a named user in the Services Schedule
iii. Evongo may not cover all devices due to age or unreliability issues and advice given to upgrade or replace these
iv. Only business grade hardware is supported
v. Evongo may make a reasonable recommendation to implement software or hardware to improve security and/or reliability and this is not implemented in a timely fashion, liability for outages caused or remediation of issues may not be covered by Evongo Managed Services
vi. the Customer must give Evongo Administrator-level access to all Managed Equipment at all times and Evongo may refuse to give the Customer Administrator-level access to it.
vii. The Customer must allow Evongo remote access the Managed Equipment at all times.
viii. Evongo will monitor the Managed Equipment to give advance warning of and reduce the likelihood of any failure or breakdown. However the Customer agrees that the monitoring tools cannot detect all impending faults and may not always prevent hardware failure.
ix. The Managed Services does not include setting up, installing or moving hardware, software or Services.

14. TERMINATING A SERVICE
a. Either party may cancel any Service at any time by giving the other party 30 days prior written notice following expiry of the contract Term.
b. Upon termination of a Service the Customer will immediately return to Evongo all Products that the Customer does not own but has been licensed to use during the term of Service.
c. Upon termination of a Service Evongo will make available to the Customer all usernames and passwords once:
i. all Products licensed to the Customer to use during the term of service are returned to Evongo; and
ii. all monies owed to Evongo are paid in full.

15. EVONGO EMPLOYEES
a. The Customer acknowledges that Evongo has a substantial investment in it’s employees that provide service to the Customer and that such employees are subject to Evongo’s control and supervision. In consideration of this investment, the Customer agrees not to solicit, hire, employ, retain or contract with any Evongo employee, without first receiving Evongo’s written consent.
b. If any employee of Evongo Pty Ltd terminates or is terminated of employment with Evongo (regardless of the reason for termination) and is employed by the Customer (or any affiliate or subsidiary of the Customer) in any capacity either during or within a 6 month period, the Customer shall immediately pay Evongo Pty Ltd an amount equal to 50% of the then current yearly salary or wage paid by Evongo to such employee.

 


Privacy

SEO Friendly Title: Privacy

Evongo (https://www.evongo.com.au/) respects and is committed to protecting your privacy. We thus take extraordinary steps to handle any personal information collected on our website only in ways compatible with this Privacy Policy.

This website may collect certain information about your visit – such as the name of the internet service provider and the internet protocol (IP) address through which you access the internet, the date and time you access the site, the page(s) that you visit while on the site, and the internet address of the website from which you linked directly to our site.

Evongo is the sole owner of the information collected on this website. We do not (or will never) sell, share or rent this information to others in ways different from what is disclosed in our privacy statement below. This information is only used to administer our website, analyse trends and to generally help improve our site, and will never result in your receiving of spam e-mails.

Information gathered from visitors
In common with other websites, log files are stored on the Evongo web server – saving details such as the visitor’s IP address, browser type, referring page and time of visit. Cookies may be used to remember visitor preferences when interacting with the website. This information is not linked to a visitor’s personal identification in any way.

Information entered on our enquiry form – including, but not limited to, email addresses – will not be sold, rented or leased to third parties.

Where registration is required, the visitor’s email and a username may be stored on the server. Email addresses will not be sold, rented or leased to third parties.

Cookies
A cookie is a piece of data stored on the visitor’s hard drive containing information about the visitor. Cookies and tracking technologies are useful for gathering information, such as browser types and operating systems, tracking the number of visitors to a website and understanding how visitors use the websites they browse. This information can help customise a website for specific users. Evongo generally uses cookies for login convenience only.

Links
This Privacy Policy applies solely to Evongo. We are not necessarily aware of, nor are responsible for, differences in privacy statements of external websites linked to or from ours.

Changes to our policy
We may need to update this policy from time to time, in order to address new issues and reflect changes on our website. Please refer back to this policy regularly.

Continued use of the Evongo website signifies your acceptance of our Privacy Policy.


About: Industries we work with

SEO Friendly Title: IT support for Geelong industries

At Evongo, our IT support clients range from small local businesses with only a handful of staff to bigger organisations managing the needs of hundreds of people and numerous sites across the country.

We work with many different industries including manufacturing, construction, accommodation and food services, financial and insurance services, electrical services, retail, wholesale and trade, transport, education and training, not-for-profit organisations and many more.

Everything about our approach to supporting businesses is fine-tuned to ensure we deliver great results for our clients, no matter how big or small. Contact us to find out how we can tailor our business IT services to your specific needs. We can help you with managed IT servicescloud computing services, IT security servicesdata networking services and more.


About: Our Methodology

SEO Friendly Title: As Geelong IT providers, Evongo delivers great results

Through Evongo’s simple five-stage methodology, we can help you leverage technology to advance your business. We have developed a straightforward, well-defined set of processes that have achieved great results for our clients.

1.  Discover 

Evongo works closely with you to understand the way you currently do business and the outcomes you wish to achieve. Discovering how to unlock the potential for your business is our specialty. We help guide you through the possibilities and provide you with the most appropriate business IT services solution.

2.  Plan

Work smarter and more efficiently than ever before with an innovative solution developed by our experienced IT strategy planning professionals, specifically for your business. Our team only suggests complete and workable solutions that are practical and can integrate well with your existing technology.

3.  Implement

Experience seamless integration and minimal disruption to your business through our time-tested, comprehensive implementation services. The Evongo team has both the industry experience and qualifications to ensure each data networking project is delivered on time, within budget and to your satisfaction, every time.

4.  Train

Implementing new technology can be a welcome improvement to your business and your team, providing everyone knows how to use it. Evongo’s training services are fully flexible and can be customised to suit the individual requirements of your business and your people.

5.  Support

Businesses today rely heavily on their technology systems and therefore keeping them working is vital. Evongo’s IT support services can be tailored to suit your unique business needs. Our managed IT services provide a simple solution to managing your IT infrastructure and supporting your employees.


Services: Data Networking Services

SEO Friendly Title: Data networking services in Geelong

Connecting you to your network

The ability to exchange information quickly, easily and securely is a focal point for organisations of all sizes. The ever-increasing demand to access company information on the go, along with the sheer amount of data available and today’s resource-intensive applications, provides new challenges for business.

Delivering the right information to all the right people and devices at the right time is vital. Evongo’s data networking services provide new, more efficient ways for you to engage customers and keep your people connected.

Build a customised data networking solution for your business

We can design, deploy and maintain a customised data networking solution that will allow you to transfer your data safely and securely across multiple platforms and operating systems. Our mobile device management services ensure data networking protection without compromising flexibility.

As trusted IT providers, Evongo has strong relationships with a wide range of wholesale carriers and technology suppliers, allowing us to deliver the most appropriate IT support services and solutions for your business.

We also provide IT security services and business continuity services to ensure your data is safe, recoverable, and accessible at all times.


Services: IT Strategy Planning Services

SEO Friendly Title: IT strategy planning services, Geelong

Evongo’s IT strategy planning services help Geelong businesses align technology to business goals.

Do you have a plan?

Professional sports teams know that to win you need a game plan and this rule also applies in business. Whether you are looking to improve your productivity, increase your bottom line, gain more market share or whatever your goal may be, it is essential to have an IT strategy plan in place.

Get the results your business needs

A clearly defined technology strategy and roadmap from Evongo will provide you with the direction required to meet your key business objectives. Our team will work closely with you to develop a complete and workable IT strategy plan and then manage the implementation of your plans.

IT strategy planning from Evongo

Our IT strategy planning will:

Why do so many businesses trust our advice?

Experience – Our consultants have years of industry experience and can provide the guidance and IT strategies required to produce the outcomes your business needs.

Independence – We are technology agonistic so you can trust our advice to reflect your specific requirements, rather than being technology or vendor bias.

Practical – We focus on the best way to help you achieve your business goals rather than the best way to justify the latest technology.

Our experienced team will help you define a clear path for your future. We can create a roadmap to move your business to a cloud service, improve your data networking, introduce a reliable business continuity solution, or whatever your business goals may be. Contact us to find out more information about an IT strategy plan from Evongo.


Services: Mobile Device Management Services

SEO Friendly Title: Geelong mobile device management services

Evongo’s mobile device management services allow Geelong businesses flexibility while maintaining control.

Easily organise and secure all your mobile devices

How secure are the mobile devices connected to your business systems? What if they were lost or stolen? Can you guarantee people aren’t accessing your private company data?

Alleviate the complexity of controlling your mobile devices and keep your critical business data secure on both company and employee-owned mobile devices through our mobile device management services.

Features of our mobile device management services

Secure any device

Apply consistent data security policies across all IOS, Android and Windows mobile devices.

Secure email

Secure your business email, calendars and contacts on all mobile devices.

Secure apps

Implement a secure framework to distribute, protect and manage all applications company-wide.

Secure content

Access critical business content and collaborate securely across any network on any mobile device.

Secure BYOD

Protect both company data and employee privacy on all bring your own devices (BYOD).

Monitoring and asset management

Monitoring and reporting are essential requirements as businesses introduce mobile devices into the workplace.

What you will experience

Evongo’s mobile device management service provides a simple solution to managing all your mobile devices. Our professional IT support team can also provide a fully managed IT service to take care of all your business IT needs. If you are looking for IT support in Geelong please contact us to find out how we could help your business.


Services: Business Continuity Services

SEO Friendly Title: Geelong business continuity services

Effective business continuity planning has never been more important

How vulnerable are you? What if your business faced an unforeseen technical problem or human error led to the loss of critical data?

How quickly could your systems be recovered in the event of a natural disaster or a malicious attack?

Failing to prepare for such events could mean huge financial losses and major disruption to your business. That’s why it’s important to have a business continuity plan that can ensure quick and efficient recovery if something was to go wrong.

Safeguard your business with Evongo’s business continuity services

Businesses of all sizes rely so heavily on technology and stored data these days, therefore having a business continuity plan that can ensure quick and efficient recovery is crucial.

We can provide your company with a secure, automated and cost-effective cloud-based backup and disaster recovery service and then monitor and manage everything to ensure your data can easily be restored if something was to go wrong.

If you are looking for a Geelong IT provider with experience in business continuity services, the Evongo team are here to help. We have had over 15 years’ experience in business continuity planning and helping clients adequately protect their business from potentially disastrous events.

We can also help protect businesses from an unsolicited attack on your IT systems and data with our IT security services. If you are interested in learning more about how we can help protect your company or some of the other business IT services that we provide, please contact us.


Services: Hardware and Software

SEO Friendly Title: Hardware and software IT distributors in Geelong

Get the best price on the latest technology through our network of leading distributors and IT vendors

Benefit from Evongo’s strong vendor relationships with leading technology suppliers.

There are so many options with technology these days and choosing the right products for your business can be quite complex. Our experience in dealing with industry-leading manufacturers of both hardware and software allows us to provide you with informative and reliable advice on the technology and licensing models that would best fit your requirements.

As trusted IT providers in Geelong, we’ll help source the right products to meet your specific needs. Whether you’re looking for the right cloud computing solution for your business, want the best IT security service, or need help with getting the right data networking technology, our expert team can help. We also provide IT strategy planning services to ensure you align technology to your business goals.


Services: IT Security Services

SEO Friendly Title: IT security services Geelong

IT security is one of the biggest challenges facing businesses today

Regardless of size or industry, the likelihood of an unsolicited attack on an organisation’s IT systems and data has increased significantly. Not only are companies facing external attacks or intrusion from malicious sources, they are also being attacked internally by disgruntled or former employees. The risks include data breach, service disruption and identity fraud – which can all result in significant damage to a business.

Is your business at risk?

Evongo’s IT security services team can help you identify any vulnerabilities in your IT systems and environment by conducting a comprehensive security audit. The process involves actively testing the security of your web-based information systems, infrastructure and applications to expose any potential threats. We then provide you with a report on the vulnerabilities found and our recommendations.

Maximise network security and data integrity with tailored IT security services from Evongo

Our IT security specialists have implemented a wide range of solutions for our clients and as such have a wealth of expertise and experience with all the major security tools and technologies.

We can help secure your business with:

Access control – Enforcing security policies will enable you to control who or what can access your network so you can keep out potential attackers.

Data loss prevention – With the right data loss prevention technologies you can stop staff from uploading, forwarding or even printing your critical data.

Web security – Control your staff’s web use by blocking access to inappropriate and harmful websites while still allowing access to valuable content when required.

Email security – Email is the number one threat for a security breach so defending against spam, phishing and virus-laden emails is vital.

Mobile device securityMobile device management services let you control which devices can access your network and apply consistent data security policies to keep your network private.

Firewalls – A firewall will protect your business by using a set of defined rules to allow or block traffic from the internet to your internal network.

VPNs – A VPN encrypts your data so your remote workers can access your private company information without data being intercepted and read by anyone else.

Vulnerability assessments – Conducting a regular vulnerability assessment will identify any weakness in your network that might be a security threat.

Penetration testing – A penetration test mimics the actions of an actual attacker so we can evaluate the effectiveness of your security measures.

Please contact us for more information about our range of IT security services. Our security experts can also provide advice on secure cloud computing solutions or explain how we provide IT security via our managed IT services in Geelong.


Services: Cyber Security

SEO Friendly Title: Cyber security Geelong

Cybersecurity for small to medium businesses

At its fundamental simplest form, cybersecurity is protecting your local business network from attacks from the outside world. Sadly, in many cases, cyber security is only something many local Geelong business owners contemplate after they have been involved in a cybersecurity incident (when it is too late)

Myths about Cybersecurity

I’m too small for cyber attackers/hackers to worry about me

Small business owners often believe mistakenly that their business is too small and insignificant for global hackers to worry about them. This is so misguided and can only end in a bad situation. Phishing scams, Trojans from hacked websites or websites set up with malicious intent can all impact a business network. Cyber attackers are looking for any vulnerability they can find. If you have a weakness they will attempt to exploit this at your cost.

I will talk with an IT business after if it happens.

Sometimes we can work miracles and potentially recover information but this is a very rare scenario. Defence and preparation is a much better strategy than recovery.

Technology is my best defence against cyber attack

Technology is only part of the defence against cyber-attack.

People

Are all staff constantly on the lookout for malicious behaviour? Are they or have they been trained in best practice cyber security?  Technology is often the first line of defence but if a phishing email slips through or staff set up loose and simple passwords you could be inviting trouble into your business

Processes

Regardless of the size of your operation, does your business have online and offline backup policies and procedures, are these procedures tested regularly? Do you have staff procedures should an attack happen? What next, who do they/you call? How are staff alerted to internal issues/hacks?

Technology

Cyber Security is so much more than simply installing virus protection on your laptop. As a business owner, you are tasked with a myriad of jobs that you must oversee and it’s easy to understand how some are overlooked. Payroll, Superannuation, BAS lodgement, tax returns, One-touch payroll and the list goes on. As a business owner cyber Security is easy to let it slide because it’s not something to worry about. Sadly it is and it is something many business owners realise too late.

A good cybersecurity system puts a solid defence in place and then also provides a quick recovery to ensure business continuity with minimal interruption to your business. We can work with any size business to ensure we have all the core areas of cybersecurity covered.

Call us now to discuss how we can help provide cyber security to your business. We pride ourselves on being Geelong’s business cybersecurity experts


Services: Remote Access – Working from home

SEO Friendly Title: Remote Access Geelong, Bellarine and Surfcoast

Geelong, Bellarine and Surf coast businesses have been scrambling to set up remote access from home for many employees and the scramble continues. Many employees live on the Surfcoast and Bellarine Penisula including locations such as Torquay, Anglesea, Lorne, Queenscliff and Ocean Grove. The location itself has very little bearing on setting up home remote access, what is important is hardware and internet connectivity (broadband access).

Home Hardware

COVID-19 has created unprecedented demand in a short time frame for remote home access so most of our workforce can remain home in isolation. The good news for employers is that you can simply plug into existing personal computer hardware your employees have at home. Laptops, desktops or Macs, they can all be utilised to access work-related files and emails.

If you need to purchase new hardware this can be done at base levels to avoid excessive costs and you do not have to be an existing client of Evongo nor do you have to have an advanced IT set up. The entire job can often be performed remotely, without any of our team members ever having to visit your staff members’ homes.

What do your staff need to access?

Most businesses we deal with the staff require access to:

We can limit the access your staff have so they only see the files you want them to see. It’s important to protect your business’s confidential information. Staff can be restricted at a variety of levels when using remote access to work files and servers. SO they only get the information that is relevant to them.

Emails are essential and often it is a good opportunity to review your current email arrangements to see if they can be set up more efficiently to best suit your company requirements.

After your home remote access has been set up and established we can actively protect and support these devices on an ongoing basis. We can ensure the connection is secure and that the devices your staff are using are actively protected.

Internet Access

Internet access will always play a key role in ensuring a seamless workflow when working remotely. We can asses and or make recommendations, particularly if staff members have unreliable internet access at home.

Evongo is a leading provider of work from access in the Geelong region if you would like to learn more please contact us now.


Services: Cloud Services

SEO Friendly Title: Cloud services for Geelong businesses

Move to cloud computing with confidence

You want to ensure you only subscribe to cloud services that are cost effective, secure and that will work for your business in terms of functionality. That’s where we can help. Evongo’s Geelong-based cloud computing specialists have the industry experience and expertise to help you identify the right solution for your business.

We take a strategic approach to moving businesses to the cloud

Evongo’s cloud services team makes moving to cloud computing a smart and cost-effective choice for Geelong business, by:

Benefits of cloud computing

Experience always-on availability – most cloud service providers are extremely reliable and maintain 99.99 percent uptime.

Gain greater agility – with access to everything you need, when and wherever you need it.

Lower your risks – with your data and applications backed up in a secure offsite location.

Improve collaboration – with the ability to communicate and share information from anywhere in the world.

Less maintenance to worry about – with upgrades and support being managed for you.

Only pay for what you use – with a pay-as-you-go model, allowing you to easily scale up or down as your company’s needs change.

The Evongo team can help you successfully migrate to the latest cloud technology. We also provide IT strategy planning services to ensure you align the right technology solutions to your business goals. Please contact us to find out more about cloud computing, business IT support, data networking, or any other business IT services that you may be interested in.


Services: Managed IT Services

SEO Friendly Title: Geelong, the Surf Coast and Ballarat managed IT services

We make IT management in Geelong easy – a simple solution for a complex world

As leading IT providers in Geelong the Surf Coast and Ballarat, Evongo understands that when it comes to technology you just want it to work. You don’t want to have to worry about whether your data is being backed up properly or whether your network is secure. You also don’t want to be hassled by your employees who can’t work due to technical issues.

Evongo’s managed IT services plans are designed specifically to take the stress away by proving a simple, cost-effective solution to managing your IT infrastructure and supporting your employees.

Managed IT service features

Help desk and remote support

Evongo’s friendly help desk team provides telephone and remote support services to our managed IT services clients from our head office in Geelong.

​Our team members are all passionate about keeping you working efficiently. That’s why we have gone to great lengths to ensure we have the right people, tools and processes in place to deliver exceptional support services.

Onsite support

Sometimes issues are beyond the scope of remote support, especially problems with computer hardware. If this is the case Evongo’s onsite support team is always ready and available to help.

Our skilled technicians have a proven track record of resolving problems quickly and efficiently and are always aiming to minimise the disruption to your business.

