For more than 15 years we have been helping our clients achieve their business goals via our professional business IT support services, practical solutions and strategic technical advice. (more…)
Meta Title: Geelong IT Services Providers - Evongo
Meta Description: As experienced IT services providers in Geelong, Evongo is here to help your business. Get better results with IT support & custom IT system services.
SEO Friendly Title: Geelong IT services providers
Is your current IT provider helping or hindering your business? As experienced IT services providers in Geelong, the team at Evongo is here to help your business. From basic IT support to fully customised IT solutions, businesses get better results by partnering with Evongo.
Managed IT services
Simplify the management of your technology and keep things running smoothly with a managed IT services plan from Evongo. Our managed IT services are cost-effective and can be fully customised to suit your business requirements.
Implementing the right cloud services in your business can help you gain greater agility, lower your risks and reduce your costs. Evongo’s cloud specialists can help you migrate to the latest cloud technology with confidence.
Mobile device management services
Evongo’s mobile device management services provide anywhere, anytime access to everything your employees need while maintaining security and control of your mobile devices.
IT security services
Businesses need to take every precaution to protect themselves from both external and internal security threats. Evongo’s IT security services specialists identify and reduce risks and maximise data integrity.
Data networking services
The ability to exchange information quickly, easily and securely is a focal point for organisations of all sizes. Evongo can design, deploy and maintain a customised data networking services solution to suit your business.
Business continuity services
Gain peace of mind knowing that if an unplanned event happened, such as a natural disaster, technology failure, malicious activity or user error, you can be up and running again as soon as possible with our reliable business continuity services.
IT strategy planning services
Evongo’s CIO-level IT strategy planning consultants will ensure you align the right technology solutions to your business goals. We will help you avoid wasting time and money on technology by creating a clear path forward via a technology roadmap.
Hardware and software
Get the very best price on all the latest hardware and software technology through Evongo’s network of leading distributors and IT vendors. Our experienced team will help source the right products to meet your specific needs.
Meta Title: Our IT Services News - Evongo
Meta Description: Leading IT services providers in Geelong, Evongo stays up to date with technology and business IT services news across cloud computing, data networking services and more.
SEO Friendly Title: News from your IT services providers in Geelong
SEO Friendly Title: Recommended Technology Platform
At Evongo, we work hard to build what we call our ” Recommended Technology Platform”. We know that using products across this platform will give you a great platform to operate your business from (we know this because we “Eat our own dog food” and use ALL of the services below to run our own company).
Our engineers are trained in and keep up to date with technology across this core set of products to make sure that we can quickly, efficiently and expertly assist you with working with those products.
We also maintain a strong network of contract engineers that we can call on for specific expertise in high level or advanced customisation of these core services.
Recommended Technology Platform
HP Desktops & Laptops
Sophos Routers and Wireless
APC Power Systems
Microsoft Office365 (Exchange / SharePoint)
Microsoft Server Platforms (latest release including Exchange and SQL)
Microsoft Virtualisation – Hyper-V
Microsoft Windows 10 Pro and above
Microsoft Office 2016 and above
Datto Office365 Backups
3CX Phone System v15.5 and above
Yealink IP Phones
Rackworld Racks and Cables
Third Party Vendors
Whilst we pride ourselves on our troubleshooting skills and abilities to solve many different types of technical problems, please bear in mind that for 3rd party products outside our Recommended Platform, it may take us some extra time to familiarise ourselves with managing and supporting these products.
If the issues can and should be supported by the 3rd party vendor, then we may help you liaise with the vendor directly to get the problem solved in the most efficient and timely manner for you.
We may still be able to purchase items from other vendors at your request (depending on whether our distributors stock it), however if any unforeseen issues arise in the setup, installation and ongoing use, we may need to invoice you separately for this time.
Meta Title: About Evongo IT Support Services - Evongo
Meta Description: Our professional IT support team in Geelong is trained in applying the latest technology & industry-best practice to improve business performance. Evongo IT!
SEO Friendly Title: About Evongo IT support services in Geelong
We are committed to helping you gain greater business success through technology
Our professional IT support team is well trained in the latest technology and industry-best practice and has a thorough understanding, built up through years of practical experience, of how to apply technology to improve business performance and achieve specific business objectives.
In these Conditions, the Rate Schedule and every Quote, Order, Plan contract, or other arrangement in connection with the supply of Goods or Services by Evongo Pty Ltd the following words have the following meanings:
“After Hours” means from 17:00 – 08:30 Hours Monday to Friday and all day Saturday and Sunday, including Public Holidays;
“Business Hours” means Monday to Friday from 08:30 to 17:00 hours excluding Public Holidays;
“Client”, “You” or “Your” means a person who seeks or obtains a quote for, or who orders, Goods or Services from Us, and includes both a person whose name is on the Order or on an email attached to which is an order, a person who places an order, and a person on whose behalf an Order is placed or on whose behalf it appears and order is placed, and in any case each of their heirs, successors and assigns;
“Conditions” means these terms and conditions;
“Goods” means any goods and/or services sourced by Us or provided by Us in connection with any such goods and/or services including computer hardware and Software and any goods or services provided in connection with any of those things;
“GST” has the meaning given to it under A New Tax System (Goods and Services Tax) Act 1999 (Cth):
“Order” means any order requested by You to Us for Goods or Services in any form;
“Quote” means a quote provided to You by Us;
“Period” means a particular number of half-days, days, weeks, fortnights, months, or any other period, as may be agreed between Us and the You as the period during which some Services will be provided;
“Plan” means any arrangement between Us and You (whether alone or in conjunction with any other person) for Services (including unlimited support) and/or the provision of Goods provided by Us under an arrangement in connection with Work agreed to be done or progressed for or on behalf of You or any other person at Your request, including as set out in a Plan Schedule;
“Plan Schedule” means the key terms applicable to Plans as set, and as may be varied by Us, from time to time in its absolute discretion without notice to You;
“Public Holidays” means any day which is a public holiday throughout Victoria other than a bank holiday;
“Rates” means the hourly rates and other charges for Services (including any call-out fees and any Return/Cancellation Fees) set out in the Rates Schedule, a Plan, Plan Schedule, Quote, contract or arrangement entered into by Us and You or in these Conditions, and includes any monies payable to Us on a quantum meruit basis for any work it has done;
“Rate Schedule” means the schedule of rates, charges and conditions for the services of Ours as set, and as may be varied, by Us from time to time in its absolute discretion without notice to You;
“Reasonable Assistance Limits” has the meaning set out in clause 17.2;
“Return/Cancellation Fee” means a fee charged pursuant to clause 12.5 as set by Us from time to time;
“Service request” means a request for service such as adds, moves, changes and technical assistance;
“Services” means the provision of any services by Us including Work, advice and recommendations;
“Software” includes software and any installation, update, associated software and any services provided in connection with any of these things;
” Us”, “Our” or “We” means Evongo Pty Ltd 49 151 995 756 and its heirs, successors and assigns; and
“Work” means anything We may do, provide, customise, produce or acquire, whether or not in connection with, or for the purposes of, You or Your use or benefit, and includes testing, troubleshooting, installation and configuration of new equipment or software, consulting, scoping, planning, documenting and quoting for complex items.
In these Conditions, the Rate Schedule and every Quote, Order, Plan, contract, or other arrangement in connection with the supply of Goods or Services by Us, unless the contrary intention appears:
Words denoting the singular number only shall include the plural number and vice versa;
Reference to any gender shall include every other gender;
Reference to any Act of Parliament, Statute or Regulation shall include any amendment currently in force at the relevant time and any Act of Parliament, Statute or Regulation enacted or passed in substitution therefore;
Headings and words put in bold are for convenience of reference only and do not affect the interpretation or construction of these Conditions;
All references to dollars ($) are to Australian Dollars;
A reference to time is to Melbourne, Australia time;
A reference to an individual or person includes a corporation, partnership, joint venture, association, authority, trust, state or government and vice versa;
A reference to a recital, clause, schedule, annexure or exhibit is to a recital, clause, schedule, annexure or exhibit of or to these Conditions;
A recital, schedule, annexure or description of the parties forms part of these Conditions;
A reference to any agreement or document is to that agreement or document (and, where applicable, any of its provisions), as amended, novated, supplemented or replaced from time to time;
Where an expression is defined, another part of speech or grammatical form of that expression has a corresponding meaning;
A reference to “includes” means includes without limitation;
A reference to “will” imports a condition not a warranty; and
A reference to bankruptcy or winding up includes bankruptcy, winding up, liquidation, dissolution, becoming an insolvent under administration, being subject to administration and the occurrence of anything analogous or having a substantially similar effect to any of those conditions or matters under the law of any applicable jurisdiction and to the procedures, circumstances and events which constitute any of those conditions or matters.
APPLICATIONS OF THESE CONDITIONS
Unless otherwise agreed by Us in writing, these Conditions are deemed incorporated in and are applicable to (and to the extent of any inconsistency will prevail over) the terms of every Quote, Order, Plan, contract, or other arrangement in connection with the supply of Goods and/or Services by Us to You.
The invalidity or enforceability of any one or more of the provisions of this Agreement will not invalidate, or render unenforceable, the remaining provisions of this Agreement.
The minimum term that You acquire the service for is outlined in Our Quote to You, beginning from the first of the next month after the date of signing or approving the Quote.
After the expiry of the Committed Term, an extension of the Term will automatically commence for the same period as the original Committed Term and will continue indefinitely, unless earlier terminated by you as specified in Clause 4
This Agreement may be terminated by You upon ninety (90) days written notice if We:
Fail to fulfil in any material respect its obligations under this Agreement and do not cure such failure within thirty (30) days of receipt of such written notice.
Breach any material term or condition of this Agreement and fail to remedy such breach within thirty (30) days of receipt of such written notice.
Terminate or suspend our business operations, unless it is succeeded by a permitted assignee under this Agreement.
This Agreement may be terminated by Us upon ninety (90) days written notice to you.
If either party terminates this Agreement, we will assist you in the orderly termination of services, including timely transfer of the services to another designated provider. You agree to pay us for rendering such assistance at our normal rates as outlined in our current Rate Schedule.
Should You wish to terminate this Agreement before the end of the commitment term, You agree to pay all of the remaining payments up until the end of the commitment term.
You acknowledge that no employee or agent of Ours has any right to make any representation, warranty or promise in relation to the supply of Goods or Services other than subject to and as may be contained in the Conditions.
Any notices given under the Conditions shall be in writing and sent by e-mail to the last notified e-mail address of Yours.
The Conditions shall be governed by and construed in accordance with the laws of Victoria and the parties submit to the non-exclusive jurisdiction of the Courts of Victoria.
You may not assign Your rights and obligations under this Agreement without the prior written consent of Us.
VARIATION OF THESE TERMS AND CONDITIONS
We may at any time vary these Terms and Conditions by publishing the varied Terms and Conditions on Our website. You accept that by doing this, We have provided You with sufficient notice of the variation. We are under no other obligation to notify You of any variation to these terms and conditions.
GOODS AND SERVICES
Term and effect: Quotes will only be valid for 7 days unless otherwise specified in the Quote. A Quote is merely an invitation to You to place an Order with Us and the acceptance of a Quote by You will not create a binding contract between You and Us.
Quote is valid for 7 days only. Expiry dates on quotes are set to be able to inform Us when the quote is still active or to be discarded. Once discarded the quote will need to be requested again.
Once a quote has been confirmed by Us, then the prices in the quote will be confirmed as the final agreed price. A quote is confirmed as ‘final’ as soon as both parties agree with the final price after any last changes requested by You.
The price in the final quote may vary from the original request if there is any price or product changes requested by You. We reserve the right to alter product and prices in the quote, as long as the quote has not been confirmed with You.
Quotes and estimates shall be deemed to correctly interpret the original specifications and are based on the cost at the time the quote or estimate is given. If You later require any changes to the quotes, and We agree to the changes, these changes will be charged at Our prevailing rate.
Once the Quote has been confirmed and converted to an Order, the Order will be subjected to our normal Terms and Condition of Sale.
The general minimum turnaround time for Quote request to be actioned is usually 24 hours. In the event that a quote is required urgently please let us know so that we can respond to it accordingly.
When a special price or discount offer has been applied to this Quote, no other special promotion, discount or bonus offer will be applicable.
In the event that products in the Quote are subjected to any price and supply fluctuations that is outside of Our control We reserve the right to update the price and product in the Quote accordingly. If a product has undergone a price drop or a price increase, the Quote will then be adjusted accordingly. If there is a product that is no longer available, the product will then be replaced or substituted based on Your request and is subject to Your final approval.
Price on non-stocked products are subjected to Price and stock fluctuations and can only be confirmed once the Quote is turned into an Order. While We endeavour to honour every price quoted, if there is a price increase that is beyond our control, We reserve the right to increase the price as necessary.
Once a Quote has already passed the expired date, We may cancel the quote or estimate without having to notify or receive an approval from You.
ETA information is based on an estimate given by our vendors and cannot be held as the actual promised date.
Freight charges will be added to the Order unless otherwise stated. Any included delivery charges are estimates only.