Monitoring and maintenance

Evongo’s remote monitoring and management platform allows us to proactively monitor the health and performance of your IT infrastructure. This system allows for early detection and remediation of issues before they become a problem.

In addition to proactive monitoring, our technicians conduct regular maintenance to ensure all your servers, workstations, mobile devices and networking equipment are functioning at peak performance.

Security

Protecting your business from both internal and external threats is something we take very seriously. Evongo’s systematic approach to managing the security of your network is designed to reduce your exposure to security threats.

Our expert IT security services team provides all the comprehensive security measures you need to stay safe including monitoring, managing and routinely testing your security devices and systems to ensure your environment is well protected.

Backup and disaster recovery management

Businesses today are so reliant on technology to conduct business, therefore having the right business IT support, backup and disaster recovery measures in place is critical to protecting your organisation.

Evongo’s strict backup and disaster recovery management process, along with the use of market-leading technologies, will provide you with effective data protection and ensure business continuity no matter what type of disaster comes your way.

Technology steering meetings

Gain access to Evongo’s wealth of experience and expertise and get the results you’re looking for. We will work closely with you to help address your challenges, meet your goals and identify ways you can leverage technology to advance your business.

This service includes short-term and long-term planning and budgeting, quarterly reviews and ongoing consulting and guidance to help you get maximum value out of your investment in information technology.

What you will experience

Why do our managed IT services get such great results for our clients?

It all comes down to our structure and process. We believe we have the best people employed and we use the best technology and platforms available to the industry, but all that would mean nothing without having the right structure and processes in place to ensure nothing gets missed.

We have more than 20 years’ experience providing managed IT services to businesses and we know what it takes to keep our clients happy and their technology working smoothly.

Please contact us for more information about managed IT services for your business. We also provide mobile device management servicescloud computing services, data networking services and much more.


Services: IT Support

SEO Friendly Title: IT Support Geelong

Having a reliable Geelong IT support team is one of the biggest strengths a business can have today. Technology is essential to everyday operations and when systems fail, it is crucial to have experienced professionals equipped to help.

Our highly trained Evongo team is the preferred choice for Geelong business owners. We pride ourselves on our unmatched customer service and advanced expertise, putting to practice more than 15 years of industry experience.

Rather than providing a reactive service, where we show up to fix something that is broken, we keep our finger on the pulse working to maintain nothing goes wrong in the first place, minimising the disruption to your business and ensuring the smooth run of your IT services.

Whether you are a small digital agency, a large retail store, or an established construction company, we are prepared to provide competitive and tailored IT support that you will struggle to find elsewhere.

Evongo offer affordable and flexible options for your business, and provide you with timely effective services when you need them most.  Our support services can assist you with issues, big or small, remote or onsite, including:

Contact us today on 03 5228 3000 for a free no-obligation consultation today and experience the best IT support Geelong has to offer.


Posts

Don’t sleep on this simple, effective security booster

Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure, a cloud computing platform, this is something you should pay attention to. Because MFA is one of the simplest and most effective ways to protect your digital assets.

What is multi-factor authentication? Think of it like adding an extra security measure to the door of your business.

Normally, you log into your accounts with just a password. But passwords aren’t as safe as they used to be; cyber criminals are good at cracking them. MFA adds another layer of security. It’s like saying, “OK, you have the key, but I’m going to need to see some ID too.”

After entering your password, you’re asked to verify your identity a second time. This could be a code sent to your phone, a fingerprint scan, or a quick tap on an app like Microsoft Authenticator. It’s an extra step, but an important one. Even if someone manages to steal your password, they’d still need this second form of verification to get into your account. That’s a massive roadblock.

Yes, adding another step to your sign-in process might sound like a hassle. But the reality is, it’s a small inconvenience that can save you a lot of trouble down the road. Imagine the fallout if someone gained access to your sensitive business information. The cost of a breach, in terms of both money and reputation, is much higher than the few extra seconds it takes to use MFA.

There are a few different ways to set up MFA. Some people prefer getting a one-time passcode via text message, while others like the convenience of a push notification on their phone. Biometric options, like fingerprints or facial recognition, are also becoming more common. And for those who want something extra secure, there are physical security keys that plug into your computer.

Microsoft’s push for MFA with Azure is just the tip of the iceberg. The truth is this kind of security measure is a business security basic.

Need help setting this up and making it easy for your business? It’s what we do. Get in touch.


Lost for words? Draft with Copilot can help

An exciting new feature is coming to Microsoft’s Edge browser that’s going to make your life—and your employees’ lives—a whole lot easier. ‘Draft with Copilot’ is an AI-powered tool that can instantly write text on any topic you need.

Imagine you’re in Edge, staring at an empty text field (like the body of an email or a comment box). Just right-click, and you’ll see an option to ‘Draft with Copilot.’

Click on it, and a window will pop up. Enter the subject or topic you need text for, hit ‘Generate,’ and watch Copilot do its thing. In a few moments, you’ll have a piece of text on the topic you specified.

You can then change the tone and length of the generated text to suit your style. Want it to be more formal or casual? Need it longer or shorter? No problem.

We all know time is money, and ‘Draft with Copilot’ can help save you both. Imagine how much time your team in Geelong spends on writing everyday text. With Copilot, drafting a quick email or coming up with a social media update becomes easier.

And Copilot not only helps you write faster but also ensures the text is grammatically correct and well-structured. This is especially helpful if you’re writing in a language that’s not your native one.

Right now, this feature is only available in US English, but Microsoft is working on expanding it to more languages.

One warning: It’s important to review what it produces. Critics of AI-generated text sometimes say it can feel a bit generic. You might want to add a personal touch or specific details to make it more engaging for your audience.

This feature is currently in the Edge Canary preview build, which means it’s still being fine-tuned.

Microsoft is steadily integrating Copilot into more Windows apps, making these AI tools more accessible and versatile across different platforms. It’s clear that the future holds even more convenient AI-assisted features that will make our digital lives easier.

Not tried Copilot in your business in Geelong yet? We can help you get started. Get in touch.


Microsoft takes the pain out of updates

If you’re like most people, you probably find system updates a hassle. They take ages and those big downloads eat up precious bandwidth and storage.

Good news then: Microsoft is about to make your life a whole lot easier with the upcoming Windows 11 24H2 update.

It’s introducing something called ‘checkpoint cumulative updates.’ That might sound a bit technical, but don’t worry – it’s simple and very beneficial.

Normally, Windows gets its updates every month. These are known as cumulative updates, which bundle all the latest fixes and enhancements together. These bundles can be large and take a while to download and install.

The new checkpoint cumulative updates change this process. Instead of downloading a big update every time, your system will now receive smaller updates more frequently. These are tweaks to the last major update or checkpoint.

So, what does this mean for your business? It’s great news… you’ll spend less time waiting for updates to finish so you can get back to work.

And, if you have a limited internet connection, smaller updates are a blessing. They use less bandwidth, so less chance of interrupting someone else’s video call.

The best part? All of this happens automatically through Windows Update. You don’t need to do anything differently. Your system will keep running smoothly, with most updates happening in the background. This seamless experience ensures that your work is not interrupted.

This isn’t the first time Microsoft has streamlined updates. When Windows 11 was first launched, Microsoft used new compression technology to reduce the size of updates by 40%. With the 24H2 update, they’re taking it a step further to ensure that your experience is even more efficient.

It’s also worth noting that while this new update system will be standard for Windows 11 and the upcoming Windows Server 2025, it’s less likely to be implemented for Windows 10, as that version is nearing its end of life. This means there’s even more incentive to upgrade your business to Windows 11 if you haven’t already.

Want to migrate to Windows 11 with zero hassle? We’re the people to talk to.


Heads up: You need to update Windows 11 by this deadline

 

Microsoft has issued an important update: If you’re using Windows 11, you need to upgrade to version 23H2 before 8th October 2024. After this, older versions will no longer receive essential security updates, putting your systems at risk.

Why is this important?

Because Microsoft will stop supporting older Windows 11 versions for business accounts. This includes stopping security updates, which are vital for protecting your systems against the latest cyber threats.

The latest version includes advanced security features to protect against new threats, making sure your business data remains safe. But updating to Windows 11 version 23H2 brings other benefits beyond security.

You’ll also notice performance improvements, making your systems run faster and more efficiently, which is great for productivity. Plus, new tools and features are continually added, helping streamline your workflows and improve overall efficiency. Staying updated ensures compatibility with new software and technologies, maintaining smooth business operations.

Delaying the update could leave your business vulnerable to cyber-attacks. Without security updates, your systems will be exposed to potential exploits, risking data breaches and financial loss.

Microsoft typically enforces updates post-deadline to keep people safe, especially for business devices not managed by IT departments. While this is helpful, it’s better to update proactively on your own schedule.

Updating to version 23H2 is straightforward.

Making sure your systems are up to date will keep your business secure and running efficiently. Don’t wait until the last minute… upgrade to Windows 11 version 23H2 now.

Keeping businesses protected and productive is our top priority. So, if you need any help with that, get in touch.

 


Cyber extortion: What is it and what’s the risk to your business?

Cyber extortion is a growing concern that’s been dominating the news cycle and causing widespread anxiety. It’s a critical issue that should be on your radar, as it could potentially impact your business.

Cyber Extortion Defined

Cyber extortion occurs when hackers threaten to damage your business by attacking its digital assets and data unless a ransom is paid. These threats often involve ransomware, which is malicious software that encrypts your data and holds it hostage until the ransom is paid.

In some cases, cybercriminals escalate their threats by stealing data and threatening to release it on dark web leak sites, a tactic known as double extortion.

The Alarming Statistics

A recent 2024 report indicates a 77% surge in cyber extortion victims over the last year. Small businesses are particularly vulnerable, being four times more likely to be targeted than larger enterprises. This trend is concerning, given that smaller businesses typically have less robust defenses.

In just the first quarter of this year, 1,046 businesses reported falling victim to double extortion. However, the actual number is likely much higher due to underreporting, contributing to what experts refer to as the “dark number.”

Who’s at Risk?

No business is immune; all sectors and sizes are potential targets. Yet, certain industries face more frequent attacks, including manufacturing, professional, scientific, technical services, and wholesale trade. Notably, the healthcare and social assistance sectors are also experiencing a rise in attacks, despite the grave societal and political consequences.

Cybercriminals are both opportunistic and strategic, often targeting regions with robust economic growth and common languages. For example, data breaches were 50% more common in Australia than the global average. 94,000 reports of cybercrime were submitted. The cost of cybercrime to businesses increased by 14% compared to the previous year, with small businesses experiencing an average of $46,000, medium businesses $97,200 and large businesses $71,600.

Protective Measures for Your Business

Despite the worrying trends, there are proactive measures you can take to safeguard your business:

Understanding cyber extortion and its mechanisms is the first step in preparing your business to counteract these threats. Being proactive is key.

For assistance in fortifying your business against cyber extortion, feel free to reach out. We’re here to help ensure your business remains secure.


All your data’s gone. What now?

You log on to your computer and find… nothing. No customer data, no project files, no financial information. It’s all gone.

 

That’s a terrifying thought for any business, and it’s more common than you’d believe.

 

To stop a situation like this destroying your business, you need a reliable safety net. Our latest video explains how to protect your data with backups.

 


Data loss? Save yourself a mighty headache

What would you do if all your business data just… disappeared?

 

Maybe panic. Maybe stare at the screen in disbelief.

 

But if you’re wise, you’ll have a safety net in place, in the form of reliable and tested data backup. Which would mean you can restore your data quickly, without too much disruption.

 

If you’re not… well, you’ve got one mighty headache on your hands.

 

Our latest guide explains everything you need to know about data backup, including how to make sure it’s working as it should be.

 

Download your free copy now.


Slow PCs? Manage which applications launch at startup

Is your PC frustratingly slooooooooow? It might be because too many applications are starting up when you hit the power button. Windows 11 has a new solution to tell you when new apps are added to your startup list. This is also a sensible security measure. Our latest tech update has the details.

Staying on top of how your technology is set up is crucial for maintaining a reliable network. And one often-overlooked aspect is managing which applications start up when your business’s PCs start up.

 

With lots of software wanting to auto-start, it can slow down your system and potentially introduce security risks. But did you know that Windows 11 offers a useful feature that alerts you whenever new apps are added to the startup list?

 

Every time you hit the power button on your PC, it loads a set of apps automatically. While some of these are essential, others might not be, and can slow down your system’s performance. Over time, as you install more software, your startup list can grow, leading to longer startup times and a slow experience.

 

Not only that but keeping an eye on startup apps is good security practice. Unwanted or unknown apps starting automatically can be a red flag for malicious software (malware) or other security threats. By receiving alerts about new startup apps, you can quickly identify and investigate any suspicious additions, making sure that your systems stay secure.

 

How do you enable these alerts in Windows 11? It’s a simple process:

 

 

 

 

From then on, you’ll receive a notification whenever a new application is added to the startup process. You can even customise what this notification looks like by clicking on the arrow next to the slider button, allowing you to adjust its appearance and sound to suit your preferences.

 

Turning on these alerts brings several benefits to your business. First, it helps keep your PCs running efficiently. By staying informed about new startup apps, you can quickly disable any unnecessary software that might be slowing down your system. This means faster start times and better overall performance, allowing your team to get to work without delays.

 

Secondly, it enhances security. Receiving alerts for new startup apps means you can immediately investigate any unknown or suspicious additions. This proactive approach helps prevent potential security threats from taking hold, safeguarding your business data and systems.

 

Lastly, it’s a great way to keep track of what’s installed on your machines. With various team members possibly installing different software, these alerts give you a clear overview of what’s being added to the startup list, making sure that only approved applications are running.

 

To further manage startup apps, you can use Task Manager. Press ‘Ctrl + Shift + Esc’ to open Task Manager, then select the ‘Startup’ tab. Here, you’ll see a list of all the apps that start with Windows, along with their impact on boot time. You can enable or disable apps by selecting them and clicking the appropriate button at the top right.

 

By regularly checking this list and using the new alert feature, you can keep your startup process streamlined and your system secure.

 

A better answer is getting someone to set all of this up and manage it for you. We specialise in making technology easy for businesses. If we can help, get in touch.


The CrowdStrike outage explained for Geelong business owners and managers

 

Download our free guide which summarises everything you need to know about the recent CrowdStrike outage.

This is written specifically for business owners round here. Inside you’ll discover:

Download Now


Understanding the CrowdStrike Outage: A Guide for Business Owners and Managers in Geelong

On Friday, July 19, 2024, a routine software update from CrowdStrike, a leading cybersecurity company, caused a major issue affecting an estimated 8.5 million Windows computers.

This incident led to significant disruptions in many sectors, including airports, supermarkets, and media.

Here, we explain what CrowdStrike is, what went wrong with the update, how it impacted businesses, and how to protect your business.

What is CrowdStrike?
CrowdStrike, founded in 2011 and based in the United States, is a leading cybersecurity company. They act as digital bodyguards for businesses and large organizations, protecting them from cyber threats like ransomware, malware, and other online attacks.

Trusted by over 500 companies from the Fortune 1000 list, CrowdStrike has a solid reputation for quickly responding to cyber threats and has been involved in investigating major cyber incidents. Their main product is the Falcon sensor program, a cloud-based security system designed to detect and stop cyber threats in real time.

What is Falcon Sensor?
Think of your computer as a house. Regular antivirus software is like a security system that looks for specific types of bad guys (like burglars) it recognizes from before. If it sees any of these known bad guys, it stops them from getting in.

Falcon sensor is more advanced, known as an EDR (Endpoint Detection and Response). It’s like having a smart security guard for your house. This guard not only looks for the bad guys that the antivirus knows but also keeps an eye out for any strange or suspicious activity. The guard can investigate unfamiliar situations and take action to protect your house, even if the threat is something new.

While an antivirus is good at stopping known threats, an EDR is much better at handling new and unexpected threats to keep your computer safe. The trade-off is that EDR requires a deeper level of access and rapid updates to stay on top of quickly changing threats. Unlike other software updates, these can’t be rolled out in stages.

What Happened?

On July 19, a routine software update from CrowdStrike caused major disruption for many businesses around the world.

Early that morning, CrowdStrike released an update to their Falcon sensor program. This update was intended to improve security by targeting specific tools used in cyber attacks. However, the update contained a coding mistake, known as a “logic error.”

This mistake caused Windows computers running Falcon sensor to crash, leading to the infamous “Blue Screen of Death” (BSOD).

The impact was immediate and widespread.

Many businesses found their Windows computers unusable, resulting in significant disruption. Airports experienced chaos as their systems failed, supermarket checkouts malfunctioned, and journalists faced difficulties reporting on the issue due to their equipment crashing.

The problem affected millions of devices globally. People reported that their computers went into a reboot loop, making them impossible to use.

CrowdStrike responded quickly. Within an hour of identifying the issue, they began working on a fix. By 5:27 am UTC, they released an update to correct the faulty configuration files.

However, the recovery process varied. For many, the issue could be resolved remotely by deleting the problematic file if the system was online. For those with offline systems, manual deletion of the file was necessary, often requiring help from IT support.

What Was the Impact on Businesses?

The CrowdStrike outage had a huge impact on businesses across many sectors.

Overall, the CrowdStrike outage demonstrated how critical reliable cybersecurity tools are for business continuity. It highlighted how interconnected modern business operations are and the widespread impact that a single software issue can have.

Businesses are now likely to review their contingency plans and IT support readiness to better handle similar incidents in the future.

How We Can Help Your Business

Many businesses are now reviewing their disaster recovery plans and business continuity software. They want to be sure they have clear procedures to help mitigate the impact of future disruptions.

At Evongo IT, we help dozens of businesses in Geelong stay safe from cyber threats while helping their teams stay productive through great IT planning and support.

Ask us to review your current operations or plan a strategy to make sure your business is protected.


PING, WHOOSH, or BEEP? Now you can decide with Teams

Have you ever winced at the sound of a Microsoft Teams notification breaking your concentration? You’re not alone. But here’s some news that might be music to your ears: Microsoft has just rolled out an update that promises to make these interruptions much more manageable. With the latest update, you can now customize your notification sounds on Teams, making it easier to stay focused and prioritize your work.

Instead of the generic “ping” that jolts you out of your workflow, you can opt for a more soothing chime or even a subtle whoosh. This might seem like a small change, but it can have a big impact on how you manage your day. Differentiating between urgent alerts and less critical messages through sound can help you prioritize effectively and reduce unnecessary distractions.

For business owners, this update is more than just a new feature – it’s a tool to enhance productivity and team efficiency. By allowing your team to customize their notification sounds, you enable them to tailor their work environment to their personal needs. For instance, urgent messages from key contacts can be assigned a distinct sound that grabs attention immediately, while routine notifications can have a softer, less intrusive tone.

This kind of prioritization is essential in a busy work environment where managing time and focus is vital. It can help prevent important messages from getting lost in the noise of everyday communications and ensure that team members can respond promptly to pressing issues without being constantly disrupted.

The business benefits of this update are clear. It helps create a more focused and efficient work environment. When employees aren’t constantly interrupted by generic notification sounds, they can maintain their concentration for longer periods, leading to higher productivity levels.

Additionally, by enabling the muting of notifications during meetings or focused work sessions, the update ensures that important discussions and deep work sessions go uninterrupted. This feature is particularly handy in today’s hybrid work environment, where distractions can come from multiple channels.

While customizable notification sounds are a standout feature, Microsoft Teams offers a huge range of other benefits that make it an invaluable tool for business. It integrates smoothly with other 365 applications, providing a unified platform for all your business needs. Whether it’s collaborating on documents, scheduling meetings, or managing projects, Teams brings everything together in one place. Teams has a robust set of tools that make teamwork easier and more efficient.

If you’re not already using Teams, now is the perfect time to start. Give it a try and see how it can help you streamline your workflows and communication.

We can help you customize Microsoft Teams to be perfect for your business. Get in touch today!


Windows 10 is reaching end of life: Your options

Windows 10 end of life guide


Could that Chrome extension be loaded with malware?

If you’re a Google Chrome user in your business, you’re likely acquainted with extensions. These handy tools can enrich your browsing experience in numerous ways, from blocking pesky ads to minimizing distractions.

Extensions are highly sought after due to the vast functionality they can bring to your browser. However, similar to the caution needed when downloading new apps on your phone, you should also exercise care when incorporating new extensions to your browser, as they carry a malware risk.

Malware, short for malicious software, refers to any software deliberately engineered to inflict damage to a computer, server, or network. Cybercriminals utilize malware to pilfer data, seize systems, and even drain your bank accounts.

Google Chrome commands approximately 65% of the global browser market share, making it the most widely used browser. This popularity renders Chrome a prime bullseye for cybercriminals. While some cyberattacks exploit flaws in the browser itself, a simpler method to target Chrome users exists: via malicious extensions laden with malware.

Despite Google’s vigilant monitoring of its Chrome Web Store, the threat persists. A recent study alleges that 280 million individuals installed a malware-ridden Chrome extension between July 2020 and February 2023. This staggering figure underscores the importance of vigilance.

Shockingly, many harmful extensions remained downloadable on the Chrome Web Store for an extended period. On average, extensions laden with malware were available for 380 days, while those with vulnerable code were accessible for roughly 1,248 days. One particularly infamous extension was available for download for 8.5 years before its removal.

So, how can you safeguard yourself and your business from these harmful extensions? We recommend the following five steps:

  1. External reviews: Given that ratings and reviews on the Chrome Web Store may not always be reliable (as many harmful extensions lack reviews), seek external reviews from reputable tech sites to determine an extension’s safety.
  2. Permissions: Exercise caution if an extension requests more permissions than necessary. If a new extension seeks extensive access to your data or system, this could be a warning sign.
  3. Security software: Employ robust software to detect malware before it can inflict any damage. This serves as your final line of defense if you inadvertently install a harmful extension.
  4. Necessity: Prior to installing any new software or browser extensions, ponder whether you truly need it. Often, you can attain the same functionality by visiting a website.
  5. Trusted sources: Only download extensions from trusted sources or renowned software providers. This significantly diminishes the risk of downloading a detrimental extension.

Given that Chrome is the most widely used browser, it will invariably be a target for cybercriminals. Google’s security team diligently reviews every Chrome extension to ensure their safety, but vigilance remains paramount.

If you’re uncertain about the safety of your extensions, or if you desire more guidance on securing your business, our team is ready to assist. Please reach out to us.


Windows 10 is reaching end of life – Here are your options

As business owners and managers, we often face unexpected changes less frequently than our staff. This is because we are the ones who decide what changes will happen and when they will take effect. Having that control is one of the perks of being in charge, right?

However, a significant change is on the horizon that you can’t avoid, although you do have some options to manage it.

Microsoft is bidding farewell to Windows 10, as it is officially reaching the end of its life.

If your business still uses Windows 10 machines, it’s crucial to be aware of this and decide on your next steps. The deadline is still some time away, but making decisions now can reduce costs and minimize potential disruptions.

In this guide, we will explore what this means, the implications for your business, and outline your options moving forward.

The End of the Road

First things first: What does it mean when we say that Windows 10 is reaching its end of life?

There are support and security implications.

Microsoft follows a lifecycle policy for its operating systems, which dictates the lifespan of each version from launch to retirement. For Windows 10, this journey is nearing its end. After a decade of service, on October 14, 2025, Windows 10 will reach its end of life.

When this happens, the operating system will still function but will be vulnerable without its regular updates.

Without being overly dramatic, it becomes a ticking time bomb. We’ll explain why shortly.

As Windows 10 reaches the end of its road, you have a choice to make – and four options to consider.

Option #1: Pretend It’s Not Happening

This is the “do-nothing” approach. It’s tempting to stick with what you know, even if it’s past its expiration date.

But here’s the thing: When Microsoft says they’re ending support for Windows 10, they mean it.

What does it mean when an operating system like Windows 10 becomes unsupported?

It’s not just about missing out on new features. The main issue is security. Without regular updates, your operating system becomes a target for cyber criminals who will exploit unpatched vulnerabilities.

For any business, this is unacceptable. Think of all the sensitive data on your computers: customer information, financial data, trade secrets.

Unsupported software is like leaving your front door wide open with a sign that says, “Come on in.”

And let’s not even start on the fallout from a breach. It’s not just about the immediate headache and expense of cleaning up. It’s the long-term damage to your reputation and the trust you’ve built over years.

Let’s explore some better alternatives…

Option #2: Upgrade to Windows 11

The obvious choice is to upgrade to Windows 11. If you’ve been considering it, now is the perfect time. Once you experience what Windows 11 offers, you’ll wonder why you didn’t upgrade sooner.

First, be aware of the system requirements. Windows 11 has its own specs, so ensure your devices are compatible. A compatibility checker can help, or we can assist you.

If your device meets the criteria, you’re good to go. If not, we’ll address that in the next section.

Windows 11 is a productivity-boosting, time-saving, organizational wonder with many new features and improvements. From the revamped Start menu to the improved taskbar and redesigned Microsoft Store, everything is designed to make your life easier.

There are Snap Layouts and Snap Groups to help you arrange your windows for maximum productivity.

Widgets provide a customized dashboard for staying updated with news, weather, and your favorite apps.

And we can’t forget Copilot, the AI-powered assistant that helps with everything from scheduling meetings to finding the perfect GIF for your presentation. It can even summarize your Teams meetings and highlight key points.

Not to mention the extra security, smoother functionality, and overall intuitiveness of Windows 11.

Moving to Windows 11 might seem daunting, but the rewards are worth the effort. With some planning, you can transition with minimal disruption.

Option #3: Invest in New Devices

What if your current devices aren’t compatible with Windows 11?

It’s a challenge, but there’s a solution. Embracing change can unlock new opportunities.

Investing in new devices might seem expensive, but it’s an investment in your business’s future. If you haven’t upgraded your devices in a while, it’s something you’ll need to do eventually. New devices offer improved performance and better security features.

You’re not just buying new hardware; you’re buying peace of mind.

Yes, switching to new devices might cause some disruption. But with careful planning and expert guidance, you can minimize the impact and ensure a smooth transition for your team.

If you’re unsure what you need or what to expect, let’s discuss the costs and see if any of your current devices can be salvaged or repurposed.

Option #4: Pay for Security Updates (and Extend Windows 10)

If you decide to stick with Windows 10 for a bit longer, you can do so safely.

Microsoft will still develop security updates for Windows 10, but they won’t be free. This is the Extended Security Updates (ESUs) program, a lifeline for businesses not ready to say goodbye to Windows 10.

The cost of an ESU subscription starts at $61 per device for the first year, doubling each subsequent year. The total cost over three years can be significant.

If you’re willing to pay for security, it’s the right thing to do. But remember, there are other options, and you might find that Windows 11 offers more benefits.

Let’s Talk

If you’re unsure which option is right for your business, we can help. We assist businesses with these decisions every day.

We can discuss how your business operates, provide tailored recommendations, and support you in implementing your chosen option with minimal disruption.

Get in touch.


We are saying goodbye to Windows 10

Windows 10 will reach its end of life next year, which means no more updates for new features or crucial security improvements.

If your business is still using Windows 10, it’s essential to start planning now. You have four options to consider.

Watch the video below to learn more about each option and what you’ll need to prepare.

 

 


Why you’re better in a contract with your IT company

Imagine you’re driving down a winding road in the middle of nowhere. Suddenly, your car breaks down. You’re stuck, miles from assistance. You feel helpless. Frantically searching for a solution.

 

This scenario isn’t too different from the world of IT support when you rely on what’s known as a break/fix relationship with your provider (when your IT is broken, they fix it. And that’s it; there’s no proactive work).

 

But what if there was a way to ensure a smoother journey?

 

That’s where the magic of having a contract with your IT support provider comes in. Think of it as having a trusted mechanic who not only fixes your car but actually prevents breakdowns in the first place.

 

Whether you run a bustling corporation or a small start-up, entering into a contract with your IT support provider is the smart, cost-effective way to ensure a smoother tech journey.

 

 

The break/fix conundrum

 

When your computers crash, your network goes haywire, or your software refuses to cooperate, it’s not just a minor inconvenience – it’s a potential storm on the horizon that could disrupt everything you do.

 

For many business owners, the traditional “break/fix” model has been their long-term go-to solution. This approach involves calling in IT support only when something goes wrong – when you’re already in trouble.

 

While the break/fix approach may have served its purpose in the past, tech needs have grown more complex. We’re facing more cyber threats, software vulnerabilities, and rapidly evolving technologies than ever before. Relying on a 100% reactive strategy can leave you vulnerable to costly downtime, data breaches, and customer dissatisfaction.

 

Let’s take a closer look at the pitfalls of the break/fix approach.

 

Downtime

When a critical IT issue arises, you’re forced to wait for help to kick in, often leading to significant downtime. Every minute your systems are down, your business is losing money and potentially damaging its reputation.

 

Unpredictable costs

Break/fix support comes with unpredictable costs. You can’t anticipate when problems will occur or how much they’ll cost to fix. This unpredictability can wreak havoc on your budget.

 

Data loss

Data loss is a nightmare for any business. Relying on break/fix means you’re at risk of losing valuable data if a problem escalates before anyone can start helping.

 

No familiarity

In this model, your IT support provider is like a distant relative you only hear from when things go south. They may not fully understand your business needs and goals or even be up to date on your current setup, which can really hold back effective problem-solving.

 

Security vulnerabilities

Cyber threats are constantly evolving. Relying on a reactive approach may leave your systems vulnerable to attacks, as you may not get timely security updates or patches.

 

 

A contracted partnership

 

Now, imagine a different scenario: one where your IT support partner is more than just a trouble shooter. They are your trusted ally, always vigilant and prepared for the storm before it hits. This is the essence of contracted IT support, and it’s achieved through a structured agreement that allows a close, ongoing relationship with your IT partner.

 

In a contracted IT support model, your IT support partner isn’t just waiting for problems to surface; they are actively monitoring your IT infrastructure, looking for the first signs of trouble.

 

Here’s how this contracted approach works in your favour.

 

Early problem detection

With a contract in place, your IT support partner actively monitors your systems and networks. They use advanced tools and technology to spot irregularities, potential vulnerabilities, and signs of impending trouble.

 

Swift intervention

When a potential issue is detected, your IT support partner jumps into action immediately. They don’t wait for you to report a problem; they proactively address it, often before you’re even aware it exists.

 

Reduced downtime

By addressing issues early, proactive IT support significantly reduces downtime. You no longer have to wait for a major problem to disrupt your operations before seeking help.

 

Cost savings

While proactive IT support comes with a contract and a regular fee, it can save you money in the long run. By preventing major IT disasters, you avoid the hefty costs associated with extensive repairs and data recovery.

 

Enhanced security

Cyber threats are getting more sophisticated. Cyber criminals are constantly devising new ways to breach your defences. Proactive IT support ensures that your systems are up to date with the latest security patches and that your network is actively monitored for potential threats.

 

 

In a contract, your IT support partner becomes intimately familiar with your business. They take the time to understand your specific needs, goals, and operational processes. This deep knowledge enables them to provide personalised support that aligns with your objectives.

 

Your IT support partner can tailor solutions to your unique requirements, enhancing your efficiency and productivity.

 

With a clear understanding of your business goals, they can help you strategise for the future, recommending technology investments and improvements that fit with your long-term vision.

 

And as your business grows, your IT support partner can easily scale your technology infrastructure to accommodate increased demands, making sure your systems keep pace with your expansion.

 

They don’t just wait for problems to arise; they actively consult with you to identify opportunities for improvement and optimisation.

 

 

Move beyond a transactional relationship

 

With the break/fix model, your interactions with IT support can often feel transactional. It’s a “call when you need help” scenario, with little room for developing a deeper understanding of your business’s unique needs and goals.

 

In contrast, a contract-based IT support model creates a partnership where your IT team becomes an extension of your business.

 

Your IT support partner takes the time to get to know your business inside and out. They learn about your processes, workflows, and objectives, allowing them to offer solutions that are tailor-made for your specific requirements.

 

With a contract in place, you have a direct line to your IT experts. There’s no need to navigate through a maze of automated systems or wait for hours on hold. Your IT partner is just a phone call or email away, ready to assist you promptly.

 

Your IT experts become your trusted advisors. They can guide you on technology decisions, help you stay ahead of industry trends, and recommend answers that are cost effective and fit with your business’s growth strategy.

 

Instead of waiting for IT issues to arise, your IT support partner actively collaborates with you. They seek opportunities to optimise your technology infrastructure, improve efficiency, and ensure that your systems are always performing at their best.

 

 

Stay one step ahead

 

One of the greatest benefits of a partnership with your IT support is the ability to engage in predictive maintenance. This means addressing potential issues before they have a chance to disrupt your operations.

 

Imagine your IT support partner as your business’s healthcare provider. They conduct regular check-ups (system assessments) and provide preventive care (software updates, security patches) to keep your business in peak condition. This proactive approach minimises downtime, reduces the risk of data loss, and ensures your technology is always running smoothly.

 

Cyber threats are constantly evolving, becoming more sophisticated and pervasive. In this environment, a reactive approach to security can leave you vulnerable to potentially devastating breaches.

 

With a contract-based IT support model, you gain access to a robust security shield that can safeguard your digital fortress in several ways:

 

Updates and patches

Your IT support partner keeps your systems up to date with the latest security patches and software updates. This reduces vulnerabilities that attackers could exploit.

 

Threat monitoring

Continuous network monitoring is a hallmark of proactive IT support. Suspicious activities are identified and addressed promptly, minimising the risk of a breach.

 

Security awareness

Your IT experts educate your team about best practices for security. This empowers your employees to recognise and respond to potential threats, such as phishing attempts.

 

Incident response

In the unfortunate event of a security breach, your IT support partner is well-prepared to respond swiftly, minimising damage and aiding in recovery.

 

Compliance with regulations

For many businesses, compliance with industry regulations and data protection laws is also important. Non-compliance can result in severe financial penalties and reputational damage. A contract-based IT support model can help you stay compliant by sticking to appropriate standards, encrypting data, and even carrying out audits.

 

 

The bottom line

 

One of the primary challenges of the break/fix approach is the unpredictability of costs. When you rely on calling IT support only when things go wrong, you’re essentially playing a financial guessing game. You can never be sure when a major issue will strike or how much it will cost to resolve.

 

With a contract-based IT support model, you say farewell to these financial uncertainties. You pay a fixed, monthly fee that covers all your IT support including the routine proactive work and fixes. This predictability allows you to budget effectively, allocate resources wisely, and avoid unpleasant financial surprises.

 

At first glance, a contract might appear more expensive than the occasional break/fix bill. But it’s not. Think of the bigger picture:

 

Preventive maintenance

By addressing issues proactively, your IT support team helps you avoid costly emergency repairs and data recovery expenses.

 

Reduced downtime

Less downtime translates to more productive work hours, ultimately increasing your revenue potential.

 

Extended hardware lifespan

Predictive maintenance extends the life of your hardware, reducing the frequency of expensive replacements.

 

Security savings

Timely security measures and threat prevention can save you from the financial and reputational costs of a data breach.

 

When you add up these factors, a contract-based model is always the more cost-effective choice in the long run.

 

 

Running a successful business requires your undivided attention. Dealing with IT issues on a case-by-case basis can be a distraction. A big one. Choosing a contract-based IT support model allows you to focus on your core business activities while your IT experts handle the technical aspects for you.

 

This increased focus can lead to greater efficiency, growth, and profitability, as you’re no longer bogged down by IT-related interruptions and headaches.

 

So, are you ready to:

 

We’d love to talk. Get in touch.


90% of cyber security attacks start with a simple email. Why?

Imagine this: You’re sitting in your office, sipping your morning coffee, going through your emails. Everything seems routine until you stumble upon an alarming message from your bank.

 

You click the link and log in to your bank… but something feels wrong.

 

You go back to your email and look again. Your heart skips a beat as you realise it’s not from your bank at all… it’s a cleverly disguised phishing scam. This is where criminals pretend to be someone else. They’ve sent you to a fake bank login page and you’ve just handed over your banking login details without even realising it…

 

Now your business account has been compromised, and the criminals are already logging into your real bank account.

 

This scenario might sound like the plot of a dramatic novel, but unfortunately, it’s a reality many businesses face every day.

 

With all the modern communication tools we have, most businesses are still overly reliant on email. This 50-year-old tool refuses to go away.

 

Criminals aren’t just sending you fake emails, they are also trying to break into your inbox.

 

If you think about it, having access to someone’s email gives you a huge amount of power. You can reset their passwords… see their purchase history and travel plans… and even pretend to be them while emailing other people.

 

This is why criminals are obsessed with your email. 90% of cyber security attacks on businesses like yours start in your inbox.

 

So how do you prevent one of these nightmare scenarios?

 

 

First, understand the risks

 

Email is the one communication tool every business uses… which makes it the primary method for cyber attacks. The most common threats are phishing, and attachments that attempt to load malware onto your computer.

 

Phishing scams especially have become increasingly sophisticated. Cyber criminals are using smarter tactics than ever to encourage you to give away sensitive information or click on malicious links.

 

The consequences of a successful email breach can be devastating for a business of any size. Here are just a few potential outcomes:

 

Data breaches: Cyber criminals may gain access to sensitive company or customer information, such as financial records, intellectual property, or personally identifiable information (PII). The exposure of this data not only compromises individual privacy but also exposes your business to regulatory penalties and lawsuits.

 

Financial losses: Email scams can result in financial losses through unauthorised wire transfers, fraudulent transactions, or ransom demands. These losses can have a significant impact on your bottom line and erode trust with customers and stakeholders.

 

Reputational damage: A breach can tarnish your business’s reputation and undermine customer trust. News of a data breach spreads quickly and can have long-lasting repercussions, driving away customers and damaging relationships with partners, investors, and suppliers.

 

Operational disruption: Dealing with the aftermath of a security breach can disrupt normal business operations, leading to downtime, productivity losses, and increased stress for your team.

 

 

Then build a strong foundation for secure email

 

Choose a secure email service

The first step in strengthening your email security is to choose a reliable and secure email service provider. Look for providers that offer robust encryption protocols, secure authentication methods, and comprehensive spam filtering capabilities. You should also consider solutions that offer advanced threat detection and prevention features to safeguard against threats like phishing scams and malware attacks.

 

Implement strong authentication

Passwords are often the first line of defence against unauthorised access to your email accounts. Make sure your employees use strong, unique passwords for their email accounts.

 

Ideally give all your team a password manager. This can generate long random passwords, remember them, and securely input them so you don’t have to. Better security with less work for humans is smart.