We do not keep inventory and as such only order items once we receive a completed order from a client. If You would like to return an item or cancel an order, a restocking fee may apply. We will need to get approval from the distributor that the stock is returnable before being able to issue a refund as not all products can be returned.
Prices are based upon total Quote Purchase.
Unless Specified, all items on quote are covered by manufacturer’s warranty covering parts and labour for hardware only on a return to depot basis.
Varying or withdrawing Quotes: We may vary or withdraw a Quote at any time in Our absolute discretion and without prior notice to You. We may do so for any reason We consider fit, including, e.g. where the Goods or Services become unavailable or the cost price of Goods or Services increases after the date of the Quote.
Order forms: You may place an Order for Goods and/or Services with Us. Normally, We will require that You provide either a completed Order form or You approve the quote electronically via either an email or a web based system with the date and Your details, including Your full legal name or description and any applicable ABN or ACN number (including the full name or description of any person on whose behalf the order is placed), Your address together with any relevant Quote number and date.
Approval of Orders: You will need to sign the Order or have it duly executed on Your behalf, unless the Order is sent by email or via the web based ordering system, in which case the Order will be treated or deemed as if signed by or on behalf of You by the person whose name appears as the sender of the email or submitter of the form.
Reliance on appearance of validity: Absent actual knowledge to the contrary, We may rely upon the apparent validity of an Order. If any Order is signed or sent by email or approved through the web based ordering system by a named person, that person warrants that the Order is, and it is acknowledged the Order is deemed in favour of Us to be:
signed by, and duly authorised by, both the person who signed the Order and the person who sent the email; and
duly authorised by the person on whose behalf the Order is placed or apparently placed.
Acceptance and Orders: An Order has no effect unless or until it is accepted by You in writing and, until We have received from You payment in clear funds for the Order and any related freight, delivery and (where applicable) in-transit insurance costs in clear funds.
No obligation to deliver: We are not obliged to deliver any Order until we have received payment in clear funds from You for the Order, any related freight, delivery and (where applicable) in-transit insurance costs or where We are unwilling or unable to complete the Order for any reason provided it refunds any payment made by You in respect of the Order.
Credit checks: For the purposes of ascertaining the credit standing or history of a prospective customer to whom We are considering extending credit or payment terms, You hereby consents to Us undertaking a credit reference check in respect to You.
Cancellation of Orders: You will not cancel an Order unless We agree to do so in writing in Our absolute discretion. You acknowledge that, amongst other things, We cannot cancel an Order once the manufacturer or supplier has despatched the relevant Goods and that such despatch often occurs the same day as the Order is placed by Us.
Processes and Procedures: We have processes and procedures that We follow in the course of the provision of Our Services and the supply of Goods. You agree to co-operate with Us and to comply with such processes and procedures as advised to You from time to time.
PRICING AND RATES
Rates exclude Tax: All rates and amounts charged or quoted for Goods and/or Services by Us are exclusive of Tax and any other applicable taxes or government charges (unless otherwise stated in writing by Us).
Rates Schedule: You must pay for Goods and Services at the Rates set out in any applicable Plan and the Rate Schedule as applicable from time to time during the provision of the Goods and/or Services.
Vary Rates: We reserve the right vary any Rate and/or the Rate Schedule from time to time (subject to any fixed pricing for specific periods in any Plan), in its absolute discretion and without notice to You.
Call-out fees: You acknowledge that call-out fees may be charged in addition to the Rates at Our absolute discretion and that the amount of the call-out fee will depend upon where the Services are provided.
Return/Cancellation Fee: Where We arrange a return or refund on behalf of You, or where an Order is cancelled by You after acceptance by Us, We may charge You a Return/Cancellation fee to cover the administration costs to Us in processing the return or refund, or in processing the Order, the cancellation and any refund. We may deduct the Return/Cancellation fee from out of any moneys otherwise due to be refunded to You by Us.
Expenses: You must pay any out of pocket expenses incurred by Us in providing the Services to You in addition to the Rates, charges and call-out fees, upon written demand. Such expenses will include travel costs, flights, car hire, petrol, insurance, taxi fares, accommodation and related meal allowance, tolls and car parking expenses. Where appropriate, We will obtain prior written authorisation from You before such expenses are incurred.
Separate charges for Goods and Services: We may in Our absolute discretion charge for Goods separately from Services or may charge for Goods and Services together.
Calculation of increments: Where a charge is calculated based on increments of time, e.g. 1 hour or 30 minutes, We will charge the applicable rate for the whole increment of time even if work is done during part of, but not for the whole of, that increment of time.
Change in underlying costs: Without prejudice to any other rights of Ours under these Conditions, where there is any increase in the underlying costs incurred by Us in connection with the supply of Goods or Services to You, We may, in our absolute discretion, vary any of Our Rates.
Pre-Paid Blocks of Service: Where You agree to buy Pre Paid Blocks of Service during a Period, payment must be made in advance for the Pre-Paid Blocks of Service at the rate applicable pursuant to the Rates Schedule for all Services. Each such rate being less any discount agreed in writing between Us and You in respect of the Pre-Paid Blocks of Service. Services included in a Pre-Paid Block of Service rate during the Period:
are calculated in accordance with the applicable minimum time periods and increments set out in the Rates Schedule; and
are only provided by Us during the applicable Period. Where Services are provided for a specified Period:
the Services remaining unused for that Period cannot be rolled over into any subsequent Period; and
We are not liable to refund, re-imburse, pay damages or otherwise compensate or indemnify You in respect of those unused Services.
SERVICES AND PLANS
Service and Plan Variations: Currently, We offer the Services and Plans referred to in the Rates Schedule and any Plan Schedule. We may withdraw the provision of, or vary the scope or terms of, or add to or change, the Services without notice to You, from time to time in Our absolute discretion.
Copies on Request: We will provide You with a copy of the current Rates Schedule upon request. Plan Schedules are tailored for particular Plans and are available to Clients participating in the Plan.
We may subcontract any or all of the Services to be performed, but shall retain prime responsibility for the Services under these terms.
DELIVERY, TITLE AND RISK
Delivery liability: We will use all reasonable endeavours to despatch Goods by the due date, but do not accept any liability for non-delivery or failure to deliver on time where this is caused by circumstances beyond the reasonable control of Ours, including, for example, due to failures in supply to Us or delays caused by third parties, such as delivery companies or manufacturers.
Availability to accept delivery: You must be available to accept the Goods at Your nominated delivery address during Business Hours unless otherwise arranged.
Passing of Risk: Delivery is deemed to take place when the Goods are delivered to Your nominated address, whereupon risks of loss, breakage and all damage and all other risks pass to You. Nothing in this clause 3 will affect title to the Goods.
Obligation to insure: You will ensure that Goods are adequately insured from the time of delivery under clause 3.
Retention of Title: Until We receive full payment in cleared funds for any moneys due to Us by You on any account or for any reason:
title to, and property in, Goods supplied to You remain vested in Us and does not pass to You;
You must hold those Goods as fiduciary bailee and agent for Us and must not sell them;
You must keep those Goods separate from other goods and maintain the Goods and their labelling and packaging intact;
Where You sell the goods in breach of these Conditions, You are required to hold the proceeds of any sale of those Goods on trust for Us in a separate account (however any failure to do so will not affect Your obligation to deal with the proceeds as trustee and remit them to Us);
We may, without prior notice, enter into any premises where We suspect those Goods may be, take possession of those Goods and sever and remove those Goods (notwithstanding that they may have been attached to other goods not the property of Ours) and for this purpose, You hereby irrevocably authorise and direct Us (and Our employees and agents) to enter into such premises as its duly authorised agent and You hereby indemnify and hold harmless Us from and against any costs, claims, allegations, demands, damages or expenses or any other acts or omissions arising from or in connection with, such entry, repossession or removal.
You irrevocably appoint Us as Your attorney to do anything We consider necessary in order to enter such premises and repossess the Goods as contemplated by this clause 5.
RETURNS AND CLAIMS FOR GOODS AND SERVICES
General Returns Policy: Notwithstanding anything in these Conditions, You acknowledge that We supply Goods subject to all applicable conditions, including returns and claims policies, of any relevant manufacturer or supplier. You will accept Goods subject always to these Conditions and the terms of such conditions and will indemnify and hold Us harmless in respect of any further or other obligation or any failure or default on the part of that manufacturer or supplier.
Customised Goods not returnable: Where Goods have some element of customisation for You, are supplied pursuant to an Order for Goods that is in the opinion of Ours special or unusual, the Goods are obtained from overseas, the Goods are obtained from a supplier who is no longer trading, or the Goods are otherwise not readily returnable by Us to the manufacturer or supplier or any related services may not be cancelled, You may not return the Goods to Us or cancel the related services.
Duty to inspect: You will inspect all Goods immediately upon their delivery. Within 7 days of such delivery You may give written notice to Us of any matter or thing, by reason of which You might wish to return the Goods, ask for a refund, or make a claim. If no such notice is given on time, You will accept the Goods without any such return, refund or claim.
Return Condition: Where You are entitled to return Goods under these Conditions, You must return the Goods in their original condition and unopened, provided always that where, upon opening the packaging it becomes apparent that the Goods are different to what is described on the packaging or that the Goods are faulty, the Goods may be returned.
Return costs: You will pay all costs and expenses incurred by Us in arranging the return of the Goods to a manufacturer or supplier and/or the cancellation of any related services unless that manufacturer or supplier pays such costs.
Consequences of use, installation, customisation or sale: You will indemnify and hold Us harmless in respect of all allegations and claims in respect of Goods once such Goods have been used, installed, customised or re-sold by You (without prejudice to the recourse of such a customer to the manufacturer of the Goods).
COMPUTER UTILITY, FUNCTIONALITY AND FITNESS FOR PURPOSE
Service limitations given the science of computing: You acknowledge that a reasonable incident of the Services may involve trial and error and that it is a science applied often in novel or unknown circumstances and involving experiment. In particular, You acknowledge that the Services may involve tests, troubleshooting, advice and recommendations that may prove incorrect or inappropriate, particularly in an attempt to cure a problem You are having. While We will make what We consider (in Our absolute discretion) to be all reasonable endeavours to provide appropriate tests, troubleshooting, sound advice and good recommendations in order to assist You, You will always indemnify and hold Us harmless in the provision of our Services to You.
Reasonable Assistance Limits: We are only obliged to provide what We consider, in Our absolute discretion, to be reasonable assistance in the circumstances (including with the installation and customisation of new software or hardware for You or any other Work) under any Plan and You will pay for additional work at the Rates unless otherwise agreed. Without limiting the discretion of Us to determine what reasonable assistance is, normally, reasonable assistance is limited to work done during Business Hours over a period of time not exceeding any period that We have allowed or allows for the Work or has estimated or estimates the Work will take, whether or not notice of the time allowed or estimated is given by Us to You.
Recommendations, suitability, functionality and fitness for purpose: The parties acknowledge that:
We may recommend that You purchase Goods provided by third parties from time to time;
Recommendations may be made in situations where You have made known to Us the purpose for which the Goods will be used or some function sought to be fulfilled;
You acknowledge that We have no control over many factors involved with the suitability, function or fitness for purpose of Goods in an existing or new computer environment, e.g.
the compatibility or ability of the Goods to fit into or perform to expectations in the receiving computer/internet environment; or
the behaviour of third party supplier, e.g. in relation to support;
You acknowledge that for a whole number of reasons outside of Our control, the Goods may fail to meet Your expectations, may not turn out to be fit for all or any of the purposes sought, may not be suitable or may not function properly in all or any respects;
You acknowledge that the Services provided by Us may involve the very task of seeking to customise Goods so they may be fit for particular purposes and that customisation may be a very substantial project in itself;
Accordingly You will accept the sole responsibility for, and indemnify and hold Us harmless in respect of:
decisions as to whether or not to follow recommendations by Us;
decisions as to whether or not to purchase or customise Goods or obtain Services for that or any other purpose; and
any failure or defect in suitability, function or fitness for purpose of any Goods and/or Services, including a responsibility to obtain Your own independent advice or second opinion from a suitably qualified person;
Where We provide Services with a view to achieving Your purposes, suitability, function or fitness for purpose (whether expressed, agreed or otherwise), You must pay for those Services on time without any set-off or counter-claim, whether or not We are able to achieve any of such purposes, suitability, function or fitness for purpose, provided always that We have acted in good faith and have made what We consider, in Our absolute discretion, to have made all reasonable endeavours to achieve those outcomes.
Testing Procedures: You will follow the instructions of Ours with regard to testing or troubleshooting any problems and that if those do not resolve the outstanding problems, We will, subject to these Conditions, allocate such resources as We consider reasonable in the circumstances towards their resolution.
Force Majeure: If We are unable to supply any Goods or Services due to circumstances beyond Our reasonable control, We may cancel the Order (even if the Order has already been accepted) or cease to provide the Services by written notice to You, in which case You will hold Us harmless.
We will not be liable for any breach of contract due to any matter or thing beyond Our control, including failures by third parties to supply goods, services or transport, stoppages, transport breakdown, fire, flood, earthquake, acts of God, strikes, lock-outs, work stoppages, wars, riots or civil commotion, intervention or public authority, explosion or accident.
Alterations to Specifications: We make every effort to supply the Goods in accordance with the Order however We may supply alternate Goods subject to minor variations in actual dimensions and specifications where these are changed by the manufacturer of the Goods after the Order date and before delivery.
Substitute Goods: If We cannot supply the Goods ordered by You, We may supply alternate Goods of equal or superior quality provided however that You will not pay a higher price than the price Quoted or otherwise agreed for the Goods ordered.
Reliance on Manufacturer’s Warranty: You will rely on the warranties provided by the manufacturer of Goods supplied by Us (where applicable) and will deal direct with such manufacturer rather than Us for all claims covered by such warranties.
No claim for manufacturer’s default: You indemnify and hold Us harmless in respect of the performance or otherwise, by any manufacturer of Goods supplied to You by Us, of any of the obligations of such manufacturer in respect of such Goods. This includes any damages or moneys due to You arising under, or in connection with, any breach by the manufacturer of any the manufacturer’s warranties in respect of the Goods.
Exclusion: Except as specifically set out herein and so far as may be permitted by law, any term, condition or warranty in respect of the quality, fitness for purpose, condition, description, assembly, manufacture, design or performance of the Goods or Services, whether implied by statute, common law, trade usage, custom or otherwise, is hereby expressly excluded.
No liability for program or data loss: You indemnify and hold Us harmless in respect of any allegation, claim, loss or expense of Yours or any third party for any program or data loss or damage suffered by You or that third party arising directly or indirectly from the supply of the Goods or Services by Us to You. You acknowledge You are solely responsible for backing up Your programs and data in order to mitigate Your own potential loss of programs and data.
Limit on consequential damage: You indemnify and hold Us harmless in respect of any allegation or claim as to any indirect or consequential losses or expenses suffered by You or any third party, howsoever caused, including but not limited to loss of turnover, profits, business or goodwill or any liability to You or any third party.
Limit on damage from a failure in supply: You indemnify and hold Us harmless for any allegation or claim for loss or damage by You or a third party where We have failed to meet any delivery date or cancels or suspends the supply of Goods or Services.
General limit on liability: Except as otherwise expressly stated in these terms and conditions, We are not liable for any loss or damage of any kind however caused (including, but not limited to, by the negligence of Us) which is suffered or incurred by You in connection with:
Goods or Services provided to You or any Work;
these Terms and Conditions;
Your use of Our website (including the use of a credit card or other debit device) or any linked website;
the non-availability of Goods or Our Services for any reason;
any act or omission of Ours or the provision of inaccurate, incomplete or incorrect information by You, or
for any other reason whatsoever.
Limitation options: To the extent that any legislation implies a condition or warranty that cannot be excluded but can be limited, clause 5 does not apply to that liability and Our liability for any breach of that condition or warranty is limited to Our doing any one or more of the following (at its election):
replacing the Goods or supplying equivalent Goods, Services or Work;
repairing the Goods or the Work;
paying the cost of replacing the Goods or the Work or acquiring equivalent Goods, Services or Work; or
paying the cost of having the Goods or the Work repaired.
Laws still apply: Nothing in these Conditions is to be interpreted as excluding, restricting or modifying or having the effect of excluding, restricting or modifying the application of any State or Federal legislation applicable to the supply of the Goods or Services which cannot be excluded, restricted or modified.
Severance: If any provision contained in the Conditions is unlawful, invalid or unenforceable, those provisions may be severed without prejudice to the validity and enforceability of the remaining provisions of the Conditions.
ERRORS AND OMISSIONS
We make every effort to ensure that all prices and descriptions quoted are correct and accurate. In the case of an error or omission, We may rescind the affected contract by written notice to You, notwithstanding that We have already accepted Your Order and/or received payment from You. Our liability in that event will be limited to the return of any money You have paid in respect of the Order.
PRIVACY STATEMENTS AND YOUR RIGHTS
We are collecting Your personal information for the fulfilment of Quotes, Orders and the provision of Goods or Services to you and it may retain and use it for any such purposes (“Authorised Purposes”).
You are required to provide your personal information to Us for Authorised Purposes.
We may disclose Your personal information to other persons for the purposes of the fulfilment of Quotes, Orders and Work for you or in order to provide Goods or Services to You, to verify the information You provide, for enquiries about Goods or Services that may be suitable for your purposes, or to confirm Your requirements, to anyone proposing to supply Goods or Services to You, or to acquire Goods or Services on Your behalf, or in respect of enquiries relating to any of the foregoing.
Otherwise We will not disclose Your personal information without Your consent unless authorised by law.
Your personal information will be held by Us at Our Principal Place of Business and You can contact Us to request to access or correct it.
We rely on You to submit correct information and details where requested. You accept that You may incur additional expenses if you submit incorrect information.
We make no representations or warranties in relation to information available on Our website, including without limitation:
that the information on Our website is complete or correct;
that Our website will be continuously available or free from any delay in operation or transmission, virus, communications failure, internet access difficulties or malfunction in hardware or software; and that We endorse any internet site linked to Our website or any third party products or services referred to on Our
We will maintain at Our own expense, commercial general liability insurance for personal injury and property damage for a general aggregate of $2,000,000. At Your request We will provide You with certificates, including renewal certificates evidencing such coverage within thirty (30) days of commencing this Agreement, at every renewal and at other times as may be reasonably requested by You.
LODGING OF SERVICE REQUESTS
In order for Us to provide You with the agreed Service, You agree to follow Our process for lodging of Service Requests as outlined in Appendix A.
ACCESS TO SYSTEMS, SITES AND PEOPLE
In order to provide You with the agreed Service, You agree to give Us access to various items of Yours including but not limited to, equipment, people and sites as and when required.
You agree to allow Us to install software on Your Equipment that allows Our technicians to access Your systems at any time. This software allows Us to view system statuses, send monitoring information, see users’ desktops and control Your PC’s. This may require that devices are left on overnight or weekends.
THIRD PARTY AUTHORISATIONS
At times We may need to contact Your third party providers on Your behalf, such as Your internet provider. Some of these providers may require Your authorisation for Us to deal on Your behalf. It is Your responsibility to ensure that We are able to deal freely with these providers.
PAYMENT, LATE PAYMENT AND DEFAULT
Payment due date: All invoices issued to You are due and payable to Us within the terms stated on the invoice (unless otherwise agreed in writing). by cash, cheque, credit card or direct deposit in accordance with these Terms and Conditions and in the way set out in the Invoice.
7 days late: Where You fail to pay an invoice within seven (7) days of the due date, We may, in Our absolute discretion and without prior notice, suspend or discontinue the supply of Goods and/or Services to You.
Recoveries: All legal and other costs and expenses incurred in connection with the recovery of late payments will be added to the amount due by You to Us and will be recoverable from You, in addition to the original invoice cost. If You default in payment of any invoice on time, moneys which would have become due by You at a later date shall be immediately due and payable without any further notice to You. Collectively, all of these moneys are referred to in these Conditions as a “Sum Due”.
Interest: If payment of any Sum Due is not made on time, We will charge interest daily on the Sum Due at the maximum rate allowed by law, calculated and charged daily on and from the due date until the Sum Due is paid in full.
Application of funds: All payments of the Sum Due made by You to Us will be applied as follows:
first in or towards payment of any costs (including legal costs), charges, expenses or outgoings paid by Us in relation to any dishonoured cheque fees, collection costs or any other action taken by Us for the recovery of any amounts owing by You to Us;
secondly, in or towards payment of any interest due or payable hereunder, and
thirdly, in or towards payment of Your debts to Us in order from the longest standing due to the most recently incurred.
Security: We may require You to provide security over Your property (including the Goods or any other property of Yours) as collateral to be held as security for any Sum Due or as a condition precedent to the continuation of supply of Goods or Services by Us to You.
Payment arrangements: In the event that a repayment arrangement is made in relation to any Sum Due and the supply of Goods or Services is resumed, but then a repayment due under that arrangement is not made on time, We may, in Our absolute discretion and without prior notice, again suspend or discontinue the supply of Goods or Services to You.
Power of Attorney: You hereby irrevocably appoint Us as Your attorney to do anything We consider fit for the recovery of the Sum Due or the creation, perfection or enforcement of any collateral held or to be held as security for any Sum Due.
Other remedies: We may exercise any of Our rights and remedies including taking legal action against You for the recovery of any moneys due to Us, notwithstanding it may have exercised other rights under these Conditions.
NON SOLICITATION OF CLIENTS AND EMPLOYEES
You agree that employees are one of Our most valuable assets, policy and professional ethics require that Our employees not seek employment with, or be offered employment by You during the course of engagement and for a period of two (2) years thereafter (or the maximum amount permissible by a Court).
You agree that Our damages resulting from breach of this clause 1 would be impracticable and that it would be extremely difficult for Us to ascertain the actual amount of damages. Therefore in the event You violate this provision, You agree to immediately pay Us 100% of the employee’s total annual salary, as liquidated damages and We shall have the option to terminate this Agreement without further notice or liability to You. The amount of liquidated damages reflected herein is not intended as a penalty and is reasonably calculated based upon the projected costs We would incur to identify, recruit, hire and train suitable replacements for such personnel.
All Software licences are the responsibility of You and not that of Us. It is the duty of Yours to store all licences for all Software used, so that that they can be reproduced if and when required. This includes all Software installed by Us.
You indemnify and hold Us harmless against any claim, allegation, loss, damage or expense arising directly or indirectly from:
any unauthorised Software use by You;
any breach of any Software licence in respect of Software provided to Us by You to be installed on one of Your computers;
otherwise as a result of Us installing Software at Your where You are not authorised to use the Software; and
any problem, defect or malfunction associated with any Software (or related services) supplied by third parties.
All copyright in custom software remains the sole property of Ours unless alternate arrangements are made as part of a separate software agreement.
COPYRIGHT AND CONFIDENTIALITY
Warranty and breach: You warrant that any confidential or copyright information or intellectual property (of any kind and in any form held) or provided by You to Us belongs to You. In the event of any breach of this warranty, You will pay all sums due to Us as If such warranty had not been breached (and regardless of any non-performance of any obligation by Us on account of or in connection with the breach of such warranty). You indemnify and hold Us harmless in respect of any allegations, claims, loss, costs or expenses in connection with such breach of warranty by You.
Retention of title: All copyright and other intellectual property rights in any Work created, commissioned or acquired by Us in the course of the supply of Services by Us to You will be the exclusive property of Ours unless otherwise agreed in writing by Us and You.
Confidential Information: We acknowledge that in the course of providing Services to You, We may learn from You certain non-public personal and otherwise confidential information relating to You, including Your customers, consumers or employees. We shall regard any and all information We receive which in any way relates or pertains to You, including Your customers, consumers or employees as confidential.
You also acknowledge that all information and services, consulting techniques, proposals, and documents disclosed by Us or which comes to Our attention during the course of business and provided under this agreement constitute valuable assets of, and confidential and/or proprietary information to Us.
As such, both parties shall take all commercially reasonable steps to not disclose, reveal, copy, sell, transfer, assign, or distribute any part or parts of such information in any form, to any person or entity, or permit any of its employees, agents, or representatives to do so for any purpose except unless permitted in writing by the disclosing party or as required by applicable law.
Terms and Conditions
SEO Friendly Title: Terms and Conditions
Terms and Conditions of Supply of Products & Services
Every quotation or purchase of Products and/or Services from Evongo Pty Ltd, are subject to the following terms and conditions without limitation or qualification. Evongo reserves the right to change these terms and conditions at any time, effective upon the posting of new terms and conditions on its website. It is the Customers responsibility to ensure that they have read, understood and agree to the most recent terms and conditions available on the website.
“Agreement” means these Terms and Conditions of Supply of Products and Services.”Confidential Information” includes trademarks, service marks, domain names, logos and other branding elements (“Marks”); and patents, copyrights, inventions, know-how, processes and software; and all associated rights in these. “Customer” means a person, firm or corporation, jointly and severally if there is more than one, acquiring Products or Services from Evongo; “Evongo ” means Evongo Pty. Ltd; “Intellectual Property Right” means any patent, trademark, service mark, copyright, moral right, right in a design, know-how and any other intellectual or industrial property rights, anywhere in the world whether or not registered; “Managed Equipment” means networking equipment and devices that Evongo has agreed to support under a Managed Services plan; “Managed Services” means a service provided by Evongo to the Customer to support the Customer’s Managed Equipment and end users; “Products” means any item, goods, equipment supplied by Evongo to the Customer; “Services” means Managed Services, hosting services, training services, consultation services supplied by Evongo or a third party to the Customer. “Services Schedule” means a document identifying the Managed Equipment and number of users that Evongo has agreed to support under a Managed Services Agreement. “Term” means the minimum duration of the Managed Services plan.