 

Consider implementing multi-factor authentication (MFA) to add an extra layer of security. MFA requires people to provide additional verification, such as a one-time code sent to your mobile device, before accessing your accounts. This makes it significantly harder for attackers to gain unauthorised access.

 

Educate your team

Your employees are your first line of defence against email-based threats, but they can also be your weakest link if they’re not adequately trained. Provide comprehensive training on email security best practices, including how to recognise phishing attempts, avoid clicking on suspicious links or attachments, and report any suspicious emails to your IT support provider.

 

Regularly reinforce these training sessions to ensure that your team remains vigilant and up to date on the latest threats and tactics used by cyber criminals.

 

Secure mobile devices

Many of your employees use smartphones and tablets to access their work email accounts remotely. So, it’s important to make sure these devices are also adequately secured with security measures like passcodes, biometric authentication, and remote wipe capabilities in case of loss or theft. You may also consider using mobile device management (MDM) to enforce security policies and monitor how devices are being used, to prevent unauthorised access to corporate data.

 

Regularly update and patch

Keep all software up to date with the latest security patches and updates. Cyber criminals often exploit known vulnerabilities to gain access to systems and networks, so regularly applying patches is essential for maintaining secure email. Consider implementing automated ways to streamline the patching process and ensure that critical updates are applied promptly.

 

 

And look at extra security

 

Email encryption

Email encryption is one of the most effective ways to protect your email. It scrambles the contents of your messages so that only the intended recipient can decipher them.

 

Implement end-to-end encryption to keep your emails secure both in transit and at rest. Also consider using email encryption protocols such as Transport Layer Security (TLS) to encrypt communications between mail servers.

 

Advanced threat detection

Traditional spam filters and antivirus software can only do so much to protect against sophisticated email-based threats. Implement advanced threat detection that uses machine learning and artificial intelligence to analyse email traffic in real-time. They’re looking for threats like phishing scams, attachments with malware, and suspicious URLs.

 

This can help you proactively detect and block malicious emails before they reach your inboxes, reducing the risk of a successful cyber attack.

 

Email archiving and retention

Implement email archiving and retention policies to ensure compliance with regulatory requirements and to preserve critical business communications for future reference.

 

Email archiving solutions capture and store copies of all inbound and outbound emails in a secure, tamper-proof repository, allowing you to retrieve and review historical email data as needed.

 

As a bonus, email archiving helps protect against data loss by providing a backup of your email communications in the event of a server failure or other catastrophic event.

 

Employee awareness and training

Even with the most advanced technical safeguards in place, human error remains a significant risk factor in email security.

 

Continuously educate and train your employees on email security best practice, emphasising the importance of vigilance, scepticism, and caution with email messages.

 

If you really want to test your team, conduct simulated phishing exercises to find out their awareness and responsiveness to phishing scams. Then provide targeted training to address any areas of weakness identified during these exercises.

 

 

Lastly, monitoring and optimisation

 

Effective email security requires constant vigilance. Use robust monitoring tools and processes to continuously monitor email traffic, detect anomalies and suspicious activities, and respond promptly to potential security incidents.

 

What should you monitor though?

 

Email logs, server activity, and user behaviour will help identify signs of unauthorised access, unusual patterns, or potential security breaches.

 

Consider using security information and event management (SIEM) solutions to aggregate and analyse data from multiple sources and detect security threats in real-time.

 

Develop a comprehensive incident response plan to guide your business’s response to email security incidents. Define roles and responsibilities, establish how best to communicate when you can’t trust email, and outline step-by-step procedures for investigating and mitigating security breaches.

 

You can also conduct regular exercises and simulations to test the effectiveness of your incident response plan and ensure that your team is prepared to respond quickly and effectively if there is a problem.

 

Regularly assess and audit your email security controls to identify vulnerabilities and areas for improvement.

 

 

How to stay ahead of the curve

 

Keeping up to date with the latest trends, threats, and best practices in email security is essential for maintaining effective defences against cyber threats.

 

But it’s a full-time job. Which is another reason you should consider partnering with an IT support provider (like us) to keep you secure and ahead of the curve.

 

We subscribe to industry publications, newsletters, and blogs to stay informed about emerging threats, new attack techniques, and security vulnerabilities. We do it so you don’t have to.

 

And we keep our clients safe by handling all the security aspects of their email, so they don’t have to think about it.

 

Shall we talk about your email security? Get in touch.


5 steps to help recover from a cyber attack

By reading this, chances are you already know the importance of having solid cyber security measures in place. Hopefully you’ve got protections such as firewalls, antivirus software, and multi-factor authentication (where you get a login code from another device). Great work!

 

But here’s the thing: No matter how many security measures you have in place, there’s always a chance – however small – that someone might breach your defences. No system is 100% foolproof. It’s like having the most advanced lock on your front door… sure, it’ll keep most burglars out, but if someone really wants to get in, they’ll find a way.

 

Cue the dramatic music.

 

You see, while having all those security measures in place is crucial, it’s equally important to have a plan for when – and not if – the worst-case scenario happens. Prepare for the worst while hoping for the best.

 

So, how do you plan for a cyber attack if you don’t know what you’re expecting, or when you’re expecting it?

 

Good news: It’s easier than you might think. To help you get started with your own recovery plan, we’ve broken things down into 5 steps. Follow these and you can rest assured that even if the worst happens, you and your team will know the best way to react to save your business from damage and disruption… and you from the mother of all headaches.

 

 

Step 1: Assess the damage

 

When your business is hit by a cyber attack, it can feel like a punch in the gut and leaves you scrambling to figure out what to do next. Instead of taking wild guesses or hitting the panic button, take a methodical approach to work out what exactly you’re dealing with.

 

First things first, take a moment to breathe. It’s easier said than done when your heart is racing and your mind is swirling with worst-case scenarios, but a clear head is your best ally in this situation.

 

Round up your team, gather everyone in a room (virtual or physical), and let them know what’s going on. It’s important to have all hands on deck to tackle the challenge together.

 

Now take stock of the damage. What systems or data have been compromised? Are there any immediate threats you need to address? Take notes, gather evidence, and try to get a clear picture of the situation.

 

Next, try to figure out how the attackers got in. Was it through a phishing email? A vulnerability in your software? Understanding what’s known as the ‘attack vector’ will help plug the hole and prevent future breaches.

 

 

Step 2: Contain the breach

 

Once you have a handle on the situation, it’s time to contain the breach. This might involve shutting down compromised systems, isolating infected devices, or blocking suspicious network traffic, as well as changing your passwords. The goal is to prevent the attack from spreading further.

 

Depending on the severity of the attack and the nature of your business, you may need to notify the relevant authorities. This could include law enforcement, regulatory agencies, or industry watchdogs. Don’t be afraid to ask for help if you need it.

 

 

Step 3: Restore your systems and data

 

OK, crisis averted. Now there are some steps you need to take to begin the restoration process and get back to business as quickly as possible.

 

Prioritise critical systems

Not all systems are created equal. Start by identifying the systems and data that are essential for your business operations. These might include customer databases, financial records, or production systems. Focus your efforts on restoring these first.

 

Restore from backup

Lost all your data? Don’t panic, that’s why you’ve got backups. Restore your systems and data from the most recent backup available. Make sure to verify the integrity of the these first though. Some attacks can compromise them too.

 

Patch and update

Once your systems are back online, it’s important to patch any vulnerabilities that may have been exploited during the attack. Update your software, firmware, and security patches to make sure you’re running the latest, most secure versions.

 

Test, test, test

Before declaring victory and going back to business as usual, you need to test your restored systems thoroughly. Make sure everything is functioning as it should be and there are no lingering issues or vulnerabilities.

 

Communicate with stakeholders

Keep your stakeholders informed throughout the restoration process. Let them know what happened, what you’re doing to fix it, and when they can expect things to be back to normal. Transparency will help you maintain their trust and confidence.

 

 

Step 4: Learn and adapt

 

Congratulations, you’ve survived a cyber attack. But before you kick back and relax, there’s one more thing you need to do: Learn and adapt for next time. Because let’s face it, there’s usually a next time. What lessons have you learned from this experience? What changes can you make to your security posture to better protect your business?

 

Conduct a security audit

Start by taking a close look at your existing security measures. Are there any gaps or weaknesses that need to be addressed? Conduct a thorough security audit to identify vulnerabilities in your systems, processes, and policies.

 

Implement multi-layered security

One of the most effective ways to defend against cyber threats is to implement a multi-layered security approach. This means using a combination of technologies and techniques, such as firewalls, antivirus software, intrusion detection systems, and employee training, to create multiple barriers against attacks.

 

Encrypt sensitive data

Encrypting sensitive data adds yet another layer of protection, making it much harder for attackers to access and exploit. Make sure to encrypt data both in transit (that’s when it’s being sent from person to person/place to place) and at rest (when it’s saved in your systems). For maximum security consider implementing end-to-end encryption, where only the sender and recipient can decode the data.

 

Enforce strong password policies

Weak passwords are a cyber criminal’s best friend. Enforce strong password policies across your business, requiring employees to use long randomly generated unique passwords. A password manager can make this simpler and safer. Strongly consider implementing multi-factor authentication for another layer of security.

 

Stay up to date with security patches

Cyber threats are constantly evolving, so it’s crucial to stay on top of security patches and updates for your software, firmware, and operating systems. Make sure to apply patches as soon as possible to stop attackers exploiting known vulnerabilities.

 

Educate and train employees

Your employees are your first line of defence against cyber attacks. Educate them about the importance of cyber security and provide regular training to help them recognise and respond to potential threats. Teach them how to spot phishing emails, avoid suspicious websites, and practice good security hygiene.

 

Monitor and respond to threats

Real-time monitoring and alerting systems will help you detect and respond to potential security threats as soon as they arise. Set up regular security audits and penetration tests for a proactive approach.

 

 

Step 5: Develop an incident response plan (BEFORE you need it)

 

No matter how strong your defences, there’s always a chance that you’ll be targeted by cyber criminals again. That’s why it’s vital to have a solid incident response plan in place to help you respond quickly and effectively in the event of a cyber attack.

 

In fact, don’t wait to be targeted the first time. Create your incident response plan now, before you need it, and stay one step ahead.

 

Create your incident response team

The first step in developing an incident response plan is to set up a dedicated team who will be responsible for handling cyber security incidents. This team should include representatives from IT, security, legal, communications, and other relevant departments. Make sure everyone knows their roles and responsibilities in the event of an incident.

 

Identify and prioritise threats

Next, identify the types of cyber threats that your business is most likely to face and prioritise them based on their potential impact. This will help you focus your resources on mitigating the most significant risks and developing targeted response strategies.

 

Develop response procedures

Once you’ve identified the threats, develop detailed response procedures for each type of incident. This should include step-by-step instructions for detecting, containing, and mitigating the impact of the incident, as well as communication protocols for notifying stakeholders and coordinating the response efforts.

 

Test and refine your plan

A plan is only as good as its execution, so test your incident response plan regularly through tabletop exercises and simulations. This will help identify any weaknesses or gaps so that you can refine it accordingly. Make sure to involve all members of your incident response team in these exercises to ensure everyone knows what to do in the event of an incident.

 

Communicate effectively

Communication is key, so make sure everyone involved in handling an incident knows their role, but also tell everyone in the business about the incident response plan. Anyone could be the first to sound the alarm, so everyone needs to know who to report any incidents to in the first instance.

 

 

Bonus step 6: Partner with a trusted IT support provider

 

It’s important to develop a culture of cyber security in your business, but sometimes you need expert help. That’s where partnering with an IT support provider (like us) can make all the difference.

 

We specialise in cyber security, which means we have the expertise and experience needed to keep your business safe and secure. We stay up to date on the latest threats, trends, and technologies, so you don’t have to.

 

With our knowledge and skills, you can benefit from best-in-class cyber security protection without having to become an expert yourself. And just think about the time and stress that could save.

 

One of the biggest advantages of working with an IT support provider is our ability to prevent cyber attacks before they even begin. Through proactive monitoring, threat intelligence, and security assessments, we can identify and address potential vulnerabilities in your systems and processes before they can be exploited by cyber criminals. This proactive approach can save you time, money, and headaches in the long run by preventing costly data breaches and downtime.

 

And while you might worry about the expense, partnering with an IT support provider can actually be a cost-effective solution for small and medium-sized businesses that may not have the resources to maintain an in-house cyber security team.

 

By outsourcing your cyber security needs to a third-party provider, you can access enterprise-grade security solutions at a fraction of the price of hiring and training your own team.

 

Perhaps the most significant benefit of working with an IT support provider is the peace of mind that comes with knowing your business is in good hands. With a trusted partner by your side, you can rest easy knowing that your systems, data, and reputation are protected against cyber threats. You can focus on running your business with confidence, knowing that your cyber security needs are being taken care of by professionals who have your best interests at heart.

 

If that sounds appealing, we’d love to talk about how we can help your business. Get in touch.


5 steps to help recover from a cyber attack

Here’s something no business wants… you find yourself in the middle of a cyber attack.

It’s more common than you think. And how you respond can determine how badly your business is affected.

 

Here are 5 steps you must take…

 

Step one: Create a solid incident response plan BEFORE you need it. How can your team sound the alarm? Who does what? Where do you turn for help?

 

Step two: Assess the situation. Quickly determine the extent of the damage and activate your response team.

 

Step three: Contain the breach. Lock down affected systems, change passwords, and stop cyber criminals from doing more damage.

 

Step four: Restore from backups. Having backups can bring your systems back online without losing data.

 

And step five: Learn and adapt. Every challenge is an opportunity to grow. Analyse what went wrong, refine your incident response plan, and strengthen your defences.

 

Remember: It always helps to have trusted experts you can call on.

 

If we can help you create and implement your incident response plan, get in touch.


A cyber attack will probably start with an email

Here’s a shocking fact: 90% of cyber attacks start with a simple email.

 

And guess who uses email every single day? EVERYONE… including you and all your team.

 

Which means every time you open an inbox your business is at risk. So, 20 or 30 times a day, right?

 

But there are smart things you can do to tighten up your email security and avoid becoming a cyber criminal’s next victim. We discuss them in our latest video.


Here’s how to save time, money, and stress on your IT

Your business couldn’t function without its technology, right?

 

And from time to time, things go wrong.

 

If these are the only times you speak to your IT support provider, it’s very likely you’re wasting a lot of time and money. Plus creating yourself a ton of stress.

 

It might feel like you’re saving money when you only pay for something broken that needs attention (this is known as break/fix).

 

But most businesses agree it’s better to be in a contracted IT support relationship. This has no unexpected costs and a ton of other benefits.

 

Such as proactive monitoring that spots problems before they affect you… our latest video tells you more.

xr:d:DAF8mrStD0w:20,j:3463686600897435579,t:24021220

From Date we’re upgrading your cyber security. Here’s what that means for you and your team

It’s not just big businesses that are targeted for ransomware attacks these days. Hackers use automated tools to target all businesses, all of the time. Including yours.

To them it’s a numbers game. And that means without adequate protection, you’re playing a numbers game too… one that has huge potential risks.

Since we started working with you, our service has been based around a great deal of preventative work to stop your IT going wrong. And of course fixing problems we couldn’t foresee.

I’ve been watching the levels of cyber-crime increase to the point that it’s now making me uncomfortable. So I’ve decided to roll out a minimum standard of cyber security for all of our clients.

From Date we’re upgrading your cyber security. We’re putting you on our Bronze security package (we can talk about higher levels of protection if you want to – details below).

We’ve put together a sophisticated blend of security products to give you five key protections:

 

 

Let me anticipate what some of your questions might be.

 

 

Question: Is there a cost implication to this?

Yes, because we have invested heavily in some very sophisticated tools. It’s an investment of just £xxx per person, per month, which for your business works out at an overall increase of £xxx per month.

 

Question: Do I really need this security package?

Yes I really do believe you do. If you saw what I saw every day, you’d want this level of protection. Think of this cyber security package as like the air bags in your car. You hope never to have to use them. But if you have an accident, you’ll be very glad they were there to protect you.

 

Question: Can I opt out?

Yes, of course. You’ll just need to tell me before Date please. I will ask you to sign a document to confirm you understand the increased risk of not being protected. And also to confirm that if you are compromised by a hacker, we will charge for our time to resolve it.

 

Question: What else can I do to keep my business safe?

As I said earlier, this is our minimum standard. We have Silver and Gold plans with even greater levels of protection for your data and systems. There’s also critical security awareness training for your staff, and additional backup tools to give you more options in the event of a crisis.


Have you been following the news of the latest ransomware attack? Insert a headline here about the latest hack Here’s how that affects your business + my recommendation

There’s been lots in the news recently about insert a few brief details here about the hack currently in the news.

Ransomware is a very difficult attack to deal with. It’s where hackers gain access to your data and encrypt it, so you can’t access it at all. Then they demand a big ransom fee to unlock your data.

It’s easy to look at this and think “hey, we’re OK, they only seem to target big businesses”. But that’s not the case at all. The reality is:

 

Hackers are targeting all businesses, all the time,

using clever automated tools to find and exploit vulnerabilities

 

When small businesses are attacked by ransomware, it tends not to be reported in the news. But believe me when I tell you it definitely happens. Every. Single. Day.

We see attempted ransomware attacks all the time and they are terrifying. Many hackers now gain access to IT systems weeks, or even months, before they launch their attacks. They use this time to quietly prepare, and slowly change settings to make it dramatically harder for us to a) detect them, and b) fix the damage they create when they launch their attack.

This is why I’m writing to you today. I’ve been reviewing the cyber security protection you (and all our other clients) have in place. And it’s time to be proactive and increase that protection.

 

We’ve put together a sophisticated blend of security products to give you five key protections:

 


Secure your data under lock and key

Data is the lifeblood of your business.

 

That might sound dramatic but think about it for just a moment. It’s everything from customer profiles and financial transactions to confidential business plans and intellectual property.

 

Realistically, your success and reputation hinge on how well you protect your data.

 

Why does it need protecting? Every day, your employees access and share sensitive information across various devices and networks. And while this connectivity boosts productivity, it also exposes you to bad people with a common goal: They want to steal as much of that data as possible.

 

That’s where encryption comes into play.

 

Imagine your data as a treasure chest hidden in a cupboard. You can’t just leave it there without any protection and expect it to stay safe. Encryption is the lock on that chest, and only those with the right key can access its contents.

 

At its core, encryption is the process of converting your data into a scrambled, unreadable format. This transformation happens using complex mathematical algorithms, rendering your information useless to anyone without the decryption key. It’s like writing a secret message in a code that only you and your intended recipient can understand.

 

Encryption should be a non-negotiable part of your business’s data security strategy. Here’s why…

 

Data privacy compliance

Regulatory bodies like GDPR require businesses to protect sensitive customer and employee data. Failure to do so can lead to hefty fines and legal repercussions. Encryption helps you stay on the right side of the law by ensuring data privacy.

 

Safeguarding reputation

A data breach or leak can irreparably tarnish your brand’s reputation. Customers and partners trust you to keep their information secure. Encryption is a visible sign of your commitment to safeguarding their data.

 

Mitigating insider threats

Unfortunately, not all threats come from external sources. Sometimes, it’s an employee’s lost laptop or a disgruntled staff member looking to cause harm. Encryption acts as a safety net, ensuring that even if a device falls into the wrong hands, your data remains protected.