1. BASIS OF THE AGREEMENT
a. Unless otherwise agreed by Evongo in writing, these terms and conditions apply exclusively to every sale of Products or Services by Evongo to the Customer and cannot be varied or supplanted by any other conditions without the prior written consent of Evongo.
b. Any written quotation provided by Evongo to the Customer concerning the proposed supply of Products or Services is valid for as per quote expiry and is an invitation only to the Customer to place an order based upon that quotation.
2. TRADING HOURS
a. Normal business hours are from 8.30am to 5pm Monday to Friday (except Victorian public holidays).
b. Any work done outside of normal business hours will be considered after hours and will be charged at Evongo’s current after hours rate.
3. PAYMENT OBLIGATIONS
a. Payment for all Products and Services must be made by cash, cheque or EFTPOS.
b. The Customer shall make all payments due according to the due date on the invoice, without any deduction whether by way of set-off, counterclaim, discount, abatement or otherwise unless the Customer has a valid court order requiring an amount equal to such deduction to be paid by Evongo to the Customer.
c. The Customer must notify Evongo of any dispute within 7 days of receipt of an invoice. Failure to notify Evongo within this time, will be construed as a waiver of any of its rights to dispute the invoice.
d. If the Customer fails to pay Evongo any sum due, Evongo may without prejudice to any other remedy available to it:
i. charge the Customer interest at the current legal rate on any sum due for the period from the due date until the date of payment in full;
ii. charge the Customer for all expenses and costs (including legal costs, debt collection fees and dishonoured cheque fees) incurred by Evongo resulting from the default and in taking whatever action it deems appropriate to recover any sum due;
iii. suspend or terminate the supply of any Products or Services to the Customer by giving written notice to the Customer and Evongo shall not be liable for any damages whatsoever resulting from the action taken.
e. Evongo shall be entitled at any time and from time to time to increase its fees by giving the Customer not less than 90 days prior written notice.
4. RETENTION OF TITLE
a. Until full payment in cleared funds is received by Evongo for all Products supplied by it to the Customer, as well as all other amounts owing to Evongo by the Customer, title and property in all Products remain vested in Evongo and do not pass to the Customer.
b. Until ownership of the Products has passed to the Customer, the Customer must:
i. hold the Products on a fiduciary basis as Evongo’s bailee;
ii. store the Products (at no cost to Evongo) separately from all other Products or any third party in such a way that they remain readily identifiable as property of Evongo;
iii. not destroy, deface or obscure any identifying mark or packaging on or relating to the Products;
iv. maintain the Products in a satisfactory condition and keep them insured on behalf of Evongo for their full price against all risks to Evongo’s
c. Until ownership of the Products has passed to the Customer, the Customers right to possession of the Products shall terminate immediately if:
i. the Customer has a bankruptcy order made against them or makes an arrangement or composition with creditors, or otherwise takes the benefit of any statutory provision for the time being in force for the relief of insolvent debtors, or (being a body corporate) the Customers convenes a meeting of creditors (whether formal or informal), or enters into liquidation (whether voluntary or compulsory) except a solvent voluntary liquidation for the purpose only of reconstruction or amalgamation, or has a receiver and/or manager, administrator or administrative receiver appointed of the Customers undertaking or any part thereof, or a resolution is passed or a petition presented to any court for winding up or for the granting of an administration order in respect of the Customer, or any proceedings are commenced relating to the insolvency or possible insolvency of the Customer; or
ii. the Customer suffers or allows any execution, whether legal or equitable, to be levied on its property or obtained against the Customer, or the Customer fails to observe/perform any of its obligations under this agreement or any other contract between the Customer and Evongo, or the Customer is unable to pay its debts within the meaning of the Insolvency Act 2008 or the Customer ceases to trade; or the Customer encumbers or in any way charges any of the Products.
d. Evongo shall be entitled to recover payment for the Products notwithstanding that ownership of any of the Products has not passed from Evongo.
e. The Customer grants Evongo, its agents and its employees an irrevocable licence at any time to enter any premises where the Products are or may be stored in order to inspect them, or, where the Customers rights to possession has terminated, to recover them and Evongo would be indemnified from and against all costs, claims, demands or actions by any party arising from such action.
5. PRODUCT RETURNS
a. It is not the policy of Evongo to accept the return of Products that were correctly supplied, except by the approval of management of Evongo. If Evongo in it’s sole discretion agrees to accept the returned Products, all such Products must be returned in their original condition including packaging and manuals.
b. A restocking fee may be charged at the sole discretion of Evongo. Before returning any Products an RA number must be obtained from Evongo, this should be clearly affixed to the item.
6. RISK AND INSURANCE
a. The risk in the Products and all insurance responsibility for theft, damage or otherwise in respect of the Products will pass to the Customer immediately upon delivery of the Products to the premises nominated by the Customer.
7. LATE DELIVERY
a. Any period or date for delivery of Products or provision of Services stated by Evongo is intended as an estimate only and is not a contractual commitment.
b. Evongo will not be liable for any consequences of late delivery howsoever caused.
c. If, through circumstances beyond the control of Evongo, Evongo is unable to effect delivery or provision of Products or Services, then Evongo may cancel the Customer’s order (even if it has already been accepted) by notice in writing to the Customer.
a. Evongo warrants that all Services will be carried out with reasonable care and skill by personnel whose qualifications and experience will be appropriate for the tasks to which they are allocated.
b. Evongo warrants that all Products supplied to the Customer will be free from material defect for a period of 30 days from the date of delivery. This warranty shall be limited to the replacement of or repair of the faulty Products, or the issue of a credit note, or the granting of a refund or other such compensatory measures as Evongo at its discretion considers appropriate in the circumstances, and shall be conditional upon the Customer complying with the conditions of the manufactures warranty (where applicable). Such measures shall relate only to the actual faulty Products or their value.
c. Where possible Evongo will transfer to the Customer the benefit of any warranty or guarantee given to Evongo.
d. Except as expressly provided in these Terms and Conditions, no warranty, condition, undertaking or term, express or implied, statutory or otherwise is given or assumed by Evongo, and all such warranties, conditions, undertakings and terms are hereby excluded to the fullest extent permitted by law.
a. Evongo does not exclude its liability to the Customer for direct damage to tangible property caused by the negligence of Evongo’s employees in connection with the performance of their duties or by defects in any Product supplied. Evongo’s total liability under this clause shall be limited to $2,500 for any one event or series of connected events.
b. Save in respect of claims for death or personal injury arising from Evongo’s negligence, in no event will Evongo be liable for any damages resulting from lost profits, loss of anticipated savings, nor for any damages that are an indirect or secondary consequence of any act or omission by Evongo, whether such damages were reasonably foreseeable or actually foreseen.
c. Except as provided above in the case of personal injury, death and damage to tangible property, Evongo’s maximum liability to the Customer for any cause whatsoever (whether in the form of the additional cost of remedial Services or otherwise) will be for direct costs and damages only and will be limited to the amount received by Evongo from the Customer in respect of the managed services in the previous 12 months.
d. The Customer is responsible for the safety of Evongo’s employees or of its subcontractors whilst on the Customer’s premises, and must comply with all relevant statutory requirements and maintain adequate insurance against the appropriate risks.
e. Evongo shall have no liability to the Customer for any loss of original data due to any error or omission by the Customer, or due to any event that takes place at the Customer’s Premises, unless such event is caused by Evongo’s negligence.
f. The Customer’s statutory rights as a consumer (if any) are not affected. All liability that is not expressly assumed in this agreement is hereby excluded to the fullest extent permitted by law. These limitations will apply regardless of the form of action, whether under statute, in contract or tort, including negligence, or any other form of action. Nothing in this Agreement shall exclude or limit liability for fraudulent misrepresentation.
g. The parties hereby acknowledge and agree that the limitations contained in this clause 9 are reasonable in light of all the circumstances.
a. Unless the relevant party has prior written consent of the other or unless required to do so by law, neither party will disclose or make any Confidential Information available to any other person, or use the same for its own benefit, other than as contemplated by these terms and conditions.
b. Each party’s obligations under this clause will survive termination of these terms.
c. The provisions of clauses 10.a and 10.b shall not apply to any information which:
i. is or becomes public knowledge other than by a breach of this clause;
ii. is received from a third party who lawfully acquired it and who is under no obligation restricting its disclosure;
iii. is in the possession of the receiving party without restriction in relation to disclosure before the date of receipt from the disclosing party; or
iv. is independently developed without access to the Confidential Information.
a. Evongo will not be responsible to the Customer or any third party for any breach of any software license in respect of software provided to Evongo by the Customer to be installed on a Customer’s computer.
b. All software (third party or line of business applications) require a vendor support agreement
c. The Customer hereby indemnifies Evongo against any loss, damage, costs, harm or other expense whatsoever arising either directly or indirectly as a result of Evongo installing software at the request of the Customer.
d. Where Evongo provides software to enable the Customer to use its Services, Evongo grants the Customer a non-exclusive, non-transferable licence to use the software solely in connection with those Services.
e. The Customer hereby agrees to comply with any terms and conditions reasonably required by the owner of the copyright in any software to protect the owner’s interest in that software.
a. Evongo undertakes to comply with the provisions of the Data Protection Act 1998 and any related legislation insofar as the same relates to the provisions and obligations of this Agreement.
b. Evongo gathers and holds personal data about the Customer, including name, physical and email addresses, and telephone numbers.
c. Evongo does not hold credit card information.
d. The obligations set out in this clause 12 shall remain in force notwithstanding termination of this Agreement.
e. The Customer understands that in certain situations Evongo’s employees may be in a position to see the contents of the Customers files.
f. It is the Customer’s obligation to use encryption and personal security programs to increase the security and privacy of their files if any of their files are particularly private or are required under any professional or statutory regulations to be kept confidential.
g. All Evongo employees sign a client data confidentiality agreement, a copy of which is available on request.
13. MANAGED SERVICES CONDITIONS
a. Where Evongo agrees to support the Customer’s end users via a Managed Services plan:
i. the Managed Service will only be available for the Managed Equipment and number of users as set out in the Services Schedule.
ii. the Managed Services will cover up to 3 devices per user (1 x mobile phone, 1 x tablet, 1 x PC or laptop) devices must be used in the business by a named user in the Services Schedule
iii. Evongo may not cover all devices due to age or unreliability issues and advice given to upgrade or replace these
iv. Only business grade hardware is supported
v. Evongo may make a reasonable recommendation to implement software or hardware to improve security and/or reliability and this is not implemented in a timely fashion, liability for outages caused or remediation of issues may not be covered by Evongo Managed Services
vi. the Customer must give Evongo Administrator-level access to all Managed Equipment at all times and Evongo may refuse to give the Customer Administrator-level access to it.
vii. The Customer must allow Evongo remote access the Managed Equipment at all times.
viii. Evongo will monitor the Managed Equipment to give advance warning of and reduce the likelihood of any failure or breakdown. However the Customer agrees that the monitoring tools cannot detect all impending faults and may not always prevent hardware failure.
ix. The Managed Services does not include setting up, installing or moving hardware, software or Services.
14. TERMINATING A SERVICE
a. Either party may cancel any Service at any time by giving the other party 30 days prior written notice following expiry of the contract Term.
b. Upon termination of a Service the Customer will immediately return to Evongo all Products that the Customer does not own but has been licensed to use during the term of Service.
c. Upon termination of a Service Evongo will make available to the Customer all usernames and passwords once:
i. all Products licensed to the Customer to use during the term of service are returned to Evongo; and
ii. all monies owed to Evongo are paid in full.
15. EVONGO EMPLOYEES
a. The Customer acknowledges that Evongo has a substantial investment in it’s employees that provide service to the Customer and that such employees are subject to Evongo’s control and supervision. In consideration of this investment, the Customer agrees not to solicit, hire, employ, retain or contract with any Evongo employee, without first receiving Evongo’s written consent.
b. If any employee of Evongo Pty Ltd terminates or is terminated of employment with Evongo (regardless of the reason for termination) and is employed by the Customer (or any affiliate or subsidiary of the Customer) in any capacity either during or within a 6 month period, the Customer shall immediately pay Evongo Pty Ltd an amount equal to 50% of the then current yearly salary or wage paid by Evongo to such employee.
SEO Friendly Title: Privacy
This website may collect certain information about your visit – such as the name of the internet service provider and the internet protocol (IP) address through which you access the internet, the date and time you access the site, the page(s) that you visit while on the site, and the internet address of the website from which you linked directly to our site.
Evongo is the sole owner of the information collected on this website. We do not (or will never) sell, share or rent this information to others in ways different from what is disclosed in our privacy statement below. This information is only used to administer our website, analyse trends and to generally help improve our site, and will never result in your receiving of spam e-mails.
Information gathered from visitors
In common with other websites, log files are stored on the Evongo web server – saving details such as the visitor’s IP address, browser type, referring page and time of visit. Cookies may be used to remember visitor preferences when interacting with the website. This information is not linked to a visitor’s personal identification in any way.
Information entered on our enquiry form – including, but not limited to, email addresses – will not be sold, rented or leased to third parties.
Where registration is required, the visitor’s email and a username may be stored on the server. Email addresses will not be sold, rented or leased to third parties.
Changes to our policy
We may need to update this policy from time to time, in order to address new issues and reflect changes on our website. Please refer back to this policy regularly.
About: Industries we work with
Meta Title: IT Support For Geelong Industries - Evongo
Meta Description: Evongo provides IT support services for Geelong businesses in the finance, manufacturing, retail, accommodation, trades, education & not-for-profit sectors.
SEO Friendly Title: IT support for Geelong industries
At Evongo, our IT support clients range from small local businesses with only a handful of staff to bigger organisations managing the needs of hundreds of people and numerous sites across the country.
We work with many different industries including manufacturing, construction, accommodation and food services, financial and insurance services, electrical services, retail, wholesale and trade, transport, education and training, not-for-profit organisations and many more.
Meta Title: Geelong IT Providers Methodology - Evongo
Meta Description: Through Evongo’s simple five-stage methodology, our Geelong IT providers help you leverage business IT services and technology to advance your business.
SEO Friendly Title: As Geelong IT providers, Evongo delivers great results
Through Evongo’s simple five-stage methodology, we can help you leverage technology to advance your business. We have developed a straightforward, well-defined set of processes that have achieved great results for our clients.
Evongo works closely with you to understand the way you currently do business and the outcomes you wish to achieve. Discovering how to unlock the potential for your business is our specialty. We help guide you through the possibilities and provide you with the most appropriate business IT services solution.
Work smarter and more efficiently than ever before with an innovative solution developed by our experienced IT strategy planning professionals, specifically for your business. Our team only suggests complete and workable solutions that are practical and can integrate well with your existing technology.
Experience seamless integration and minimal disruption to your business through our time-tested, comprehensive implementation services. The Evongo team has both the industry experience and qualifications to ensure each data networking project is delivered on time, within budget and to your satisfaction, every time.
Implementing new technology can be a welcome improvement to your business and your team, providing everyone knows how to use it. Evongo’s training services are fully flexible and can be customised to suit the individual requirements of your business and your people.
Businesses today rely heavily on their technology systems and therefore keeping them working is vital. Evongo’s IT support services can be tailored to suit your unique business needs. Our managed IT services provide a simple solution to managing your IT infrastructure and supporting your employees.
Services: Managed IT Services
Meta Title: Geelong Managed IT Services - Evongo
Meta Description: Evongo's managed IT services offer Geelong businesses peace of mind. Remote and on-site help desk, back-up & disaster recovery, monitoring & maintenance.
SEO Friendly Title: Geelong managed IT services
We make IT management in Geelong easy – a simple solution for a complex world
As leading IT providers in Geelong, Evongo understands that when it comes to technology you just want it to work. You don’t want to have to worry about whether your data is being backed up properly or whether your network is secure. You also don’t want to be hassled by your employees who can’t work due to technical issues.
Evongo’s managed IT services plans are designed specifically to take the stress away by proving a simple, cost-effective solution to managing your IT infrastructure and supporting your employees.
Managed IT service features
Help desk and remote support
Evongo’s friendly help desk team provides telephone and remote support services to our managed IT services clients from our head office in Geelong.
Our team members are all passionate about keeping you working efficiently. That’s why we have gone to great lengths to ensure we have the right people, tools and processes in place to deliver exceptional support services.
Sometimes issues are beyond the scope of remote support, especially problems with computer hardware. If this is the case Evongo’s onsite support team is always ready and available to help.
Our skilled technicians have a proven track record of resolving problems quickly and efficiently and are always aiming to minimise the disruption to your business.
Monitoring and maintenance
Evongo’s remote monitoring and management platform allows us to proactively monitor the health and performance of your IT infrastructure. This system allows for early detection and remediation of issues before they become a problem.
In addition to proactive monitoring, our technicians conduct regular maintenance to ensure all your servers, workstations, mobile devices and networking equipment are functioning at peak performance.
Protecting your business from both internal and external threats is something we take very seriously. Evongo’s systematic approach to managing the security of your network is designed to reduce your exposure to security threats.
Our expert IT security services team provides all the comprehensive security measures you need to stay safe including monitoring, managing and routinely testing your security devices and systems to ensure your environment is well protected.
Backup and disaster recovery management
Businesses today are so reliant on technology to conduct business, therefore having the right business IT support, backup and disaster recovery measures in place is critical to protecting your organisation.
Evongo’s strict backup and disaster recovery management process, along with the use of market-leading technologies, will provide you with effective data protection and ensure business continuity no matter what type of disaster comes your way.
Technology steering meetings
Gain access to Evongo’s wealth of experience and expertise and get the results you’re looking for. We will work closely with you to help address your challenges, meet your goals and identify ways you can leverage technology to advance your business.
This service includes short-term and long-term planning and budgeting, quarterly reviews and ongoing consulting and guidance to help you get maximum value out of your investment in information technology.
What you will experience
Simplified management of your technology
Access to highly skilled technicians
Continuous business improvement
Greater data protection
Increased network stability
Fewer technical issues
Reduced risk and much more.
Why do our managed IT services get such great results for our clients?
It all comes down to our structure and process. We believe we have the best people employed and we use the best technology and platforms available to the industry, but all that would mean nothing without having the right structure and processes in place to ensure nothing gets missed.
We have more than 15 years’ experience providing managed IT services to Geelong businesses and we know what it takes to keep our clients happy and their technology working smoothly.
Meta Title: Cloud Services for Geelong Businesses - Evongo
Meta Description: Evongo's Geelong-based cloud computing specialists have the industry experience to help you identify the right cloud services solution for your business.
SEO Friendly Title: Cloud services for Geelong businesses
Move to cloud computing with confidence
You want to ensure you only subscribe to cloud services that are cost effective, secure and that will work for your business in terms of functionality. That’s where we can help. Evongo’s Geelong-based cloud computing specialists have the industry experience and expertise to help you identify the right solution for your business.
We take a strategic approach to moving businesses to the cloud
Evongo’s cloud services team makes moving to cloud computing a smart and cost-effective choice for Geelong business, by:
Taking the time to listen to your business objectives
Conducting a comprehensive assessment of your existing IT environment
Conducting a cloud readiness assessment
Making our recommendations
Setting your cloud computing strategy and defining the roadmap
Migrating you to the cloud with minimal to no disruption to your business
Meta Title: IT Security Geelong - how safe is your business? Evongo
Meta Description: Evongo is Geelong's IT security specialists. Identify vulnerabilities in IT systems & environments. We implement solutions, preventing potential damage.
SEO Friendly Title: IT security services Geelong
IT security is one of the biggest challenges facing businesses today
Regardless of size or industry, the likelihood of an unsolicited attack on an organisation’s IT systems and data has increased significantly. Not only are companies facing external attacks or intrusion from malicious sources, they are also being attacked internally by disgruntled or former employees. The risks include data breach, service disruption and identity fraud – which can all result in significant damage to a business.
Is your business at risk?
Evongo’s IT security services team can help you identify any vulnerabilities in your IT systems and environment by conducting a comprehensive security audit. The process involves actively testing the security of your web-based information systems, infrastructure and applications to expose any potential threats. We then provide you with a report on the vulnerabilities found and our recommendations.
Maximise network security and data integrity with tailored IT security services from Evongo
Our IT security specialists have implemented a wide range of solutions for our clients and as such have a wealth of expertise and experience with all the major security tools and technologies.
We can help secure your business with:
Access control – Enforcing security policies will enable you to control who or what can access your network so you can keep out potential attackers.
Data loss prevention – With the right data loss prevention technologies you can stop staff from uploading, forwarding or even printing your critical data.
Web security – Control your staff’s web use by blocking access to inappropriate and harmful websites while still allowing access to valuable content when required.
Email security – Email is the number one threat for a security breach so defending against spam, phishing and virus-laden emails is vital.
Mobile device security – Mobile device management services let you control which devices can access your network and apply consistent data security policies to keep your network private.
Firewalls – A firewall will protect your business by using a set of defined rules to allow or block traffic from the internet to your internal network.
VPNs – A VPN encrypts your data so your remote workers can access your private company information without data being intercepted and read by anyone else.
Vulnerability assessments – Conducting a regular vulnerability assessment will identify any weakness in your network that might be a security threat.
Penetration testing – A penetration test mimics the actions of an actual attacker so we can evaluate the effectiveness of your security measures.
Meta Title: Data Networking Services Geelong - Evongo
Meta Description: Evongo's customised data networking services allow Geelong businesses to transfer data safely and securely across multiple platforms and operating systems.
SEO Friendly Title: Data networking services in Geelong
Connecting you to your network
The ability to exchange information quickly, easily and securely is a focal point for organisations of all sizes. The ever-increasing demand to access company information on the go, along with the sheer amount of data available and today’s resource-intensive applications, provides new challenges for business.
Delivering the right information to all the right people and devices at the right time is vital. Evongo’s data networking services provide new, more efficient ways for you to engage customers and keep your people connected.
Build a customised data networking solution for your business
We can design, deploy and maintain a customised data networking solution that will allow you to transfer your data safely and securely across multiple platforms and operating systems. Our mobile device management services ensure data networking protection without compromising flexibility.
As trusted IT providers, Evongo has strong relationships with a wide range of wholesale carriers and technology suppliers, allowing us to deliver the most appropriate IT support services and solutions for your business.
Meta Title: IT Strategy Planning Services Geelong - Evongo
Meta Description: Evongo's IT strategy planning services help Geelong businesses align technology to business goals, providing a roadmap to meet key business objectives.
SEO Friendly Title: IT strategy planning services, Geelong
Evongo’s IT strategy planning services help Geelong businesses align technology to business goals.
Do you have a plan?
Professional sports teams know that to win you need a game plan and this rule also applies in business. Whether you are looking to improve your productivity, increase your bottom line, gain more market share or whatever your goal may be, it is essential to have an IT strategy plan in place.
Get the results your business needs
A clearly defined technology strategy and roadmap from Evongo will provide you with the direction required to meet your key business objectives. Our team will work closely with you to develop a complete and workable IT strategy plan and then manage the implementation of your plans.
IT strategy planning from Evongo
Our IT strategy planning will:
Identify where your business is at now and where you would like it to be in one year or years from now.
Help you make technology decisions by defining your key business goals and how technology aligns to these goals.
Rationalise IT spending and budgeting for the future.
Keep you informed with regular progress reporting.
Why do so many businesses trust our advice?
Experience – Our consultants have years of industry experience and can provide the guidance and IT strategies required to produce the outcomes your business needs.
Independence – We are technology agonistic so you can trust our advice to reflect your specific requirements, rather than being technology or vendor bias.
Practical – We focus on the best way to help you achieve your business goals rather than the best way to justify the latest technology.
Our experienced team will help you define a clear path for your future. We can create a roadmap to move your business to a cloud service, improve your data networking, introduce a reliable business continuity solution, or whatever your business goals may be. Contact us to find out more information about an IT strategy plan from Evongo.
Services: Mobile Device Management Services
Meta Title: Geelong Mobile Device Management Services - Evongo
Meta Description: Evongo's mobile device management services allow Geelong businesses flexibility while maintaining control. Easily organise and secure all mobile devices.
SEO Friendly Title: Geelong mobile device management services
Evongo’s mobile device management services allow Geelong businesses flexibility while maintaining control.
Easily organise and secure all your mobile devices
How secure are the mobile devices connected to your business systems? What if they were lost or stolen? Can you guarantee people aren’t accessing your private company data?
Alleviate the complexity of controlling your mobile devices and keep your critical business data secure on both company and employee-owned mobile devices through our mobile device management services.
Features of our mobile device management services
Secure any device
Apply consistent data security policies across all IOS, Android and Windows mobile devices.
Enforce PIN access on all devices.
Protect your business data with device encryption and data loss prevention policies.
Quarantine or selectively wipe business data from non-compliant devices.
Secure your business email, calendars and contacts on all mobile devices.
Apply consistent email configuration to all devices.
Enforce PIN access to protect business email, calendars and contacts.
Block access to or selectively wipe email from non-compliant devices.
Implement a secure framework to distribute, protect and manage all applications company-wide.
Enforce PIN access to protect business applications.
Ensure only company authorised third-party business apps can be accessed.
Access critical business content and collaborate securely across any network on any mobile device.
Enforce PIN access to protect your business content.
Provide secure access to systems like Sharepoint and Office 365.
Protect both company data and employee privacy on all bring your own devices (BYOD).
Provide secure access to business email, apps and content.
Maintain user privacy.
Enable business data to be wiped without erasing personal information.
Monitoring and asset management
Monitoring and reporting are essential requirements as businesses introduce mobile devices into the workplace.
Achieve greater visibility into your mobile data.
Meet compliance requirements.
What you will experience
Simplified management of your mobile devices.
Consistency in how your mobile devices are used.
Flexibility for your staff to bring their own devices to work.
Greater data protection and much more.
Evongo’s mobile device management service provides a simple solution to managing all your mobile devices. Our professional IT support team can also provide a fully managed IT service to take care of all your business IT needs. If you are looking for IT support in Geelong please contact us to find out how we could help your business.