 

Preventing unauthorised access

Cyber criminals are constantly probing for vulnerabilities in your network and devices. Encryption acts as a barrier, making it incredibly challenging for them to make sense of any stolen data.

 

Business continuity

In the face of a data breach or cyber attack, the ability to recover quickly and minimise damage is crucial. Encryption ensures that even if an incident occurs, the data itself remains secure, allowing you to focus on recovery rather than damage control.

 

 

The cost of neglecting encryption

 

As the saying goes, “You don’t know what you’ve got until it’s gone.” Here are some examples of risks facing all businesses, that highlight the importance of encryption in protecting your valuable data.

 

Data breaches

Picture this: Your company’s database, containing sensitive customer information, has been breached by a cyber criminal. Names, addresses, and credit card numbers are now in the wrong hands. The cost of such a breach includes not only financial losses but also reputational damage that might be impossible to fully repair.

 

With encryption, even if a breach occurs, encrypted data remains useless to unauthorised individuals.

 

Lost or stolen devices

A company laptop containing unencrypted files gets left behind in a coffee shop. Or an employee’s smartphone with confidential emails and documents goes missing. Without encryption, you’re essentially handing over your data on a silver platter to anyone who stumbles upon it.

 

Encrypting data on devices ensures that even if they fall into the wrong hands, your information remains safe from prying eyes.

 

Insider threats

Sometimes, the biggest threats come from within. An unhappy employee with access to sensitive data decides to walk out the door with it. Encryption can prevent malicious intent from becoming a costly nightmare.

 

Encryption helps you maintain control over your data, preventing unauthorised access even by employees.

 

Legal consequences

Data privacy laws require you to protect sensitive information. If you neglect this duty, you might find yourself facing legal consequences, which can include huge fines that could cripple your business.

 

Encryption is your ally in meeting the stringent data protection requirements of privacy laws.

 

The impact of a data breach or security incident goes far beyond just financial losses. It has a ripple effect that can be felt across your entire business ecosystem:

 

Loss of trust

Customers and partners may lose faith in your ability to safeguard their data, leading to a drop in sales and partnerships.

 

Operational disruption

Dealing with the aftermath of a data breach can disrupt your business operations, leading to lost productivity and additional costs.

 

Legal battles

Lawsuits and regulatory fines can drain your financial resources and damage your reputation further.

 

Recovery costs

Restoring your systems and regaining lost data is a costly and time-consuming process.

 

 

How it works

 

While encryption might seem like a complicated, mystical art, it’s straightforward once you get the hang of it.

 

At its core, encryption is about taking plain, readable data (called plaintext) and transforming it into an unreadable, scrambled format (called ciphertext). This transformation is achieved using mathematical algorithms and a secret key.

 

There are two primary types of encryption:

 

Symmetric encryption

In symmetric encryption, the same key is used for both encryption and decryption. It’s like having a single key that can both lock and unlock a door. While it’s efficient and fast, the challenge is securely sharing the key with the recipient. If someone intercepts the key during transmission, your data could still be compromised.

 

Asymmetric encryption

Asymmetric encryption uses a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is kept secret for decryption. It’s like having a padlock with one key that everyone can use to lock a box, but only you have the key to unlock it. This approach is more secure for sharing encrypted data, as you don’t need to exchange a secret key.

 

When you want to send someone encrypted data, here’s how it typically goes:

 

  1. Your recipient generates a pair of keys – a public key (which they share with you and the world) and a private key (which they keep secret).

 

  1. You use their public key to encrypt the data you want to send.

 

  1. You send the encrypted data to your recipient.

 

  1. Your recipient uses their private key to decrypt the data and read your message.

 

The beauty of asymmetric encryption is that even if someone intercepts the encrypted data and has access to the public key, they can’t decrypt it without the private key. This makes it a powerful tool for secure communication and data sharing.

 

One essential aspect of encryption is key management. Safeguarding your keys is as important as protecting your data. Losing a key or having it fall into the wrong hands can render your encryption useless.

 

 

Encryption for your business

 

When it comes to encryption, you have several tools and technologies at your disposal. Here are some key considerations:

 

File and folder encryption

Operating system tools: Most modern operating systems offer built-in encryption tools, such as BitLocker for Windows and FileVault for macOS. These are excellent options for encrypting entire drives or specific folders.

 

Third-party solutions: There are also third-party encryption software options like VeraCrypt and AxCrypt, which offer more advanced features and cross-platform compatibility.

 

Email encryption

PGP/GPG: Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) are popular solutions for encrypting email communications. They use a combination of symmetric and asymmetric encryption to keep your emails private.

 

Email service providers: Some email service providers, like ProtonMail and Tutanota, offer end-to-end encryption by default. Consider using these services for sensitive communications.

 

Full disk encryption

Whole disk encryption: Tools like BitLocker, FileVault, and LUKS (Linux Unified Key Setup) allow you to encrypt your entire disk or device, ensuring that all data on it is protected.

 

Cloud storage encryption

Client-side encryption: Some cloud storage providers offer client-side encryption, which means your data is encrypted on your device before it’s uploaded to the cloud.

 

Communication encryption

SSL/TLS (Secure Sockets Layer/Transport Layer Security): Ensure that your website and online services use SSL/TLS encryption. This is essential for secure data transmission over the internet, especially for e-commerce and login systems.

 

Virtual Private Network (VPN): Implementing a VPN for your business can secure communication between remote employees and the company network, keeping data safe from prying eyes.

 

 

Encryption best practice

 

Implementing encryption is only half the battle. Here’s how to ensure you’re using encryption effectively:

 

 

 

While encryption is crucial for data security, it’s essential to strike a balance between security and usability. Overly complex encryption processes can hinder productivity and frustrate employees. Finding the right tools and workflows that provide robust security without becoming a burden is key.

 

Choosing the right encryption standard

 

In the world of encryption, several standards and algorithms have been developed to safeguard data. Selecting the right encryption standard depends on your specific needs and use cases. We can help you choose the right standard for your needs, but here are some factors to consider…

 

Data sensitivity: If you’re dealing with highly sensitive data like medical records or financial information, opt for strong encryption standards like AES-256 or RSA with longer key lengths.

 

Performance: Consider the performance impact of encryption on your systems. AES is known for its speed and efficiency, making it a good choice for many applications.

 

Compatibility: Ensure that the encryption standard you choose is compatible with your existing systems and software. Compatibility issues can lead to headaches down the road.

 

Regulatory compliance: If your business operates in a regulated industry (e.g., healthcare or finance), check if there are specific encryption requirements you must meet to comply with regulations like GDPR.

 

Usability: Consider the ease of implementation and user-friendliness of the encryption solution. Complicated encryption processes may lead to errors and decreased productivity.

 

Future-proofing: Think about the long-term viability of the encryption standard. Security threats evolve, so choose a standard that can adapt and remain secure over time.

 

 

As with a lot of cyber security, encryption is not a one-and-done task. It’s an ongoing process that requires vigilance and adaptation. If it’s something that needs attention in your business, let us help you get it right first time. Get in touch.

 

 

 


Why you’re better in a contract with your IT company

Imagine you’re driving down a winding road in the middle of nowhere. Suddenly, your car breaks down. You’re stuck, miles from assistance. You feel helpless. Frantically searching for a solution.

 

This scenario isn’t too different from the world of IT support when you rely on what’s known as a break/fix relationship with your provider (when your IT is broken, they fix it. And that’s it; there’s no proactive work).

 

But what if there was a way to ensure a smoother journey?

 

That’s where the magic of having a contract with your IT support provider comes in. Think of it as having a trusted mechanic who not only fixes your car but actually prevents breakdowns in the first place.

 

Whether you run a bustling corporation or a small start-up, entering into a contract with your IT support provider is the smart, cost-effective way to ensure a smoother tech journey.

 

 

The break/fix conundrum

 

When your computers crash, your network goes haywire, or your software refuses to cooperate, it’s not just a minor inconvenience – it’s a potential storm on the horizon that could disrupt everything you do.

 

For many business owners, the traditional “break/fix” model has been their long-term go-to solution. This approach involves calling in IT support only when something goes wrong – when you’re already in trouble.

 

While the break/fix approach may have served its purpose in the past, tech needs have grown more complex. We’re facing more cyber threats, software vulnerabilities, and rapidly evolving technologies than ever before. Relying on a 100% reactive strategy can leave you vulnerable to costly downtime, data breaches, and customer dissatisfaction.

 

Let’s take a closer look at the pitfalls of the break/fix approach.

 

Downtime

When a critical IT issue arises, you’re forced to wait for help to kick in, often leading to significant downtime. Every minute your systems are down, your business is losing money and potentially damaging its reputation.

 

Unpredictable costs

Break/fix support comes with unpredictable costs. You can’t anticipate when problems will occur or how much they’ll cost to fix. This unpredictability can wreak havoc on your budget.

 

Data loss

Data loss is a nightmare for any business. Relying on break/fix means you’re at risk of losing valuable data if a problem escalates before anyone can start helping.

 

No familiarity

In this model, your IT support provider is like a distant relative you only hear from when things go south. They may not fully understand your business needs and goals or even be up to date on your current setup, which can really hold back effective problem-solving.

 

Security vulnerabilities

Cyber threats are constantly evolving. Relying on a reactive approach may leave your systems vulnerable to attacks, as you may not get timely security updates or patches.

 

 

A contracted partnership

 

Now, imagine a different scenario: one where your IT support partner is more than just a trouble shooter. They are your trusted ally, always vigilant and prepared for the storm before it hits. This is the essence of contracted IT support, and it’s achieved through a structured agreement that allows a close, ongoing relationship with your IT partner.

 

In a contracted IT support model, your IT support partner isn’t just waiting for problems to surface; they are actively monitoring your IT infrastructure, looking for the first signs of trouble.

 

Here’s how this contracted approach works in your favour.

 

Early problem detection

With a contract in place, your IT support partner actively monitors your systems and networks. They use advanced tools and technology to spot irregularities, potential vulnerabilities, and signs of impending trouble.

 

Swift intervention

When a potential issue is detected, your IT support partner jumps into action immediately. They don’t wait for you to report a problem; they proactively address it, often before you’re even aware it exists.

 

Reduced downtime

By addressing issues early, proactive IT support significantly reduces downtime. You no longer have to wait for a major problem to disrupt your operations before seeking help.

 

Cost savings

While proactive IT support comes with a contract and a regular fee, it can save you money in the long run. By preventing major IT disasters, you avoid the hefty costs associated with extensive repairs and data recovery.

 

Enhanced security

Cyber threats are getting more sophisticated. Cyber criminals are constantly devising new ways to breach your defences. Proactive IT support ensures that your systems are up to date with the latest security patches and that your network is actively monitored for potential threats.

 

 

In a contract, your IT support partner becomes intimately familiar with your business. They take the time to understand your specific needs, goals, and operational processes. This deep knowledge enables them to provide personalised support that aligns with your objectives.

 

Your IT support partner can tailor solutions to your unique requirements, enhancing your efficiency and productivity.

 

With a clear understanding of your business goals, they can help you strategise for the future, recommending technology investments and improvements that fit with your long-term vision.

 

And as your business grows, your IT support partner can easily scale your technology infrastructure to accommodate increased demands, making sure your systems keep pace with your expansion.

 

They don’t just wait for problems to arise; they actively consult with you to identify opportunities for improvement and optimisation.

 

 

Move beyond a transactional relationship

 

With the break/fix model, your interactions with IT support can often feel transactional. It’s a “call when you need help” scenario, with little room for developing a deeper understanding of your business’s unique needs and goals.

 

In contrast, a contract-based IT support model creates a partnership where your IT team becomes an extension of your business.

 

Your IT support partner takes the time to get to know your business inside and out. They learn about your processes, workflows, and objectives, allowing them to offer solutions that are tailor-made for your specific requirements.

 

With a contract in place, you have a direct line to your IT experts. There’s no need to navigate through a maze of automated systems or wait for hours on hold. Your IT partner is just a phone call or email away, ready to assist you promptly.

 

Your IT experts become your trusted advisors. They can guide you on technology decisions, help you stay ahead of industry trends, and recommend answers that are cost effective and fit with your business’s growth strategy.

 

Instead of waiting for IT issues to arise, your IT support partner actively collaborates with you. They seek opportunities to optimise your technology infrastructure, improve efficiency, and ensure that your systems are always performing at their best.

 

 

Stay one step ahead

 

One of the greatest benefits of a partnership with your IT support is the ability to engage in predictive maintenance. This means addressing potential issues before they have a chance to disrupt your operations.

 

Imagine your IT support partner as your business’s healthcare provider. They conduct regular check-ups (system assessments) and provide preventive care (software updates, security patches) to keep your business in peak condition. This proactive approach minimises downtime, reduces the risk of data loss, and ensures your technology is always running smoothly.

 

Cyber threats are constantly evolving, becoming more sophisticated and pervasive. In this environment, a reactive approach to security can leave you vulnerable to potentially devastating breaches.

 

With a contract-based IT support model, you gain access to a robust security shield that can safeguard your digital fortress in several ways:

 

Updates and patches

Your IT support partner keeps your systems up to date with the latest security patches and software updates. This reduces vulnerabilities that attackers could exploit.

 

Threat monitoring

Continuous network monitoring is a hallmark of proactive IT support. Suspicious activities are identified and addressed promptly, minimising the risk of a breach.

 

Security awareness

Your IT experts educate your team about best practices for security. This empowers your employees to recognise and respond to potential threats, such as phishing attempts.

 

Incident response

In the unfortunate event of a security breach, your IT support partner is well-prepared to respond swiftly, minimising damage and aiding in recovery.

 

Compliance with regulations

For many businesses, compliance with industry regulations and data protection laws is also important. Non-compliance can result in severe financial penalties and reputational damage. A contract-based IT support model can help you stay compliant by sticking to appropriate standards, encrypting data, and even carrying out audits.

 

 

The bottom line

 

One of the primary challenges of the break/fix approach is the unpredictability of costs. When you rely on calling IT support only when things go wrong, you’re essentially playing a financial guessing game. You can never be sure when a major issue will strike or how much it will cost to resolve.

 

With a contract-based IT support model, you say farewell to these financial uncertainties. You pay a fixed, monthly fee that covers all your IT support including the routine proactive work and fixes. This predictability allows you to budget effectively, allocate resources wisely, and avoid unpleasant financial surprises.

 

At first glance, a contract might appear more expensive than the occasional break/fix bill. But it’s not. Think of the bigger picture:

 

Preventive maintenance

By addressing issues proactively, your IT support team helps you avoid costly emergency repairs and data recovery expenses.

 

Reduced downtime

Less downtime translates to more productive work hours, ultimately increasing your revenue potential.

 

Extended hardware lifespan

Predictive maintenance extends the life of your hardware, reducing the frequency of expensive replacements.

 

Security savings

Timely security measures and threat prevention can save you from the financial and reputational costs of a data breach.

 

When you add up these factors, a contract-based model is always the more cost-effective choice in the long run.

 

 

Running a successful business requires your undivided attention. Dealing with IT issues on a case-by-case basis can be a distraction. A big one. Choosing a contract-based IT support model allows you to focus on your core business activities while your IT experts handle the technical aspects for you.

 

This increased focus can lead to greater efficiency, growth, and profitability, as you’re no longer bogged down by IT-related interruptions and headaches.

 

So, are you ready to:

 

We’d love to talk. Get in touch.


90% of cyber security attacks start with a simple email. Why?

Imagine this: You’re sitting in your office, sipping your morning coffee, going through your emails. Everything seems routine until you stumble upon an alarming message from your bank.

 

You click the link and log in to your bank… but something feels wrong.

 

You go back to your email and look again. Your heart skips a beat as you realise it’s not from your bank at all… it’s a cleverly disguised phishing scam. This is where criminals pretend to be someone else. They’ve sent you to a fake bank login page and you’ve just handed over your banking login details without even realising it…

 

Now your business account has been compromised, and the criminals are already logging into your real bank account.

 

This scenario might sound like the plot of a dramatic novel, but unfortunately, it’s a reality many businesses face every day.

 

With all the modern communication tools we have, most businesses are still overly reliant on email. This 50-year-old tool refuses to go away.

 

Criminals aren’t just sending you fake emails, they are also trying to break into your inbox.

 

If you think about it, having access to someone’s email gives you a huge amount of power. You can reset their passwords… see their purchase history and travel plans… and even pretend to be them while emailing other people.

 

This is why criminals are obsessed with your email. 90% of cyber security attacks on businesses like yours start in your inbox.

 

So how do you prevent one of these nightmare scenarios?

 

 

First, understand the risks

 

Email is the one communication tool every business uses… which makes it the primary method for cyber attacks. The most common threats are phishing, and attachments that attempt to load malware onto your computer.

 

Phishing scams especially have become increasingly sophisticated. Cyber criminals are using smarter tactics than ever to encourage you to give away sensitive information or click on malicious links.

 

The consequences of a successful email breach can be devastating for a business of any size. Here are just a few potential outcomes:

 

Data breaches: Cyber criminals may gain access to sensitive company or customer information, such as financial records, intellectual property, or personally identifiable information (PII). The exposure of this data not only compromises individual privacy but also exposes your business to regulatory penalties and lawsuits.

 

Financial losses: Email scams can result in financial losses through unauthorised wire transfers, fraudulent transactions, or ransom demands. These losses can have a significant impact on your bottom line and erode trust with customers and stakeholders.

 

Reputational damage: A breach can tarnish your business’s reputation and undermine customer trust. News of a data breach spreads quickly and can have long-lasting repercussions, driving away customers and damaging relationships with partners, investors, and suppliers.

 

Operational disruption: Dealing with the aftermath of a security breach can disrupt normal business operations, leading to downtime, productivity losses, and increased stress for your team.

 

 

Then build a strong foundation for secure email

 

Choose a secure email service

The first step in strengthening your email security is to choose a reliable and secure email service provider. Look for providers that offer robust encryption protocols, secure authentication methods, and comprehensive spam filtering capabilities. You should also consider solutions that offer advanced threat detection and prevention features to safeguard against threats like phishing scams and malware attacks.

 

Implement strong authentication

Passwords are often the first line of defence against unauthorised access to your email accounts. Make sure your employees use strong, unique passwords for their email accounts.

 

Ideally give all your team a password manager. This can generate long random passwords, remember them, and securely input them so you don’t have to. Better security with less work for humans is smart.

 

Consider implementing multi-factor authentication (MFA) to add an extra layer of security. MFA requires people to provide additional verification, such as a one-time code sent to your mobile device, before accessing your accounts. This makes it significantly harder for attackers to gain unauthorised access.

 

Educate your team

Your employees are your first line of defence against email-based threats, but they can also be your weakest link if they’re not adequately trained. Provide comprehensive training on email security best practices, including how to recognise phishing attempts, avoid clicking on suspicious links or attachments, and report any suspicious emails to your IT support provider.

 

Regularly reinforce these training sessions to ensure that your team remains vigilant and up to date on the latest threats and tactics used by cyber criminals.

 

Secure mobile devices

Many of your employees use smartphones and tablets to access their work email accounts remotely. So, it’s important to make sure these devices are also adequately secured with security measures like passcodes, biometric authentication, and remote wipe capabilities in case of loss or theft. You may also consider using mobile device management (MDM) to enforce security policies and monitor how devices are being used, to prevent unauthorised access to corporate data.

 

Regularly update and patch

Keep all software up to date with the latest security patches and updates. Cyber criminals often exploit known vulnerabilities to gain access to systems and networks, so regularly applying patches is essential for maintaining secure email. Consider implementing automated ways to streamline the patching process and ensure that critical updates are applied promptly.

 

 

And look at extra security

 

Email encryption

Email encryption is one of the most effective ways to protect your email. It scrambles the contents of your messages so that only the intended recipient can decipher them.

 

Implement end-to-end encryption to keep your emails secure both in transit and at rest. Also consider using email encryption protocols such as Transport Layer Security (TLS) to encrypt communications between mail servers.

 

Advanced threat detection

Traditional spam filters and antivirus software can only do so much to protect against sophisticated email-based threats. Implement advanced threat detection that uses machine learning and artificial intelligence to analyse email traffic in real-time. They’re looking for threats like phishing scams, attachments with malware, and suspicious URLs.

 

This can help you proactively detect and block malicious emails before they reach your inboxes, reducing the risk of a successful cyber attack.

 

Email archiving and retention

Implement email archiving and retention policies to ensure compliance with regulatory requirements and to preserve critical business communications for future reference.

 

Email archiving solutions capture and store copies of all inbound and outbound emails in a secure, tamper-proof repository, allowing you to retrieve and review historical email data as needed.

 

As a bonus, email archiving helps protect against data loss by providing a backup of your email communications in the event of a server failure or other catastrophic event.

 

Employee awareness and training

Even with the most advanced technical safeguards in place, human error remains a significant risk factor in email security.

 

Continuously educate and train your employees on email security best practice, emphasising the importance of vigilance, scepticism, and caution with email messages.

 

If you really want to test your team, conduct simulated phishing exercises to find out their awareness and responsiveness to phishing scams. Then provide targeted training to address any areas of weakness identified during these exercises.

 

 

Lastly, monitoring and optimisation

 

Effective email security requires constant vigilance. Use robust monitoring tools and processes to continuously monitor email traffic, detect anomalies and suspicious activities, and respond promptly to potential security incidents.

 

What should you monitor though?

 

Email logs, server activity, and user behaviour will help identify signs of unauthorised access, unusual patterns, or potential security breaches.

 

Consider using security information and event management (SIEM) solutions to aggregate and analyse data from multiple sources and detect security threats in real-time.

 

Develop a comprehensive incident response plan to guide your business’s response to email security incidents. Define roles and responsibilities, establish how best to communicate when you can’t trust email, and outline step-by-step procedures for investigating and mitigating security breaches.

 

You can also conduct regular exercises and simulations to test the effectiveness of your incident response plan and ensure that your team is prepared to respond quickly and effectively if there is a problem.

 

Regularly assess and audit your email security controls to identify vulnerabilities and areas for improvement.

 

 

How to stay ahead of the curve

 

Keeping up to date with the latest trends, threats, and best practices in email security is essential for maintaining effective defences against cyber threats.

 

But it’s a full-time job. Which is another reason you should consider partnering with an IT support provider (like us) to keep you secure and ahead of the curve.

 

We subscribe to industry publications, newsletters, and blogs to stay informed about emerging threats, new attack techniques, and security vulnerabilities. We do it so you don’t have to.

 

And we keep our clients safe by handling all the security aspects of their email, so they don’t have to think about it.

 

Shall we talk about your email security? Get in touch.


Windows 10 is getting a very useful Windows 11 feature

There’s no denying that Windows 11 has a lot of really cool new features.

 

If you haven’t made the move from Windows 10 yet, you’re missing out.

 

But there’s good news. To make the (eventual) move from Windows 10 to 11 a little easier, Microsoft is sharing a couple of 11’s most useful features.

 

The first should make printing a little easier. We can hear your cheers from here! Anything that makes printing easier is OK in our book too. Printers don’t have a terrible reputation for nothing…

 

This feature makes printing PIN-protected. That means when you want to print a document, you’ll send it off to the printer – but it’ll only print when you’ve reached the printer and entered your PIN.

 

This removes the risk of you printing something confidential and leaving it on the printer for everyone to see.

 

Or accidentally printing several copies of the same document. Yes, this will reduce paper waste.

 

And that’s not all…

 

There’s a second really useful feature coming over to Windows 10. It’s called Focus Assist and works alongside do not disturb.

 

Switching on do not disturb is great when you want a little uninterrupted time to finish a task or do some research. But if you use it a lot, you might miss a notification that you really needed to see.

 

Focus Assist stops that from happening. You use it alongside do not disturb and it still allows important and time-sensitive notifications and messages to reach you.

 

These features have been in testing since June this year. There’s still no date for when they’ll be released to everyone with Windows 10. But they’re on their way.

 

If you can’t wait to try more of the time saving and productivity boosting features that Windows 11 has to offer, give us a call to see how we can help you make the switch.


The Entrepreneurial Operating System can help your business focus on growth

As IT professionals, the concept of an operating system is a basic principle for us. Without Windows, macOS or even iOS, our devices wouldn’t run.

 

But what about an operating system for your business? Is that a crazy idea?

 

No, it’s not. If you think of an operating system as the fundamentals of how you want your business to operate, it makes perfect sense.

 

That’s where EOS comes in.

 

Have you heard of it before? EOS – or the Entrepreneurial Operating System – is a framework to help optimize how your business runs.

 

EOS has the potential to become the very core of your business, helping everyone to understand what they should be doing, and why.

 

It’s something that we feel not enough business owners are aware of. And while there may not be a direct link between EOS and your technology, we feel it could become an important tool in your business’s growth and development.

 

This guide is your introduction to EOS, so you can see if it’s right for you.

 

 

What is EOS?

 

EOS was designed and developed by Gino Wickman when he was just 21. He noticed that many of his fellow entrepreneurs lacked confidence and made mistakes when making business decisions.

 

He created EOS as a way of empowering business owners to take control of their companies in the right way, which would then allow them to take risks with confidence.

 

The model differs from others because it can be used by any business in any sector, anywhere in the world.

 

There are six key components that you focus on, in the right order (we’ll look at them in a moment). These allow you to strengthen your business, prime it for growth, and make sure everyone in the business understands their role and the part they play in the business’s success.

 

The program has a heavy focus on a comprehensive business strategy, as well as management theories which help you:

 

· See the best way of doing what you want to do

· Keep control of your business

· Make fewer mistakes along the way

 

Before any business gets started with EOS, your whole team should read Gino Wickman’s book Traction. This will help everyone understand exactly what needs to change, and more importantly, why. It helps everyone to realize their role in the change and why everyone must pull together.

 

 

The 6 key components

 

EOS focuses on 6 key components that will help you get the most out of the program and see the best results from your work. Each component must be followed for the highest chance of success.

 

Vision

As we’ve mentioned, you need to get everyone in the business on board. The entire team needs to know where the business is going and how you’re going to get there

 

People

You can’t achieve great vision without great people. Surround yourself with a great team from the top to the bottom

 

Data

You must reduce the business down to a simple set of numbers that will give you the exact view of where you are, at a very simple, straightforward level

 

 

It’s only when these first three components are strong that you are able to develop an open, honest business. You can’t move on to the next three components until you’ve made everything visible, allowing you the right focus for the next steps.

 

 

Issues

You’ll become excellent at problem-solving, making sure that business issues disappear for the long-term rather than temporarily

 

Process

You’ll learn to systemize your business by identifying and documenting all of its core processes. These define the way you run the business, so you need to create consistency and scalability

 

Traction

This step allows you to bring discipline and accountability to your people. Everyone should know what they’re supposed to be doing, and what will happen if they don’t

 

 

Principles

 

While the key components tell you what you’ll gain from using EOS, the principles tell you how you’ll get there.

 

Strategy

Your first step is to create a plan for how to run your business. Yes, you probably have a good idea how to run your business already. But this will look at what you want to accomplish, who will be involved in helping, and what resources you’ll need

 

Execution

Of course, when you have a plan, you’ll need to understand how to execute it. This stage helps ensure every new idea in your strategy has been well thought out in order to prevent you making mistakes. Careful consideration means your strategy will have the very best chance of success

 

Control

The other thing you need is the right control mechanisms and business operating tools. This gives everyone clear guidelines what they should be doing and what will happen if tasks aren’t completed properly

 

 

Your initiatives

 

As part of your strategy, you’ll be setting goals and initiatives. These may be for yourself, or for the wider business to get involved with. Whatever the initiative, it should be broken down depending on its size and the commitment needed to complete it.

 

Boulders

These are your big initiatives that will take the most time. A good example of a boulder would be a new product or service that you’d like to introduce

 

Rocks

These are the medium-sized initiatives. They take up some time, but they’re not necessarily enormous tasks that need huge teams and months to develop. An example may be creating an app or refreshed website for your business

 

Pebbles

Yes, you’ve guessed it, these are the smallest of your initiatives. Things that you need to get done but that won’t be all-consuming. A new hire might fall into this category.

 

 

Your people

 

We all know that a business is nothing without its people. In EOS, there are two roles that are absolutely vital if you want success. You’ll need to carefully consider who takes on which role, as well as anything they might need from you in order to fulfil the role to the best of their ability.

 

The visionary

Ideally, this will be your role as the business owner. It involves coming up with new ideas for products and/or services your business can offer. The operators – your team – are there to support you by being experts at their jobs and helping to bring your ideas to life.

 

The integrator

This person brings order to the chaos you create as the visionary. They should have a wealth of experience to provide support that helps with real, measurable business growth.

 

 

Your main consideration is to understand how your whole team will fit together to make sure each area in your strategy gets the right support at the right time.

 

However, it’s also important that your people are given the right level of autonomy throughout the process. This can be a delicate balancing act, but when you have the right people in the right roles, navigating the rest shouldn’t be too difficult.

 

 

Anything else?

 

EOS doesn’t use many traditional benchmarks, but it does leave room for your business to create its own unique culture and systems that most accurately reflect the company and its values.

 

An official EOS implementer is a popular choice for businesses that want to benefit from another level of accountability and direction. This is someone who works directly for EOS and will – at extra cost – come into your business and set up the whole process for you.

 

This could be a good choice. It means you’re able to commit fully without wondering if you’re doing everything the right way…

 

While this isn’t a program that will deliver fast results, its potential to improve everything from a business’s culture to employee mindset and even business growth is enormous.

 

If you’d like any help or advice on how your technology can work alongside EOS, or you’d just like to discuss your IT requirements, we’d love to talk. Get in touch


The business owner’s briefing: Reduce the burden on your brain

Focus more, be interrupted less… and get stuff done
When you’re a business owner or manager, you have a lot of responsibilities. There are also
many people who want to speak to you throughout your working day.
Unfortunately, that means that you may be interrupted more often than you’d like. And you
have to split your focus on things you’d rather give your full attention to.
It can be a big frustration.
Many business owners and managers feel this way. You are not alone!
It’s not to say that you don’t want to help out or that you haven’t got time for people. Of
course, you still care! These are your people here to help you succeed.
But sometimes wouldn’t it be nice to just sit down and complete something without being
side-tracked?
Understand this: The more things you have to switch between during the day – and the more
unscheduled interruptions – the greater the burden on your brain.
It can lead to a feeling to total cognitive overload by the end of the day.
You’ll recognize this as getting home in a bit of a daze, and feeling like you don’t have enough
energy for your family. It’s a horrible feeling.
Fortunately, the past couple of years have given us all the productivity tools that we need.

There are five key areas to focus on:
• Scheduling
• Planning
• Workflows
• Automation
• Focus

This briefing will show you some solutions that other business owners and managers rely on.
They’re all included in Microsoft 365, which means some of them integrate with other 365
apps you use.
Of course, not every tool mentioned here will be suitable for you. Not everything will fit in
with the way that you like to work, or the way that your business runs.
But if you can use just one or two of these tools to relieve your brain of some of its burden,
that’s a great start.

Scheduling
Let’s start by looking at your calendar. Get your calendar right and that can eliminate many of
your productivity issues in one go.
Whoever you’re meeting and whether it’s by video call or in real life, your calendar needs to be
organized around how you personally best work. In other words, let your calendar be a slave
to you, not the other way round!
Microsoft Outlook offers lots of features that make scheduling easier.
For example, you can use the Scheduling Assistant and Room Finder to help you
coordinate the right attendees and find a meeting room. There’s even an AutoPick feature that
can work out the most suitable time and date for everyone.
For virtual meetings, use Teams. There are so many useful tools built in to make your
meetings more productive.
Another great tool for managing your diary is Bookings. This not only allows you to share
your schedule so people can book their own appointments with you, but it also lets you
customize the types of meetings or appointments you hold most often. That means the app
will automatically block out the right amount of time, and arrange the best location (whether
virtual or real) for each meeting.
Bookings will copy all the details across to your Outlook calendar too, so you’re not forever
switching between apps to know what’s next.
Our pro tip: In Bookings, set scheduling policies so your entire day’s calendar isn’t open to
other people. For example, if you prefer to meet in the mornings and focus on other work in
the afternoons, you’d only let people schedule morning meetings.
Two other pro tips on scheduling. The first can help to eliminate constant interruptions from
your team. If that’s an issue for you, then schedule time every day where you are free to chat
– “Ask Me Anything”, if you like.
This could be just 30 minutes a day. It works best when it’s the same time each day. And you
have to be strong to push back on non-urgent interruptions outside your daily Ask Me
Anything.
Our other pro scheduling tip could be a real game changer for you.
Schedule time for important tasks that you want to complete without interruption in the
same way you’d schedule time for a meeting. Block it out of your diary and make yourself
unavailable.
It’s such a simple idea but a powerful one.

Planning
One of the best ways to keep on track with what you need to be focusing on is to plan each day
well.
You’re probably used to doing this already to some degree, but you can take your daily
planning to the next level.
Start each day or week by creating a detailed to do list. Microsoft’s To Do app is a favorite
way to create a list and keep on top of it.
The additional features really make this tool a necessity. It allows you to track, organize and
prioritize all of your tasks each day. But that’s not why it’s so good.
Each task can be broken down into steps, and you can even create checklists to drill into
details. And here’s the really great part – you can assign tasks to members of your team, send
them reminders, and see what progress has been made.
That saves you time checking in with colleagues to see how they’re getting on, or chasing them
on email.
Pro planning tip: When you’re making your plans each day, you’ll probably notice some of
your tasks could easily be completed by other people. Don’t forget to delegate whatever you
can, and if you need to, find experts you can outsource the things you can’t handle in-house.
There are thousands of people out there waiting to do tasks for you on platforms such as
Fiverr and Upwork.

Workflows
When everybody knows what they’re supposed to be doing, there’s far less room for confusion.
And when your people have a clear, well laid-out plan to follow, they’re less likely to need to
interrupt you to check details. It’s all there for them to see.
Planner is a fantastic tool for this (in some 365 subscriptions it’s now being integrated into
Teams, and is called Tasks by Planner).
Yes, there are lots of project planning tools available, and honestly, they mostly work in a
similar way. Planner is really easy to use. When you’re trying to save time, that’s a big deal.
Planner allows you to create projects and include all the people that need to be involved. You
create plans, buckets, and tasks, and can assign things to people where you need to. Any time
you make an update to a plan, the right people are notified, and there’s an in-built calendar
that lets you see due dates at a glance.
One of the really great things about Planner is that you can track your time and progress on
each task or project. Reports will detail how much time was spent on each part, which allows
you a better level of planning for future projects. It also saves you lots of time when it comes
to compiling and creating your own reports, it’s all done for you!
If you spend a lot of your time working on or overseeing projects, Microsoft Project might
be a better solution.
This tool helps to take things to the next level, allowing you to set up dynamic scheduling,
based on things like team members involved and the level of work required. With Microsoft
Project, you are able to create the dashboard that suits the project best, and take a deeper look
at each stage of the task.
You may need to pay more to access it.
Pro workflow tip: Get your team to take responsibility for their own projects, overseeing
their own workflow. This will help relieve some of your burden and give them more
responsibility.

Automation
One of the biggest tools at your disposal is automation.
Automating tasks that take up a lot of your time or are repetitive can save you hours every
week. And it can do the same across your entire business.
One of the best apps to help you get started is Power Automate.
This tool lets you automate many of your business functions, from data entry and reporting, to
processing forms and even invoicing. It can even make recommendations on the tasks you
could automate to make your life easier and to make you much more productive.
Everyone in the business can use it. You simply create ‘flows’ using the simple low-code drag
and drop tools, along with pre-built connectors. It also connects with your other apps and
services within Microsoft. It can even monitor your social media accounts, posts, and form
entries to capture and analyze data and trends.
If you’re not already using this tool, you’re wasting a lot of time on tasks that you don’t
personally need to be doing!
Another great thing about Power Automate is its ability to extract information from print and
digital documents, which can make things like processing paper invoices easier.
It’s a tool that every business needs to look at. There will be several functions you can use.
Pro automation tip: Power Automate allows you to link together two apps using connectors.
This means information can be copied from one app to the other. Which can save you and
your people having to enter data multiple times across different applications

Focus
If you find it difficult to focus on tasks without being interrupted, Focus Assist is for you.
It allows you to silence all digital interruptions for a set amount of time.
You may have already used it in some capacity, but in Windows 11 the feature has recently
been updated to make it even more useful.
In Windows 10, Focus Assist gave you the ability to minimize the notifications that would
distract you from the task at hand, but it needed to be switched on to work.
The updated version provides an integrated focus timer, which gives you greater control over
how and when notifications should be muted.
There is also a new do not disturb feature in Focus Assist, as well as the ability to simplify your
start menu, and clean up your taskbar.
Pro focus tip: If there are notifications you really don’t want to miss, set up priority
notifications under Do Not Disturb. That way you’ll never miss something vital, or a
personal message.

How we can help you more
Of course, there are countless other applications and tools that you can use as part of, or
alongside your Microsoft 365 subscription. Here we’ve highlighted some of the tools that
many business owners and managers find most useful.
Hopefully, you’ll finish this briefing and be raring to go, trying out applications to help reduce
your own cognitive load, but also to boost the productivity of everyone in the business.
It’s not always easy knowing where to start, and which tools might be the best option for your
specific circumstances.
If we can offer you any help or advice, we’d love to assist. Just give us a call.


What could digital IT transformation do for your business?

As an ambitious business owner, you’re always looking for new ways to help your business develop, improve, and grow, no matter how successful it already is.

 

You’ll also want to improve the experience for your customers.

 

And of course, you’ll be aware that your IT infrastructure plays a big part in this growth and the overall experience.

 

That works both ways. Sometimes it’s that same infrastructure that can limit how your business evolves. If you’re running older systems, or perhaps systems that don’t fully meet your needs, growth can be held back.

 

This is where digital IT transformation comes in.

 

Maybe you’ve never heard that term before. Or perhaps the concept is new to you.

 

Here’s a one line explanation:

 

Digital IT transformation is about using modern technology to create or modify business processes, culture, and customer experiences.

 

It involves a complete reassessment and overhaul of your technology, with the goal of improving the efficiency and delivery of your products or services.

 

We can make this easier with a few case studies of how big businesses you’ve definitely heard of, used digital IT transformation. Just because these are big names doesn’t mean it isn’t relevant to you… this is for all businesses, of all sizes.

 

 

Netflix

 

Are you old enough to remember when Netflix’s business model was based on direct mail?