Services: Business Continuity Services
Meta Title: Geelong Business Continuity Services - Evongo
Meta Description: Evongo's experienced business IT support services ensure peace of mind with business continuity planning. Backup and disaster recovery for Geelong businesses.
SEO Friendly Title: Geelong business continuity services
Effective business continuity planning has never been more important
How vulnerable are you? What if your business faced an unforeseen technical problem or human error led to the loss of critical data?
How quickly could your systems be recovered in the event of a natural disaster or a malicious attack?
Failing to prepare for such events could mean huge financial losses and major disruption to your business. That’s why it’s important to have a business continuity plan that can ensure quick and efficient recovery if something was to go wrong.
Safeguard your business with Evongo’s business continuity services
Businesses of all sizes rely so heavily on technology and stored data these days, therefore having a business continuity plan that can ensure quick and efficient recovery is crucial.
We can provide your company with a secure, automated and cost-effective cloud-based backup and disaster recovery service and then monitor and manage everything to ensure your data can easily be restored if something was to go wrong.
If you are looking for a Geelong IT provider with experience in business continuity services, the Evongo team are here to help. We have had over 15 years’ experience in business continuity planning and helping clients adequately protect their business from potentially disastrous events.
We can also help protect businesses from an unsolicited attack on your IT systems and data with our IT security services. If you are interested in learning more about how we can help protect your company or some of the other business IT services that we provide, please contact us.
Services: Hardware and Software
Meta Title: Hardware & Software IT Distributors Geelong - Evongo
Meta Description: Benefit from Evongo's strong vendor relationships with leading distributprs and IT providers in Geelong and get the best price on the latest technology.
SEO Friendly Title: Hardware and software IT distributors in Geelong
Get the best price on the latest technology through our network of leading distributors and IT vendors
Benefit from Evongo’s strong vendor relationships with leading technology suppliers.
There are so many options with technology these days and choosing the right products for your business can be quite complex. Our experience in dealing with industry-leading manufacturers of both hardware and software allows us to provide you with informative and reliable advice on the technology and licensing models that would best fit your requirements.
Meta Description: Evongo is Geelong's cybersecurity specialist. Whatever size business, talk with us, we can help ensure your business continuity in the event of a cyber attack.
SEO Friendly Title: Cyber security Geelong
Cybersecurity for small to medium businesses
At its fundamental simplest form, cybersecurity is protecting your local business network from attacks from the outside world. Sadly, in many cases, cyber security is only something many local Geelong business owners contemplate after they have been involved in a cybersecurity incident (when it is too late)
Myths about Cybersecurity
I’m too small for cyber attackers/hackers to worry about me
Small business owners often believe mistakenly that their business is too small and insignificant for global hackers to worry about them. This is so misguided and can only end in a bad situation. Phishing scams, Trojans from hacked websites or websites set up with malicious intent can all impact a business network. Cyber attackers are looking for any vulnerability they can find. If you have a weakness they will attempt to exploit this at your cost.
I will talk with an IT business after if it happens.
Sometimes we can work miracles and potentially recover information but this is a very rare scenario. Defence and preparation is a much better strategy than recovery.
Technology is my best defence against cyber attack
Technology is only part of the defence against cyber-attack.
Are all staff constantly on the lookout for malicious behaviour? Are they or have they been trained in best practice cyber security? Technology is often the first line of defence but if a phishing email slips through or staff set up loose and simple passwords you could be inviting trouble into your business
Regardless of the size of your operation, does your business have online and offline backup policies and procedures, are these procedures tested regularly? Do you have staff procedures should an attack happen? What next, who do they/you call? How are staff alerted to internal issues/hacks?
Cyber Security is so much more than simply installing virus protection on your laptop. As a business owner, you are tasked with a myriad of jobs that you must oversee and it’s easy to understand how some are overlooked. Payroll, Superannuation, BAS lodgement, tax returns, One-touch payroll and the list goes on. As a business owner cyber Security is easy to let it slide because it’s not something to worry about. Sadly it is and it is something many business owners realise too late.
A good cybersecurity system puts a solid defence in place and then also provides a quick recovery to ensure business continuity with minimal interruption to your business. We can work with any size business to ensure we have all the core areas of cybersecurity covered.
Call us now to discuss how we can help provide cyber security to your business. We pride ourselves on being Geelong’s business cybersecurity experts
Services: Remote Access – Working from home
Meta Title: Remote Access, working from Home - Evongo Geelong
Meta Description: Working from home remote set up and access. Evongo is Geelong's leading provider of remote access for Businesses in Geelong, Bellarine and the Surfcoast. Call us today.
SEO Friendly Title: Remote Access Geelong, Bellarine and Surfcoast
Geelong, Bellarine and Surf coast businesses have been scrambling to set up remote access from home for many employees and the scramble continues. Many employees live on the Surfcoast and Bellarine Penisula including locations such as Torquay, Anglesea, Lorne, Queenscliff and Ocean Grove. The location itself has very little bearing on setting up home remote access, what is important is hardware and internet connectivity (broadband access).
COVID-19 has created unprecedented demand in a short time frame for remote home access so most of our workforce can remain home in isolation. The good news for employers is that you can simply plug into existing personal computer hardware your employees have at home. Laptops, desktops or Macs, they can all be utilised to access work-related files and emails.
If you need to purchase new hardware this can be done at base levels to avoid excessive costs and you do not have to be an existing client of Evongo nor do you have to have an advanced IT set up. The entire job can often be performed remotely, without any of our team members ever having to visit your staff members’ homes.
What do your staff need to access?
Most businesses we deal with the staff require access to:
Customer Relationship Management (CRM) software
We can limit the access your staff have so they only see the files you want them to see. It’s important to protect your business’s confidential information. Staff can be restricted at a variety of levels when using remote access to work files and servers. SO they only get the information that is relevant to them.
Emails are essential and often it is a good opportunity to review your current email arrangements to see if they can be set up more efficiently to best suit your company requirements.
After your home remote access has been set up and established we can actively protect and support these devices on an ongoing basis. We can ensure the connection is secure and that the devices your staff are using are actively protected.
Internet access will always play a key role in ensuring a seamless workflow when working remotely. We can asses and or make recommendations, particularly if staff members have unreliable internet access at home.
Evongo is a leading provider of work from access in the Geelong region if you would like to learn more please contact us now.
Services: IT Support
Meta Title: IT Support Geelong - Evongo
Meta Description: Geelong businesses first choice for IT support services is our highly trained Evongo team. Contact us today for a free no-obligation consultation 03 5228 3000
SEO Friendly Title: IT Support Geelong
Having a reliable Geelong IT support team is one of the biggest strengths a business can have today. Technology is essential to everyday operations and when systems fail, it is crucial to have experienced professionals equipped to help.
Our highly trained Evongo team is the preferred choice for Geelong business owners. We pride ourselves on our unmatched customer service and advanced expertise, putting to practice more than 15 years of industry experience.
Rather than providing a reactive service, where we show up to fix something that is broken, we keep our finger on the pulse working to maintain nothing goes wrong in the first place, minimising the disruption to your business and ensuring the smooth run of your IT services.
Whether you are a small digital agency, a large retail store, or an established construction company, we are prepared to provide competitive and tailored IT support that you will struggle to find elsewhere.
Evongo offer affordable and flexible options for your business, and provide you with timely effective services when you need them most. Our support services can assist you with issues, big or small, remote or onsite, including:
Troubleshooting of IT systems
Maintaining IT security
Contact us today on 03 5228 3000 for a free no-obligation consultation today and experience the best IT support Geelong has to offer.
What could digital IT transformation do for your business?
As an ambitious business owner, you’re always looking for new ways to help your business develop, improve, and grow, no matter how successful it already is.
You’ll also want to improve the experience for your customers.
And of course, you’ll be aware that your IT infrastructure plays a big part in this growth and the overall experience.
That works both ways. Sometimes it’s that same infrastructure that can limit how your business evolves. If you’re running older systems, or perhaps systems that don’t fully meet your needs, growth can be held back.
This is where digital IT transformation comes in.
Maybe you’ve never heard that term before. Or perhaps the concept is new to you.
Here’s a one line explanation:
Digital IT transformation is about using modern technology to create or modify business processes, culture, and customer experiences.
It involves a complete reassessment and overhaul of your technology, with the goal of improving the efficiency and delivery of your products or services.
We can make this easier with a few case studies of how big businesses you’ve definitely heard of, used digital IT transformation. Just because these are big names doesn’t mean it isn’t relevant to you… this is for all businesses, of all sizes.
Are you old enough to remember when Netflix’s business model was based on direct mail?
They’d mail their customers a DVD. Customers would watch it, post it back, then wait a few days for another DVD to arrive through their letterbox.
Of course, Netflix led the way to the streaming world we enjoy today.
That was digital IT transformation. They used technology to flip their business model on its head.
This has not only improved customer experience (now you wait seconds instead of days for a movie), but it’s also increased customer loyalty too. As of March this year, Netflix has a market value of $168 billion.
Believe it or not, in 2004, Lego was on the brink of bankruptcy. This pushed the company to start its digital IT transformation journey, which is still ongoing today.
First, Lego digitized its supply chain processes, which allowed it to gain more insight into production delays and manufacturing costs.
Then between 2008 and 2016 the company centralized its HR applications, moved to a digitized shop floor system, and streamlined its decision-making processes.
To improve customer experience, Lego added mobile apps, games and even movies to its products. The first Lego film generated an additional $467 million in revenue (off a production budget of $65 million).
When you think of Kodak today, you think of a dead camera company.
As the digital revolution took hold at the start of the century, cameras evolved from using film to storing photos digitally.
Kodak held firm with film (despite inventing the first digital camera!) under the impression that launching a digital camera would cannibalize its existing business.
Which we now know was not the case. Kodak’s failure to digitally transform at the right time led to the company losing a lot of money, and bankruptcy in 2012.
Eventually, after a big financial loss, Kodak took the step towards digital photography, but it was too late.
Of course, these are extreme cases and big famous businesses, but they highlight just what a difference embracing digital IT transformation (or failing to embrace it) can make to your business.
There are 4 main areas of transformation that you need to consider:
1. Process transformation
This is most appropriate when a business needs a radical transformation.
It can modernize your processes, integrate new technology, and save money, while still incorporating your core systems.
Process transformation can result in the most drastic changes to your business.
Before you begin, and to help decide whether it’s the right step for you right now, you need to ask yourself what your goals are for transformation:
· Do you need to upgrade your systems?
· Will you need to bring in new technology?
· Will you change your processes to a new structure?
It’s really important to set baseline metrics when deciding on process transformation. These will help you understand if the transformation is a success.
So, as well as setting new KPIs (Key Performance Indicators), you should also set baseline metrics based on your expectations of the new structure, and the typical results of your old structure.
Include things like time, cost, errors, and downtime suffered.
You should involve your team in this process. Ask for feedback on how your current system is working, it’s benefits and drawbacks.
Find out how the people using the systems would make improvements, and how their jobs could be made simpler. What would they like to see in a new system? How can they see new processes improving their role and making them more productive?
This kind of feedback can give you the most valuable insight into how your systems should be working to make the biggest improvement.
And before you embark on process transformation, you should create an ideal workflow path. This will help you identify the areas that you need to focus on first, and to really understand both the system tasks that take place, and the human element too.
2. Business model transformation
As we saw in the case studies, it’s possible to adapt or even completely reinvent your current business model to open up new opportunities for growth.
Never has this been more evident than in our post-pandemic society. Covid-19 really changed the way we think about customer experience and digitization of products and services.
As businesses we were forced to make quick decisions and digitally transform practically overnight. And although there was some tweaking along the way, we learnt a lot about the barriers that are actually in place to prohibit change, and those that we place there ourselves – you just need to look at the way the healthcare industry quickly overcame privacy concerns when it shifted to virtual appointments.
Not every business model transformation needs to be at the level of Netflix. It could mean something as simple as using data to offer customers add-on products and services that complement what they already buy, and the needs they’ve communicated to you.
3. Domain transformation
This is not necessarily the most commonly used area of digital IT transformation, but it’s worth your consideration.
New technologies have the ability to redefine your products or services in a big way. A good example of this is the way Amazon moved into a new domain with AWS (Amazon Web Services). AWS is now the most popular cloud service provider in the world.
While it wasn’t an obvious move for Amazon to dip a toe into the cloud computing industry, it was able to leverage services it already used – in this case, massive storage capacity – to create a brand new offering to its customers.
Lego also did this with its expansion into film and gaming.
Think about the products and services you already offer. Is there anything that you currently use that could be leveraged to offer another product or service?
4. Organizational transformation
It’s crucial that if your business spends time and money updating its technology and designing its processes and products, that its internal values and behaviors evolve to mirror this change, too.
Failure to get buy-in from your people could result in the complete failure of your transformation, even if everything else is primed to work. Just a little resistance can mean adoption of your new technology is slower than it should be.
And you don’t need us to point out that the result of this would be a loss of revenue, productivity, and potentially even your people.
Make the time to clearly communicate your vision for transformation. Do this regularly. Involve your people in the processes, and ask for – and importantly, listen to – their feedback along the way. Everyone should understand the risk and why it’s worth taking.
Regardless of your sector or industry and your current infrastructure and systems, any digital IT transformation strategy has 3 very important rules:
Rule 1: You must modernize your existing critical IT infrastructure if you want to increase efficiency and your management overheads.
Rule 2: You must automate your IT processes if you want to reduce risk and accelerate provisioning and deployment of applications. This includes automating the delivery and use of IT services.
Rule 3: You must transform your IT processes and operations if you want to align your IT goals, your staff, and their roles.
Of course, this is a very brief overview to a process that can be extremely complex.
Here’s a great quote on this, from transformation scientist George Westerman:
“When digital transformation is done right, it’s like a caterpillar turning into a butterfly, but when done wrong, all you have is a really fast caterpillar.”
That means, without the right investment from you, digital IT transformation just won’t happen. You need to have the right systems in place, but if you don’t know how to use them properly, you haven’t really transformed anything.
Ready to talk about this for your business? Let’s arrange a no obligation conversation to run through all the areas that will be most important.
Meta Title: What could digital IT transformation do for your business?
Russian cyber-attack threat: How to protect your business
The ongoing Russian invasion of Ukraine has led to a sharp rise in cyber-attacks.
And while many of the attacks are between these two countries, there is very real potential for other countries to fall victim to cyber-attacks by Russia, thanks to the sanctions placed upon it.
President Joe Biden’s declared the government has been improving national cyber security defenses for some time now.
They’re focusing on the infrastructure to make sure that water, electricity, and oil pipeline services aren’t at increased risk of attack.
The White House has also issued a warning and some very good cyber security advice to all businesses.
There are a series of actions that businesses should be taking immediately to protect themselves against cyber-attacks, and other data security risks.
To start with look at implementing multi-factor authentication. This is where you generate a login code on another device, to prove it’s really you logging in.
Data backups should also be checked on a regular basis. Ideally there should be a copy of data that cannot be changed during a cyber-attack.
All data should also be encrypted, meaning it would have no value and be unusable if anyone did manage to access it.
It’s also a good idea to have an emergency plan ready to go that will help mitigate any attack quickly and effectively.
Businesses are also being advised to give their staff training to help them spot and avoid the common tactics used by cyber criminals.
These include phishing attacks where they send an email pretending to be someone else. And spoof login web pages, where they hope you will enter real login details in error.
If you have an IT support partner already, speak with them to make sure all of your systems are fully up-to-date and patched as necessary.
They can also help you to audit how well you’re performing with the items above, and get a plan in place to help you respond to an attack or attempted attack.
If you don’t have an IT support partner – or you feel your current one isn’t able to help you with your data security, we can help. Call us.
Meta Title: Russian cyber-attack threat: How to protect your business
Meta Description: How to protect your business
Meta Keywords: russian cyber attack threat IT Ukraine Email Scam Protect your business
Your essential cloud migration strategy checklist
If you’ve ever considered moving your business’s data and applications over to a cloud-based solution, you’d be forgiven for breaking out in a cold sweat and forgetting about the entire thing.
It’s complex. And there’s a lot that can go wrong from increased downtime to data loss or things not working as they should.
But when you get it right, the benefits are countless. They can include big cost savings, increased security, and better scalability. Not to mention access to extra features that may be available.
Download our brand new guide to see how your business would benefit. It includes an essential cloud migration checklist.
Printing devices are often overlooked when it comes to security. But the reality is, cybercriminals can hack your printer to get confidential information
Your printer is probably the last piece of computer equipment you thought needed protection from cybercriminals. But the truth is very different. Attackers actively try to locate the weakest links in security to gain access to and exploit valuable data. And among the weakest links is the printer. The thing with printers nowadays is that they have access to your devices, network, and the internet. This new open-access functionality makes them an ideal target for cyberattacks. Unfortunately, many business owners overlook the importance of securing their printers and mainly focus on computers and mobile phones. Most people still perceive printers as internal devices that serve basic functions. For this very reason, they are an easy target for cybercriminals. Other than performing unauthorized print jobs, hackers can access confidential information as well as all connected computers and networks all through a printer. You may also not be aware of the amount of valuable data your printer can store about you – tax files, bank details, financial records, employee information, personal information, etc. All a hacker needs to do is get into the operating system of your printer, and they can collect this sensitive data. If you’ve just realized the importance of securing your printer, keep reading. This article shares eight tips to help you do just that.
TIP #1. MAKE SURE YOUR PRINTERS ARE CONFIGURED CORRECTLY
Many things can make a printer vulnerable to cyber threats and security breaches. So, you want to get the basics right to ensure the attacks don’t happen to you. To start with, make sure to change the default password on your printer. Since anyone can access a printer remotely, a simple “123456” code won’t suffice. Second, make sure you’re using your own router to print files remotely. Never connect to “Guest” networks.
TIP #2. INSPECT PRINT TRAYS REGULARLY
This one is a no-brainer, but everyone could use it as a reminder. Make sure to check your print trays and get rid of unused pages carrying sensitive information. There’s no easier way to prevent data leaks than this. Alternatively, you can get a shredder for your office and shred the papers you don’t want anyone to see.
TIP #3. INSTALL MALWARE AND FIRMWARE UPDATES
Invest time and effort to ensure that your malware and firmware protection are up to date and can handle all types of hacks. The good news is that many printers come with pre-built malware protection. HP, for example, installs the HP “SureStart” software in their printers that monitors approaching targets when the printer is on. The software can shut down the device if an attack comes its way. This is a great way to prevent attacks from spreading further within the network.
TIP #4. LIMIT ACCESS TO THE NETWORK
Unprotected printers in a network are an extremely easy target for cybercriminals. Sure, businesses and offices require printers to access networks to perform remote prints. But if you can do the job by disabling the network access, make sure you do that. If not, tweak the printer and network settings to only allow the device to take print jobs from the network you trust. This will help avoid outside interference and security breaches.
TIP #5. UPDATE YOUR PRINTERS
Updating a printer is equally as important as updating your phone to the latest software. Much in the way iOS developers look for bugs and fix them in a new update, printer manufacturers work toward known device vulnerabilities and update the software for added protection. Look for printer updates so you can easily overcome known threats to the printer. Ideally, update your printers every quarter to get the most out of the security benefits.
TIP #6. INSTALL A FIREWALL
If you run an office, chances are you already have a firewall. But in case you missed this requirement, now’s the time to do it. Using a reliable firewall helps keep printers safe from cybercriminals. Your computers most likely come with pre-built firewalls, and all you need to do is keep them enabled. But there are also specialized firewalls for homes and offices that offer advanced security and make it virtually impossible for anyone to break in.
TIP #7. ENCRYPT YOUR STORAGE
Printers with shared networks can perform distance printing. And when a print job is in transit and travels from a computer to a printer, hackers can intercept the data and exploit it.
To keep this from happening, encrypt your print jobs. Also, make sure the sensitive data on your printer’s hard or internal drive is encrypted as well. Keep in mind that when you print a document, that file is often stored as an image within the printer and makes it an easy target for hackers. It’s why you should use an encryption tool to protect your data. Luckily, many modern printers have this tool pre-built. You can use the tool to set up a secure password that allows printer storage encryption, remove user IDs and ex-employee access, delete documents from the print queue once they’re printed, and much more.
TIP #8. EDUCATE YOUR EMPLOYEES
If you work in an office, chances are you aren’t the only person using the printer. Everyone that has access to it needs to be aware of the responsibilities that come with its usage. Make sure to talk to your employees about ways to ensure both the physical and virtual safety of the printers. Your staff should also be careful when using their mobile devices to print, as smartphones are easier to hack. Explain to them what phishing scams are and how they can avoid being the victim. Finally, make sure it’s clear to them how they can use confidential information in your company
IT’S TIME TO ENSURE PRINTER SECURITY
Printers are the most overlooked devices when it comes to security. Given how most business owners consider them as merely internal devices whose sole function is to print documents, it’s no wonder they are a weak spot security-wise. Whether you use printers in your office or at home, take a moment to see how you can enhance its security before your next printing job. As cybercriminals are a growing concern, each of us is responsible for protecting our data. Luckily, the tips from this article will help you bring your printer’s security to another level. If you need more insight into protecting the security of your printers, get in touch with us today. We can set up a 10-15-minute chat to discuss how you can implement these changes and keep cybercriminals away.
Article used with permission from The Technology Press
Meta Title: Printing devices are often overlooked when it comes to security
Meta Description: Printing devices are often overlooked when it comes to security. But the reality is, cybercriminals can hack your printer to get confidential info
Meta Keywords: cybercrimminals security devices cyberattacks printers technology IT Information techology
Two thirds of remote workers use a faulty device, so they don’t get into trouble
A new report has discovered that 67% of remote workers are using faulty tech when they work remotely.
And often that’s because they’ve accidentally damaged the tech themselves… they don’t want to admit it to their boss in case they get into trouble.
A company that sells refurbished technology surveyed 2,500 employees.
It found that laptops were most likely to be broken, followed by keyboards, monitors, and PCs.
Most of the time the damage was done by spilled food and drink. Other causes of damage included other people in the house – such as a partner or housemates – and of course, pets.
We’ve all watched in horror as a cat brushes up against a full glass of water next to a laptop…
While more than half of people try to fix the damage, and 81% of people continue to use their faulty device with limited features, a third of workers switch to their personal devices instead.
As well as this causing a loss of productivity, it could also be a huge data security risk for your business.
Because it’s possible their personal laptop doesn’t have as much security protection as their work laptop does, such as:
· Security software
· Data encryption
· Enhanced password protection such as multi-factor authentication
Their personal devices also aren’t being monitored by your IT support partner.
When an attacker gains access to an unmanaged device, if it’s connected to your network, it’s possible they can get access to the wider network, and all of your business’s data.
This can result in your data being stolen and sold. Or worse, your data being encrypted so it’s useless to you – and you must pay for its return. This is called a ransomware attack and it’s the greatest cyber security threat to your business right now.
It’s not just access to your data that’s the problem. After a ransomware attack, there is a huge time and financial cost involved in making sure your network is clean, protected and secured.
Our advice is to make sure that everyone in your business understands the risks involved with using personal devices for work purposes, whether they work remotely or not.
You might want to make a golden rule that all work must only be done on business devices.
You could also create a culture where it’s OK if a device gets damaged, so long as it’s reported quickly.
If you need any help choosing the right technology or cyber security approach for your team, or creating new policies to help your staff choose to do the right thing, give us a call.
Meta Title: Two thirds of remote workers use a faulty device
Meta Description: A recent report has revealed that instead of reporting damage, a third of remote workers would simply start using their personal device instead.
Meta Keywords: Spilt drink on computer Cyber Criminals Vulnerable data Security software Data encryption Enhanced password protection Multi-factor authentication IT support Personal Devices Employee Cyber Security Tech Technology Damaged device Broken Device
The 7 KPIs for ROI from IT
How to ensure your business’s spend on IT is an investment, and never an expense
No matter what kind of business you run, technology sits at the heart of it today. And it’s going to become more and more important in the future.
Big business thinkers see IT as a long-term investment. They understand the correlation between the short-term impact to cash flow, and the enormous long-term benefits of business growth, increased productivity and highly satisfied staff and customers.
To get your Return on Investment (ROI) there are several Key Performance Indicators (KPIs) to track. Our new guide tells you what they are.
The security problem of John’s “other” laptop
How to keep your business’s data ultra-safe during the Work From Home revolution
Working From Home and hybrid working are here to stay. And that means as businesses, we need to get a grip on security in our staff’s homes as much as we do in the office.
We’ve written a new guide to look at all the issues.
Defend and invest: Your technology strategy for 2022
Did you get a short break at Christmas? Even if it was just a few days, that break can give you a clear mind about where to take your business this year.
We call this the January Refresh & Refocus.
Let us tell you the two technology areas that will be the most important in 2022. They are Defend and Invest.
Defend is about protecting your business from cyber criminals. We believe cyber-crime is going to rise again this year, to levels never seen before.
Invest is about making sure technology is powering your business forward, not holding it back.
Our new guide looks at both these areas in detail.
Here’s a crazy question: Are you paying your IT support partner enough?
I bet that’s a question you’ve never asked yourself before…
But it’s important you do. Because in the world of technology, there’s a definite link between what you pay, and the quality of the service you receive.
Picking an IT provider on price alone is a false economy. If you’re paying too little, you’re running one of four big risks.
Find out what they are in our brand new guide.
Windows 11: The wait is over
All the benefits of using the very latest version of Windows in your business
After a four month wait, a brand new version of Windows is finally here. It’s a lot more secure, has better functionality and greater possibilities.
And it looks beautiful.
New PCs are now on sale with Windows 11, and the upgrade will be available for existing computers early next year.
Not all machines will be able to upgrade. There are tough hardware requirements.
We’ve listed them, plus the best benefits of the new Windows, in a brand new guide. It’s written so anyone can understand it.