 

They’d mail their customers a DVD. Customers would watch it, post it back, then wait a few days for another DVD to arrive through their letterbox.

 

Of course, Netflix led the way to the streaming world we enjoy today.

 

That was digital IT transformation. They used technology to flip their business model on its head.

 

This has not only improved customer experience (now you wait seconds instead of days for a movie), but it’s also increased customer loyalty too. As of March this year, Netflix has a market value of $168 billion.

 

 

Lego

 

Believe it or not, in 2004, Lego was on the brink of bankruptcy. This pushed the company to start its digital IT transformation journey, which is still ongoing today.

 

First, Lego digitized its supply chain processes, which allowed it to gain more insight into production delays and manufacturing costs.

 

Then between 2008 and 2016 the company centralized its HR applications, moved to a digitized shop floor system, and streamlined its decision-making processes.

 

To improve customer experience, Lego added mobile apps, games and even movies to its products. The first Lego film generated an additional $467 million in revenue (off a production budget of $65 million).

 

 

Kodak

 

When you think of Kodak today, you think of a dead camera company.

 

As the digital revolution took hold at the start of the century, cameras evolved from using film to storing photos digitally.

 

Kodak held firm with film (despite inventing the first digital camera!) under the impression that launching a digital camera would cannibalize its existing business.

 

Which we now know was not the case. Kodak’s failure to digitally transform at the right time led to the company losing a lot of money, and bankruptcy in 2012.

 

Eventually, after a big financial loss, Kodak took the step towards digital photography, but it was too late.

 

 

Of course, these are extreme cases and big famous businesses, but they highlight just what a difference embracing digital IT transformation (or failing to embrace it) can make to your business.

 

There are 4 main areas of transformation that you need to consider:

 

 

1. Process transformation

 

This is most appropriate when a business needs a radical transformation.

 

It can modernize your processes, integrate new technology, and save money, while still incorporating your core systems.

 

Process transformation can result in the most drastic changes to your business.

 

Before you begin, and to help decide whether it’s the right step for you right now, you need to ask yourself what your goals are for transformation:

 

· Do you need to upgrade your systems?

· Will you need to bring in new technology?

· Will you change your processes to a new structure?

 

It’s really important to set baseline metrics when deciding on process transformation. These will help you understand if the transformation is a success.

 

So, as well as setting new KPIs (Key Performance Indicators), you should also set baseline metrics based on your expectations of the new structure, and the typical results of your old structure.

 

Include things like time, cost, errors, and downtime suffered.

 

You should involve your team in this process. Ask for feedback on how your current system is working, it’s benefits and drawbacks.

 

Find out how the people using the systems would make improvements, and how their jobs could be made simpler. What would they like to see in a new system? How can they see new processes improving their role and making them more productive?

 

This kind of feedback can give you the most valuable insight into how your systems should be working to make the biggest improvement.

 

And before you embark on process transformation, you should create an ideal workflow path. This will help you identify the areas that you need to focus on first, and to really understand both the system tasks that take place, and the human element too.

 

 

2. Business model transformation

 

As we saw in the case studies, it’s possible to adapt or even completely reinvent your current business model to open up new opportunities for growth.

 

Never has this been more evident than in our post-pandemic society. Covid-19 really changed the way we think about customer experience and digitization of products and services.

 

As businesses we were forced to make quick decisions and digitally transform practically overnight. And although there was some tweaking along the way, we learnt a lot about the barriers that are actually in place to prohibit change, and those that we place there ourselves – you just need to look at the way the healthcare industry quickly overcame privacy concerns when it shifted to virtual appointments.

 

Not every business model transformation needs to be at the level of Netflix. It could mean something as simple as using data to offer customers add-on products and services that complement what they already buy, and the needs they’ve communicated to you.

 

 

3. Domain transformation

 

This is not necessarily the most commonly used area of digital IT transformation, but it’s worth your consideration.

 

New technologies have the ability to redefine your products or services in a big way. A good example of this is the way Amazon moved into a new domain with AWS (Amazon Web Services). AWS is now the most popular cloud service provider in the world.

 

While it wasn’t an obvious move for Amazon to dip a toe into the cloud computing industry, it was able to leverage services it already used – in this case, massive storage capacity – to create a brand new offering to its customers.

 

Lego also did this with its expansion into film and gaming.

 

Think about the products and services you already offer. Is there anything that you currently use that could be leveraged to offer another product or service?

 

 

4. Organizational transformation

 

It’s crucial that if your business spends time and money updating its technology and designing its processes and products, that its internal values and behaviors evolve to mirror this change, too.

 

Failure to get buy-in from your people could result in the complete failure of your transformation, even if everything else is primed to work. Just a little resistance can mean adoption of your new technology is slower than it should be.

 

And you don’t need us to point out that the result of this would be a loss of revenue, productivity, and potentially even your people.

 

Make the time to clearly communicate your vision for transformation. Do this regularly. Involve your people in the processes, and ask for – and importantly, listen to – their feedback along the way. Everyone should understand the risk and why it’s worth taking.

 

 

The rules

 

Regardless of your sector or industry and your current infrastructure and systems, any digital IT transformation strategy has 3 very important rules:

 

Rule 1: You must modernize your existing critical IT infrastructure if you want to increase efficiency and your management overheads.

 

Rule 2: You must automate your IT processes if you want to reduce risk and accelerate provisioning and deployment of applications. This includes automating the delivery and use of IT services.

 

Rule 3: You must transform your IT processes and operations if you want to align your IT goals, your staff, and their roles.

 

 

Of course, this is a very brief overview to a process that can be extremely complex.

 

Here’s a great quote on this, from transformation scientist George Westerman:

 

“When digital transformation is done right, it’s like a caterpillar turning into a butterfly, but when done wrong, all you have is a really fast caterpillar.”

 

That means, without the right investment from you, digital IT transformation just won’t happen. You need to have the right systems in place, but if you don’t know how to use them properly, you haven’t really transformed anything.

 

Ready to talk about this for your business? Let’s arrange a no obligation conversation to run through all the areas that will be most important.


Russian cyber-attack threat: How to protect your business

The ongoing Russian invasion of Ukraine has led to a sharp rise in cyber-attacks.

And while many of the attacks are between these two countries, there is very real potential for other countries to fall victim to cyber-attacks by Russia, thanks to the sanctions placed upon it.

President Joe Biden’s declared the government has been improving national cyber security defenses for some time now.

They’re focusing on the infrastructure to make sure that water, electricity, and oil pipeline services aren’t at increased risk of attack.

The White House has also issued a warning and some very good cyber security advice to all businesses.

There are a series of actions that businesses should be taking immediately to protect themselves against cyber-attacks, and other data security risks.

To start with look at implementing multi-factor authentication. This is where you generate a login code on another device, to prove it’s really you logging in.

Data backups should also be checked on a regular basis. Ideally there should be a copy of data that cannot be changed during a cyber-attack.

All data should also be encrypted, meaning it would have no value and be unusable if anyone did manage to access it.

It’s also a good idea to have an emergency plan ready to go that will help mitigate any attack quickly and effectively.

Businesses are also being advised to give their staff training to help them spot and avoid the common tactics used by cyber criminals.

These include phishing attacks where they send an email pretending to be someone else. And spoof login web pages, where they hope you will enter real login details in error.

If you have an IT support partner already, speak with them to make sure all of your systems are fully up-to-date and patched as necessary.

They can also help you to audit how well you’re performing with the items above, and get a plan in place to help you respond to an attack or attempted attack.

If you don’t have an IT support partner – or you feel your current one isn’t able to help you with your data security, we can help. Call us.


Your essential cloud migration strategy checklist

If you’ve ever considered moving your business’s data and applications over to a cloud-based solution, you’d be forgiven for breaking out in a cold sweat and forgetting about the entire thing.

It’s complex. And there’s a lot that can go wrong from increased downtime to data loss or things not working as they should.

But when you get it right, the benefits are countless. They can include big cost savings, increased security, and better scalability. Not to mention access to extra features that may be available.

Download our brand new guide to see how your business would benefit. It includes an essential cloud migration checklist.


Printing devices are often overlooked when it comes to security. But the reality is, cybercriminals can hack your printer to get confidential information

Your printer is probably the last piece of computer equipment you thought needed protection from cybercriminals. But the truth is very different. Attackers actively try to locate the weakest links in security to gain access to and exploit valuable data. And among the weakest links is the printer. The thing with printers nowadays is that they have access to your devices, network, and the internet. This new open-access functionality makes them an ideal target for cyberattacks. Unfortunately, many business owners overlook the importance of securing their printers and mainly focus on computers and mobile phones. Most people still perceive printers as internal devices that serve basic functions. For this very reason, they are an easy target for cybercriminals. Other than performing unauthorized print jobs, hackers can access confidential information as well as all connected computers and networks all through a printer. You may also not be aware of the amount of valuable data your printer can store about you – tax files, bank details, financial records, employee information, personal information, etc. All a hacker needs to do is get into the operating system of your printer, and they can collect this sensitive data. If you’ve just realized the importance of securing your printer, keep reading. This article shares eight tips to help you do just that.

TIP #1. MAKE SURE YOUR PRINTERS ARE CONFIGURED CORRECTLY

Many things can make a printer vulnerable to cyber threats and security breaches. So, you want to get the basics right to ensure the attacks don’t happen to you. To start with, make sure to change the default password on your printer. Since anyone can access a printer remotely, a simple “123456” code won’t suffice. Second, make sure you’re using your own router to print files remotely. Never connect to “Guest” networks.

TIP #2. INSPECT PRINT TRAYS REGULARLY

This one is a no-brainer, but everyone could use it as a reminder. Make sure to check your print trays and get rid of unused pages carrying sensitive information. There’s no easier way to prevent data leaks than this. Alternatively, you can get a shredder for your office and shred the papers you don’t want anyone to see.

TIP #3. INSTALL MALWARE AND FIRMWARE UPDATES

Invest time and effort to ensure that your malware and firmware protection are up to date and can handle all types of hacks. The good news is that many printers come with pre-built malware protection. HP, for example, installs the HP “SureStart” software in their printers that monitors approaching targets when the printer is on. The software can shut down the device if an attack comes its way. This is a great way to prevent attacks from spreading further within the network.

TIP #4. LIMIT ACCESS TO THE NETWORK

Unprotected printers in a network are an extremely easy target for cybercriminals. Sure, businesses and offices require printers to access networks to perform remote prints. But if you can do the job by disabling the network access, make sure you do that. If not, tweak the printer and network settings to only allow the device to take print jobs from the network you trust. This will help avoid outside interference and security breaches.

TIP #5. UPDATE YOUR PRINTERS

Updating a printer is equally as important as updating your phone to the latest software. Much in the way iOS developers look for bugs and fix them in a new update, printer manufacturers work toward known device vulnerabilities and update the software for added protection. Look for printer updates so you can easily overcome known threats to the printer. Ideally, update your printers every quarter to get the most out of the security benefits.

TIP #6. INSTALL A FIREWALL

If you run an office, chances are you already have a firewall. But in case you missed this requirement, now’s the time to do it. Using a reliable firewall helps keep printers safe from cybercriminals. Your computers most likely come with pre-built firewalls, and all you need to do is keep them enabled. But there are also specialized firewalls for homes and offices that offer advanced security and make it virtually impossible for anyone to break in.

TIP #7. ENCRYPT YOUR STORAGE

Printers with shared networks can perform distance printing. And when a print job is in transit and travels from a computer to a printer, hackers can intercept the data and exploit it.

To keep this from happening, encrypt your print jobs. Also, make sure the sensitive data on your printer’s hard or internal drive is encrypted as well. Keep in mind that when you print a document, that file is often stored as an image within the printer and makes it an easy target for hackers. It’s why you should use an encryption tool to protect your data. Luckily, many modern printers have this tool pre-built. You can use the tool to set up a secure password that allows printer storage encryption, remove user IDs and ex-employee access, delete documents from the print queue once they’re printed, and much more.

TIP #8. EDUCATE YOUR EMPLOYEES

If you work in an office, chances are you aren’t the only person using the printer. Everyone that has access to it needs to be aware of the responsibilities that come with its usage. Make sure to talk to your employees about ways to ensure both the physical and virtual safety of the printers. Your staff should also be careful when using their mobile devices to print, as smartphones are easier to hack. Explain to them what phishing scams are and how they can avoid being the victim. Finally, make sure it’s clear to them how they can use confidential information in your company

IT’S TIME TO ENSURE PRINTER SECURITY

Printers are the most overlooked devices when it comes to security. Given how most business owners consider them as merely internal devices whose sole function is to print documents, it’s no wonder they are a weak spot security-wise. Whether you use printers in your office or at home, take a moment to see how you can enhance its security before your next printing job. As cybercriminals are a growing concern, each of us is responsible for protecting our data. Luckily, the tips from this article will help you bring your printer’s security to another level. If you need more insight into protecting the security of your printers, get in touch with us today. We can set up a 10-15-minute chat to discuss how you can implement these changes and keep cybercriminals away.

Article used with permission from The Technology Press


Two thirds of remote workers use a faulty device, so they don’t get into trouble

Spilt drink on computer

A new report has discovered that 67% of remote workers are using faulty tech when they work remotely.

 

And often that’s because they’ve accidentally damaged the tech themselves… they don’t want to admit it to their boss in case they get into trouble.

 

A company that sells refurbished technology surveyed 2,500 employees.

 

It found that laptops were most likely to be broken, followed by keyboards, monitors, and PCs.

 

Most of the time the damage was done by spilled food and drink. Other causes of damage included other people in the house – such as a partner or housemates – and of course, pets.

 

We’ve all watched in horror as a cat brushes up against a full glass of water next to a laptop…

 

While more than half of people try to fix the damage, and 81% of people continue to use their faulty device with limited features, a third of workers switch to their personal devices instead.

 

As well as this causing a loss of productivity, it could also be a huge data security risk for your business.

 

Because it’s possible their personal laptop doesn’t have as much security protection as their work laptop does, such as:

 

· Security software

· Data encryption

· Enhanced password protection such as multi-factor authentication

 

 

Their personal devices also aren’t being monitored by your IT support partner.

 

When an attacker gains access to an unmanaged device, if it’s connected to your network, it’s possible they can get access to the wider network, and all of your business’s data.

 

This can result in your data being stolen and sold. Or worse, your data being encrypted so it’s useless to you – and you must pay for its return. This is called a ransomware attack and it’s the greatest cyber security threat to your business right now.

 

It’s not just access to your data that’s the problem. After a ransomware attack, there is a huge time and financial cost involved in making sure your network is clean, protected and secured.

 

Our advice is to make sure that everyone in your business understands the risks involved with using personal devices for work purposes, whether they work remotely or not.

 

You might want to make a golden rule that all work must only be done on business devices.

 

You could also create a culture where it’s OK if a device gets damaged, so long as it’s reported quickly.

 

If you need any help choosing the right technology or cyber security approach for your team, or creating new policies to help your staff choose to do the right thing, give us a call.


The 7 KPIs for ROI from IT

How to ensure your business’s spend on IT is an investment, and never an expense

No matter what kind of business you run, technology sits at the heart of it today. And it’s going to become more and more important in the future.

Big business thinkers see IT as a long-term investment. They understand the correlation between the short-term impact to cash flow, and the enormous long-term benefits of business growth, increased productivity and highly satisfied staff and customers.

To get your Return on Investment (ROI) there are several Key Performance Indicators (KPIs) to track. Our new guide tells you what they are.


The security problem of John’s “other” laptop

How to keep your business’s data ultra-safe during the Work From Home revolution

Working From Home and hybrid working are here to stay. And that means as businesses, we need to get a grip on security in our staff’s homes as much as we do in the office.

We’ve written a new guide to look at all the issues.


Defend and invest: Your technology strategy for 2022

Did you get a short break at Christmas? Even if it was just a few days, that break can give you a clear mind about where to take your business this year.

We call this the January Refresh & Refocus.

Let us tell you the two technology areas that will be the most important in 2022. They are Defend and Invest.

Defend is about protecting your business from cyber criminals. We believe cyber-crime is going to rise again this year, to levels never seen before.

Invest is about making sure technology is powering your business forward, not holding it back.

Our new guide looks at both these areas in detail.


Here’s a crazy question: Are you paying your IT support partner enough?

I bet that’s a question you’ve never asked yourself before…

But it’s important you do. Because in the world of technology, there’s a definite link between what you pay, and the quality of the service you receive.

Picking an IT provider on price alone is a false economy. If you’re paying too little, you’re running one of four big risks.

Find out what they are in our brand new guide.


Windows 11: The wait is over

All the benefits of using the very latest version of Windows in your business

After a four month wait, a brand new version of Windows is finally here. It’s a lot more secure, has better functionality and greater possibilities.

And it looks beautiful.

New PCs are now on sale with Windows 11, and the upgrade will be available for existing computers early next year.

Not all machines will be able to upgrade. There are tough hardware requirements.

We’ve listed them, plus the best benefits of the new Windows, in a brand new guide. It’s written so anyone can understand it.


Be prepared: Sooner or later your business WILL be attacked

5 steps to improve your ransomware resilience

Ransomware is the most terrifying data security threat your business has ever faced.

Imagine all your staff trying to login one morning. But all of them get a bright red screen saying your data has been locked away, and you must pay a huge ransom in Bitcoin to get it back.

Terrifying.

Read our new guide now. We’ll answer all your questions about ransomware. Plus, you’ll discover five steps to improve your business’s ransomware resilience.


If your IT support company is ALWAYS fixing your technology… it’s time to switch

Improve profits with your IT partner’s Proactive Problem Prevention

Just fixing technology when it breaks is so 2010. These days most businesses prefer an IT partner who proactively prevents problems from happening.

If you don’t have this, you really need to read our brand new guide. You’ll see the countless benefits for your business of a more proactive approach to your IT.


10 apps you didn’t know you had in Microsoft 365

Boost productivity, save time, and improve customer experience

Most people see Microsoft 365 as the place to access Word, Excel, PowerPoint, and Teams.

But there’s so much more to it than that. There are so many apps bundled in, that whatever productivity problem you have in your business right now, the answer could be within 365.

Get our new guide. And we’ll tell you about 10 useful Microsoft 365 apps you didn’t even know you already had.


The biggest security threat to your business is on your payroll

Revealed: The real cost of insider attacks – and your strategy to prevent them

The chance of your business’s data being breached by an inside attack is high.

Most inside attacks are accidental. A well-meaning employee clicks on a bad link by mistake.

But there are some attacks caused by malicious attackers, deliberately looking to do damage, or make money.

Both of these kinds of attacks can be prevented and minimized by focusing on five key areas in your IT strategy.

Read our new guide now to assess how prepared your business is.


These are the threats to worry about

An easy to read guide to the 9 most terrifying types of malware

All businesses are being targeted by malware, all the time. And it’s estimated there are now one billion pieces of it out there.

What is malware? It’s malicious software that’s been designed to do damage to your IT systems or steal your data.

Malware terrifies most IT professionals. And it should terrify you too.

We’ve written a brand new guide to tell you about the nine most common types of malware. It’s been written so anyone can understand it.


Crisis: Your office is on fire

This is something none of us wants to experience. But it does happen.

There’s a small fire in your office. No-one is hurt and everyone is safe. But the damage to your workplace is unbelievable.

The flames. The heat. The smoke. And of course, the huge amounts of water used to put out the fire.

Here’s a good question – if there had been a fire in your office last night, what would you wish you’d got round to doing yesterday?

Think about all your computers and specifically the data on them. Is your data as protected and backed up as it could be?

Are you triple sure of that?

Read our brand new guide now. It’ll show you the things you need to make a priority to keep you protected from any disaster.


Cyber-crime: Your business’s 5 step plan to prepare and protect

Two years ago, two thirds of all organisations reported some type of incident relating to cyber-crime.

That’s bound to be higher now because of the fraud opportunities created by the rush to Work From Home.

In fact, overall, the world economy loses more than $1 trillion to cyber-crime every year.

It’s a figure that’s increased by more than 50% since 2018.

Fact: Your business needs to be as prepared as it can be against the threat of cyber-crime.

Read our brand new guide now. And you’ll see our recommended 5 step plan to prepare for an attack, and protect your business.


Repair or replace? 7 signs that you need a new computer

It’s always tempting to hold back on purchasing new IT equipment. Yet it can sometimes cost you more if you hang onto equipment for too long.

Did you know that if a device is more than 3 years old it’s cheaper to buy a new one?

It’s all about getting the balance right. Between equipment that can be repaired and will happily last another couple of years – versus slow, unproductive equipment that really needs to be replaced.

Read our brand new guide now. And you’ll learn 7 signs that will tell you whether you need new computers.


The top 5 questions you could ask us, that we’d love to say ‘YES’ to

The pandemic made hundreds of businesses round here question the quality of the IT support they were receiving.

We’ve been very busy recently talking to businesses, and onboarding new clients as their IT partner.

There are five questions that you could ask us, and we’d be delighted to answer with a very positive YES!

So, we’ve put them into this brand new guide. Download it instantly.


Your 2021 productivity super guide

Ready to make this a wildly successful year for your business?

To shake off the memories of 2020, and focus on increasing sales and profitability? Excellent.

A great place to start is helping you and your team to get more done in less time.

We’ve pulled together a productivity super guide, looking at setting goals, collaboration, and communication. And of course, it lists our most highly recommended productivity tools.

Download your guide instantly.


5 key IT areas you must address in your business’s 2021 growth strategy

All business owners and managers hate it when their staff’s productivity goes down.

Bad IT is often used as an excuse to start talking and stop working! So, now’s the time to make sure it can’t have a negative effect in 2021.

(it’s going to be a challenging enough year as it is)

You and your team could be more productive, more motivated – and ultimately make more money – with some changes to your technology strategy.

We’ve created a new, free guide to show you the 5 key things you must include in your IT strategy (number 3’s the one your staff will be delighted to help with).

Download it instantly – right now.


4 signs you’re under attack from ransomware

A ransomware attack is one of the most terrifying things that can happen to your business.

This is the computer attack where a hacker locks you out of your systems and data. And you must pay a ransom, typically in Bitcoin, to get access again.

What most people don’t realize is that hackers access your system weeks before they launch the attack. It takes time for them to set it up, and prevent IT security experts from helping.

So, there are signs to look out for – ways to spot if your system has already been breached, and an attack is imminent.

Download our brand new guide and know how to keep your business safe.

Download Guide


This is the ultimate secret to keeping your business data safe

Hackers are targeting all businesses, all the time. Using clever automated tools, and by sending out billions of emails every day.

It only takes one person to click on one bad link… and hackers can get into your system.

That’s why we’ve written a brand new guide. To tell you about the ultimate secret to keeping your business data safe.

You won’t believe how simple it is. Download your copy now.


Evongo securing Geelong businesses with quality IT security services

Is your Geelong small to medium business looking for trusted IT security services that will ensure the safety and wellbeing of your technology and data systems? Evongo is here to help. Our expert team of IT professionals are trained and fully equipped to safeguard your business from some of the biggest challenges they are facing today including malicious intrusions, external attacks, angry former employees, and identity fraud.

As a small business ourselves, we understand the multitude of concerns that businesses encounter. From managing a team of employees and marketing to hitting KPIs and making a profit. Often times, maintaining the general IT security of your business can be is the last thing on your mind, when in fact it is absolutely pivotal to its longevity.

Without professional and tailored IT security solutions, your business is vulnerable to network break-ins, theft of private information and data, as well as the financial well-being of your business.

Evongo’s services in IT security help to protect your business against threats such as these by implementing secure web, email, and mobile device security systems, building firewalls, conducting penetration tests and vulnerability assessments, installing VPNs and data loss prevention technologies, in addition to enforcing workplace security policies. With Evongo’s expertise, you can assure the safety and long-life security of your Geelong business.

If you’re in a position where you believe your small to medium Geelong business could be at risk of IT attacks, then you must get in contact with us today on (03) 5228 3000 or visit us at Suite 7, 18-20 Riversdale Road Newtown.

We at Evongo pride ourselves on outstanding customer service and ongoing support and can provide completely tailored and flexible solutions to suit your business’s circumstance. We look forward to hearing from you soon.

Geelong IT Security Services - Evongo

Workplace Cybersecurity Policies Geelong

Workplace cybersecurity policies are crucial documents made up of various statements that guide employees behaviour in reference to the security of private company information and IT systems. Such policies are not reserved only for big corporations like Apple or Amazon but are important for small to medium Geelong businesses.

We at Evongo help your small business develop a strong workplace cybersecurity policy that provides a clear guideline to the employees within your business, and in turn, builds a secure wall against exterior cyber threats.

Cybersecurity issues, minor or large, can have devastating impacts on small businesses, such as the loss of confidential information and data. To avoid this, you must provide employees with a workplace cybersecurity policy.

These policies are developed under the guidance of the Australian government and aim to protect businesses against the following cyber threats:

As part of our cybersecurity policies, Evongo guides employees through key areas of consideration that include the reasoning behind automatic updates, backups, access control, and encourage a multi-factor authentication measure, which requires two forms of proof to allow access.

Contact us on 1300 765 975 and talk to our expert professionals to start developing your cybersecurity policy for your small business in Geelong today! Our team look forward to your call. 

Download the Australian Government Small Business Cyber Security Guide Here


Business dark web scan Geelong

Dark web scanning is the practice of scanning the dark web (the darknet) to find if any individual’s personal or corporate logins and passwords have been compromised. If you know, how to look, and where to look, on the dark web it is not uncommon to find compromised passwords for sale on the dark web. And it’s not just passwords. The dark web is a very murky place and is a rabbit warren of data. Blogs and forums, chat rooms, private networks and hidden sites.

Typically the higher the level the employee in a particular business the higher the exposure to risk for the business if this information has become available for sale on the dark web. Based in Geelong but working for businesses across Australia it is not uncommon for us to find compromised passwords for executives for sale on the dark web.

Business continuity and cybersecurity are the champions of protecting your business and often considered the front line in protecting your data. But what if your usernames and or passwords have been stolen and or compromised. How would you know? What are the best practices to protect you from the dark web?

At Evongo we regularly perform dark web scans here in Geelong for small, medium and large businesses. You would be surprised how often we find compromised passwords for sale. The dark web is a very murky place and is a rabbit warren of data. Blogs and forums, chat rooms, private networks and hidden sites.

Business accounts, stolen email addresses, passwords and usernames. You would be amazed at what you can find for sale on the dark web. With the potential for exposure to risk can you afford not to have a dark webs scan done?

Evongo also offer Geelong businesses reliable and advanced IT support.

If you would like to discuss getting a dark web scan done for your business and your staff,  give us a call now.


Remote home IT support Geelong

COVID-19 has changed the way the world does business forever. In a scramble to get employees set up to work from home, many employees are utilising their staff’s hardware and internet connections. Remote home access IT support is where we access your home computers from our offices in Geelong via remote access and provide all the IT support required. The remote support we offer may include but not limited to:

Personal home computer hardware is not without its risks. Old, outdated equipment, questionable software, potential Trojans are gaining access to your system, limited virus protection if any and limited internet access (varying Internet Service Providers ISPs). At Evongo, we can provide an effective audit of all elements to actively run your business from multiple home locations with limited risk.

We are ensuring secure connections and that all required software is running smoothly. And if there is an issue when IT support is needed, we can be online very swiftly to address any questions or concerns you have.

Post COVID-19 the world is going to be a very different place, and many businesses will be reviewing work placements arrangements. It is now given now that many companies Post Covid-19 will be having more staff working from home. A report in the New Daily has a headline stating “Almost half of the workforce to work remotely after Coronavirus“.

If like many businesses you are contemplating a workforce restructure and need to step your IT resourcing up a level call Rod and the team at Evongo. Geelong’s specialist remote IT, support team, keeping businesses and staff connected.


Working from home remote access to emails and files, Geelong

In these unprecedented times, due to the announcement of a pandemic because of the Coronavirus / Covid-19, working from home, access to emails and remote access to files is something we are regularly asked about by our local Geelong based businesses.

If you are an existing client of Evongo here in Geelong, then the odds are that we already have you well set up for remote email access and remote file access. If not, this is something we can organise promptly. Occasionally there may be hurdles; however, this is rare.

If you are not an Evongo client, we can also help. As the pandemic spreads and all indications are that it will, it will not always be possible to visit on-site, but with remote access capabilities today we may be able to assist.

While it is possible to set up the following as needed for working from home:

At Evongo, we would recommend that as a business owner, you act sooner rather than later so that you are 100% set up to operate remotely in a worst-case scenario. Be prepared as best as you can.

Working from home enables staff to continue to work while either self-isolating and or to allow social spacing and assist in delaying the onset of the pandemic.

Call Rod and the team now for an initial assessment of what they can do for you to assist you or your team members in working from home with full remote access for all your staff. It’s often more straightforward than you expect and once set up; it will hold you in good stead moving forward. At Evongo, we are your business continuity experts.


Business continuity and your business in Geelong

What is business continuity?

Look up business continuity online, and you will be overwhelmed by a plethora of definitions using terms that are designed to shock. ‘Critical’, ‘disaster’, ‘fire’, ‘recovery’, ‘incident’, ‘cyber-attack’,’ flood’ and ‘dangers’ are just some of the words you will be confronted with on the home page of Google when searching for “IT and business continuity.”

While this is alarmist, this is what can happen when you don’t plan for business continuity at an IT level. Sadly for many local businesses here in Geelong, these words only come to mind when it is too late. Regardless of what incident has the potential to cause you pain, if you are prepared for such an event or incident, then the pain will be minimal if at all. Your customers will be none the wiser and business continues as per usual.

Business continuity is your ability as an organisation to continue functioning relatively unabated should a critical incident happen to your Information Technology (IT) systems. Business continuity is about;

When it comes to business continuity, you need to rely on the three core elements

  1. People
  2. Process
  3. IT technology

At Evongo, we take the hassle and the stress out of your IT business continuity planning and implementation. We will develop the required plans by identifying vulnerabilities and critical data sets in your business. We can then implement state of the art continuity plans and processes so that in the event of an incident occurring to your business you can continue functioning and you the business owner can do what you do best and make money.

Evongo also offer Geelong businesses reliable and advanced IT support.

Call us now to discuss your business continuity needs in Geelong and surrounds.


Cyber security for your business in Geelong

No matter the size of your business n Geelong, small, medium or large, the threat of cyber attacks is growing. Cybersecurity for business (and not just Geelong) is something that needs to be taken incredibly seriously. We find that we are often called after a cyber attack has happened. As the adage goes, “prevention is better than the cure”. Calling an IT business to come in and do a cyber attack rescue is sometimes like calling the fire brigade after your house has already burnt down and you have no insurance.

Before we get into some cyber threats to consider this year, the best thing you can do is prepare your IT defences as best you can in advance. Contact an IT professional and implement simple processes and systems.

It’s very difficult to retrieve data from a backup that doesn’t exist.

Threats on the rise

Crypto Locking Ransomware

Ransom ware continues to be a major issue for small to medium businesses and you would be amazed at how many local small to medium businesses in Geelong have been impacted. The re is often this misguided belief that hackers won’t be interested in your small to medium business here in Geelong. Think again. You are wrong if you are complacent. These people aren’t doing this manually. Thye have bots scouring the world wide web looking for businesses like yours that are vulnerable. There has also been a move to crypto hacking. The art of hijacking (unauthorised access) to your computer to aid in data mining for cryptocurrency.

Cyber security shortfalls

The advance in techniques adopted by cyber-attacks is growing rapidly and unless you are monitoring and aware of advances being made by these malicious cyber attackers you may be left vulnerable and exposed.  IT security is not a set and forget checklist item for your small to medium business. It is 24 hours a day seven days a week. Bots don’t take weekends off, in fact, they never take a break.

When security patches are released you need to activate them as soon as possible. Ideally, within a 30-day window as a worst-case scenario. It very hard to update a patch sometimes when you are too busy to be aware that a security patch has been released. (Windows 7 will create an entire raft of issues for those that have to update after Windows 7 End of Life)

The disgruntled employee

A disgruntled ex-employee may still have access to proprietary and confidential data or even worse a current may be logged in to areas when unauthorised or logging on to restricted computer files? Staff are downloading new applications on systems they shouldn’t be. You need to talk with your IT professional. This is not something again that can be monitored internally. The threat here is real and needs to be considered.

The Cloud is safe. No need to worry

Again, you can’t be complacent here. The cloud is not safe and your small to medium business needs to be prepared and following processes and protocol. At the end of the day, it gets down to awareness and process. Back up your files offline regularly. Are you using cloud-based services, are you using layered.authentication? Be aware it’s not straight forward. It needs to be considered.

Cybersecurity is a real threat for all businesses in the new millennium and calling an IT expert after you have been cyber-attacked can be too late.  Based in Geelong we service clients from all sizes of business in a vast range of business and industry categories. If you are concerned at your risk and exposure to cyber-attack call us now to discuss how we may be able to help.

 

 

 


Windows 7 End of Life

Does my Geelong business have to upgrade from Windows 7?

The definitive answer is YES. Stop running Windows 7 and upgrade.

Windows 7 was released back in 2009 at the same time that Windows Server 2008 was released. It essentially was released to get on top of many issues with Windows Vista which had not been received well for a variety of reasons. The release of Windows 7 and Windows Server 2008 was welcomed with open arms and generally considered a very successful improvement from Windows Vista.

When does Windows 7 stop working?

Windows 7 won’t stop working, it will continue to work however on the 14th January 2020 Windows 7 will reach its end of life phase (EOL). This essentially means Microsoft will no longer continue supporting Windows 7 or Windows Server 2008

If you continue to use either Windows 7 or Windows Server 2008 , you are leaving yourself and or your business wide open to exploitation. If new vulnerabilities are exposed your computers and or network can be exposed. The simple fact that Microsoft have been so vocal in declaring the EOL means hackers will be lining up to find those running these week and vulnerable systems and machines. Don’t leave your front door unlocked and wide open for Cyber criminals to walk right on in.

If you continue using Windows 7 or Windows Server 2008 you can purchase what is known as an ESU or Extended Security Update. This has a scaled cost and increases incrementally year on year. There may be a legitimate reason due to applications you may be running to maintain Windows 7 or Windows Server 2008, however the reality is that this will only apply in a very small percentage of business and maintaining Windows 7 and or Windows Server 2008 is not a long term option.
If you are a local Geelong based business or operate within the Bellarine or the Surf Coast you really need to give us a call.
Next Steps:

  1. If you haven’t already contact an IT professional (This is very serious and needs to be addressed)
  2. Replace outdated hardware
  3. Migrate existing devices to Windows 10. Update your software as an urgent priority

Evongo also offer Geelong businesses reliable and advanced IT support.

If you have any concerns or need more information call us now.


IT security services Geelong

In today’s increasingly interconnected world, IT security services are more important than ever and Geelong is not immune from the malicious hackers scouring the web. With the advent of the Internet of Things (IoT), we are more connected to the world via our devices – but this has important implications for privacy and security.

What is the IoT?

The Internet of Things (IoT) describes the network of connected smart devices, such as baby monitors, TVs, fridges, toasters and more, exchanging behavioural data with each other. On the surface, these devices aim to make our lives easier – but it’s important to remember the data exchange is not necessarily a one-way street.

How does it impact privacy and security?

With the increased connectivity the IoT and smart devices offer, comes increased risk of attack.

In order for these devices to help us, they need to watch or listen to what we do. However, if the devices are not fitted with encryption and the right security, hackers can gain access and control over not only the data, but the device itself.

In some cases, parents found baby monitors were being hacked to yell at sleeping children, and in a recent experiment, hackers were able to disable a cars accelerator through the entertainment system.

Do I need IT security services?

With our experienced IT security services team, Evongo here in Geelong can test and inspect your networks, technology and programs to ensure maximum data integrity and prevent the likelihood of hackers accessing your information.

By identifying potential weak spots, we can implement effective access control, technology and security policies to protect your business from potentially costly data breaches or attacks.

Please contact us to find out more about the IoT and if your IT security services are up to date.


The Notifiable Data Breaches scheme – what you need to know

Under the Notifiable Data Breaches (NDB) scheme, organisations and IT providers are obligated to notify individuals where personal information involved in a data breach and likely to result in serious harm. At Evongo, we are dedicated to protecting our clients and ensuring we are compliant with all obligations.

What are my obligations in the case of a data breach?

The Privacy Amendment (Notifiable Data Breaches) Act was passed in 2017 and requires organisations to:

The NDB applies to Australian Government agencies, credit reporting bodies, health service providers and businesses and not-for-profit organisations with an annual turnover of $3 million or higher. You can find out more via the Office of the Australian Information Commissioner website.

How can our IT providers protect your business?

Our trained specialists conduct vulnerability assessments and testing to understand potential points of weakness in your business, and install security frameworks and programs. We can:

At Evongo, we ensure all staff are educated and trained in the latest IT systems, data, access and protocols, and all staff policy documents are kept up to date – so we can help you protect your business and your data.

Please contact us for more information.


What you need to know about choosing the right Geelong IT provider

Is your current IT provider supporting your business the way you need? Here are some things to consider when choosing the right Geelong IT provider to help your business improve security, efficiency and processes.

Can your IT provider scale their services to meet your business needs?

At Evongo, we work with both large and small businesses and can adapt our processes, technology, training and support to meet the needs of a small team or an organisation with multiple sites. We make the effort to understand our clients’ needs, and tailor solutions to suit a vast array of industries, from manufacturing and construction through to financial institutions and not-for-profit organisations.

Do you have access to the latest technology?

Data and network security is a key factor when it comes to protecting businesses from the threat of fraud and costly data breaches. At Evongo, our experienced IT providers are trained in the latest data and networking technology, including cloud-based programs and mobile device management.

Does your IT provider offer training?

Implementing new technology and processes should be simple and cost-effective for your business. Your business will not benefit from new IT services unless everyone knows how to use them correctly, so training is an essential part of an IT provider’s service.

At Evongo, we have a fully flexible training program tailored to the specific, custom programs and technologies we implement as well as your specific business requirements.

Do you receive the support you need?

Technology is a vital part of any business, so it’s important to have the necessary support in the event of any issues. We have a range of support programs with the core focus of keeping your IT systems and technology functioning at optimum capacity so you can focus on growing your business.

At Evongo, we have more than 15 years’ experience as a leading IT provider in Geelong, tailoring high-quality, cost-effective solutions to help businesses maximise efficiency and productivity.

Please contact us for more information about how we can work with your business.