Be prepared: Sooner or later your business WILL be attacked
5 steps to improve your ransomware resilience
Ransomware is the most terrifying data security threat your business has ever faced.
Imagine all your staff trying to login one morning. But all of them get a bright red screen saying your data has been locked away, and you must pay a huge ransom in Bitcoin to get it back.
Read our new guide now. We’ll answer all your questions about ransomware. Plus, you’ll discover five steps to improve your business’s ransomware resilience.
If your IT support company is ALWAYS fixing your technology… it’s time to switch
Improve profits with your IT partner’s Proactive Problem Prevention
Just fixing technology when it breaks is so 2010. These days most businesses prefer an IT partner who proactively prevents problems from happening.
If you don’t have this, you really need to read our brand new guide. You’ll see the countless benefits for your business of a more proactive approach to your IT.
10 apps you didn’t know you had in Microsoft 365
Boost productivity, save time, and improve customer experience
Most people see Microsoft 365 as the place to access Word, Excel, PowerPoint, and Teams.
But there’s so much more to it than that. There are so many apps bundled in, that whatever productivity problem you have in your business right now, the answer could be within 365.
Get our new guide. And we’ll tell you about 10 useful Microsoft 365 apps you didn’t even know you already had.
The biggest security threat to your business is on your payroll
Revealed: The real cost of insider attacks – and your strategy to prevent them
The chance of your business’s data being breached by an inside attack is high.
Most inside attacks are accidental. A well-meaning employee clicks on a bad link by mistake.
But there are some attacks caused by malicious attackers, deliberately looking to do damage, or make money.
Both of these kinds of attacks can be prevented and minimized by focusing on five key areas in your IT strategy.
Read our new guide now to assess how prepared your business is.
These are the threats to worry about
An easy to read guide to the 9 most terrifying types of malware
All businesses are being targeted by malware, all the time. And it’s estimated there are now one billion pieces of it out there.
What is malware? It’s malicious software that’s been designed to do damage to your IT systems or steal your data.
Malware terrifies most IT professionals. And it should terrify you too.
We’ve written a brand new guide to tell you about the nine most common types of malware. It’s been written so anyone can understand it.
Crisis: Your office is on fire
This is something none of us wants to experience. But it does happen.
There’s a small fire in your office. No-one is hurt and everyone is safe. But the damage to your workplace is unbelievable.
The flames. The heat. The smoke. And of course, the huge amounts of water used to put out the fire.
Here’s a good question – if there had been a fire in your office last night, what would you wish you’d got round to doing yesterday?
Think about all your computers and specifically the data on them. Is your data as protected and backed up as it could be?
Are you triple sure of that?
Read our brand new guide now. It’ll show you the things you need to make a priority to keep you protected from any disaster.
Cyber-crime: Your business’s 5 step plan to prepare and protect
Two years ago, two thirds of all organisations reported some type of incident relating to cyber-crime.
That’s bound to be higher now because of the fraud opportunities created by the rush to Work From Home.
In fact, overall, the world economy loses more than $1 trillion to cyber-crime every year.
It’s a figure that’s increased by more than 50% since 2018.
Fact: Your business needs to be as prepared as it can be against the threat of cyber-crime.
Read our brand new guide now. And you’ll see our recommended 5 step plan to prepare for an attack, and protect your business.
Repair or replace? 7 signs that you need a new computer
It’s always tempting to hold back on purchasing new IT equipment. Yet it can sometimes cost you more if you hang onto equipment for too long.
Did you know that if a device is more than 3 years old it’s cheaper to buy a new one?
A 5 year old PC could cost twice as much to run as a new one
A 4 year old PC suffers 55% more security incidents than in its first 3 years
It’s all about getting the balance right. Between equipment that can be repaired and will happily last another couple of years – versus slow, unproductive equipment that really needs to be replaced.
Read our brand new guide now. And you’ll learn 7 signs that will tell you whether you need new computers.
The top 5 questions you could ask us, that we’d love to say ‘YES’ to
The pandemic made hundreds of businesses round here question the quality of the IT support they were receiving.
We’ve been very busy recently talking to businesses, and onboarding new clients as their IT partner.
There are five questions that you could ask us, and we’d be delighted to answer with a very positive YES!
So, we’ve put them into this brand new guide. Download it instantly.
Your 2021 productivity super guide
Ready to make this a wildly successful year for your business?
To shake off the memories of 2020, and focus on increasing sales and profitability? Excellent.
A great place to start is helping you and your team to get more done in less time.
We’ve pulled together a productivity super guide, looking at setting goals, collaboration, and communication. And of course, it lists our most highly recommended productivity tools.
Download your guide instantly.
5 key IT areas you must address in your business’s 2021 growth strategy
All business owners and managers hate it when their staff’s productivity goes down.
Bad IT is often used as an excuse to start talking and stop working! So, now’s the time to make sure it can’t have a negative effect in 2021.
(it’s going to be a challenging enough year as it is)
You and your team could be more productive, more motivated – and ultimately make more money – with some changes to your technology strategy.
We’ve created a new, free guide to show you the 5 key things you must include in your IT strategy (number 3’s the one your staff will be delighted to help with).
Download it instantly – right now.
4 signs you’re under attack from ransomware
A ransomware attack is one of the most terrifying things that can happen to your business.
This is the computer attack where a hacker locks you out of your systems and data. And you must pay a ransom, typically in Bitcoin, to get access again.
What most people don’t realize is that hackers access your system weeks before they launch the attack. It takes time for them to set it up, and prevent IT security experts from helping.
So, there are signs to look out for – ways to spot if your system has already been breached, and an attack is imminent.
This is the ultimate secret to keeping your business data safe
Hackers are targeting all businesses, all the time. Using clever automated tools, and by sending out billions of emails every day.
It only takes one person to click on one bad link… and hackers can get into your system.
That’s why we’ve written a brand new guide. To tell you about the ultimate secret to keeping your business data safe.
You won’t believe how simple it is. Download your copy now.
Evongo securing Geelong businesses with quality IT security services
Is your Geelong small to medium business looking for trusted IT security services that will ensure the safety and wellbeing of your technology and data systems? Evongo is here to help. Our expert team of IT professionals are trained and fully equipped to safeguard your business from some of the biggest challenges they are facing today including malicious intrusions, external attacks, angry former employees, and identity fraud.
As a small business ourselves, we understand the multitude of concerns that businesses encounter. From managing a team of employees and marketing to hitting KPIs and making a profit. Often times, maintaining the general IT security of your business can be is the last thing on your mind, when in fact it is absolutely pivotal to its longevity.
Without professional and tailored IT security solutions, your business is vulnerable to network break-ins, theft of private information and data, as well as the financial well-being of your business.
Evongo’s services in IT security help to protect your business against threats such as these by implementing secure web, email, and mobile device security systems, building firewalls, conducting penetration tests and vulnerability assessments, installing VPNs and data loss prevention technologies, in addition to enforcing workplace security policies. With Evongo’s expertise, you can assure the safety and long-life security of your Geelong business.
If you’re in a position where you believe your small to medium Geelong business could be at risk of IT attacks, then you must get in contact with us today on (03) 5228 3000 or visit us at Suite 7, 18-20 Riversdale Road Newtown.
We at Evongo pride ourselves on outstanding customer service and ongoing support and can provide completely tailored and flexible solutions to suit your business’s circumstance. We look forward to hearing from you soon.
Meta Title: Geelong IT Security Services - Evongo
Meta Description: Evongo offers Geelong small to medium businesses with advanced IT security services to ensure the safety of their business. Contact us today on (03) 5228 3000.
Workplace Cybersecurity Policies Geelong
Workplace cybersecurity policies are crucial documents made up of various statements that guide employees behaviour in reference to the security of private company information and IT systems. Such policies are not reserved only for big corporations like Apple or Amazon but are important for small to medium Geelong businesses.
We at Evongo help your small business develop a strong workplace cybersecurity policy that provides a clear guideline to the employees within your business, and in turn, builds a secure wall against exterior cyber threats.
Cybersecurity issues, minor or large, can have devastating impacts on small businesses, such as the loss of confidential information and data. To avoid this, you must provide employees with a workplace cybersecurity policy.
These policies are developed under the guidance of the Australian government and aim to protect businesses against the following cyber threats:
Malicious Software (Malware), which involves the viruses and spyware that infiltrate your computer systems in order to obtain private information such as passwords or credit card numbers.
Policies also help to prevent employees from clicking on scam emails and enabling hacking. Also known as ‘phishing’ these fake emails and/or social media messages impersonate an organisation in order to steal classified information from the business.
Another threat that faces small businesses ’ cybersecurity is ransomware which locks down your cybersystems and asks for payment in order for you to regain access. It is recommended in the Australian Cuber Security guide for small businesses to never pay a random as re-access is never guaranteed and you may put yourself in a position to be attacked again.
As part of our cybersecurity policies, Evongo guides employees through key areas of consideration that include the reasoning behind automatic updates, backups, access control, and encourage a multi-factor authentication measure, which requires two forms of proof to allow access.
Contact us on 1300 765 975 and talk to our expert professionals to start developing your cybersecurity policy for your small business in Geelong today! Our team look forward to your call.
Download the Australian Government Small Business Cyber Security Guide Here
Meta Title: Workplace Cybersecurity Policies Geelong - Evongo
Meta Description: Evongo offer comprehensive workplace cybersecurity policies for small businesses in Geelong. Call us today to ensure the safety of your business on 1300 765 975
Business dark web scan Geelong
Dark web scanning is the practice of scanning the dark web (the darknet) to find if any individual’s personal or corporate logins and passwords have been compromised. If you know, how to look, and where to look, on the dark web it is not uncommon to find compromised passwords for sale on the dark web. And it’s not just passwords. The dark web is a very murky place and is a rabbit warren of data. Blogs and forums, chat rooms, private networks and hidden sites.
Typically the higher the level the employee in a particular business the higher the exposure to risk for the business if this information has become available for sale on the dark web. Based in Geelong but working for businesses across Australia it is not uncommon for us to find compromised passwords for executives for sale on the dark web.
Business continuity and cybersecurity are the champions of protecting your business and often considered the front line in protecting your data. But what if your usernames and or passwords have been stolen and or compromised. How would you know? What are the best practices to protect you from the dark web?
At Evongo we regularly perform dark web scans here in Geelong for small, medium and large businesses. You would be surprised how often we find compromised passwords for sale. The dark web is a very murky place and is a rabbit warren of data. Blogs and forums, chat rooms, private networks and hidden sites.
Business accounts, stolen email addresses, passwords and usernames. You would be amazed at what you can find for sale on the dark web. With the potential for exposure to risk can you afford not to have a dark webs scan done?
Evongo also offer Geelong businesses reliable and advanced IT support.
If you would like to discuss getting a dark web scan done for your business and your staff, give us a call now.
Meta Title: Dark web scan - Evongo Geelong
Meta Description: Dark web scanning can detect threats that any size business can be oblivious to. Stolen information, data, login access and more. Call Evongo Geelong
Remote home IT support Geelong
COVID-19 has changed the way the world does business forever. In a scramble to get employees set up to work from home, many employees are utilising their staff’s hardware and internet connections. Remote home access IT support is where we access your home computers from our offices in Geelong via remote access and provide all the IT support required. The remote support we offer may include but not limited to:
Personal home computer hardware is not without its risks. Old, outdated equipment, questionable software, potential Trojans are gaining access to your system, limited virus protection if any and limited internet access (varying Internet Service Providers ISPs). At Evongo, we can provide an effective audit of all elements to actively run your business from multiple home locations with limited risk.
We are ensuring secure connections and that all required software is running smoothly. And if there is an issue when IT support is needed, we can be online very swiftly to address any questions or concerns you have.
Post COVID-19 the world is going to be a very different place, and many businesses will be reviewing work placements arrangements. It is now given now that many companies Post Covid-19 will be having more staff working from home. A report in the New Daily has a headline stating “Almost half of the workforce to work remotely after Coronavirus“.
If like many businesses you are contemplating a workforce restructure and need to step your IT resourcing up a level call Rod and the team at Evongo. Geelong’s specialist remote IT, support team, keeping businesses and staff connected.
Meta Title: Remote home IT support Geelong - Evongo
Meta Description: When you need remote IT support call Evongo on 03 5228 3000. And because it's remote we can service you anywhere. You just need an internet connection.
Working from home remote access to emails and files, Geelong
If you are an existing client of Evongo here in Geelong, then the odds are that we already have you well set up for remote email access and remote file access. If not, this is something we can organise promptly. Occasionally there may be hurdles; however, this is rare.
If you are not an Evongo client, we can also help. As the pandemic spreads and all indications are that it will, it will not always be possible to visit on-site, but with remote access capabilities today we may be able to assist.
While it is possible to set up the following as needed for working from home:
Remote access emails
Remote file access
Remote access for staff (with limited or restricted access)
At Evongo, we would recommend that as a business owner, you act sooner rather than later so that you are 100% set up to operate remotely in a worst-case scenario. Be prepared as best as you can.
Working from home enables staff to continue to work while either self-isolating and or to allow social spacing and assist in delaying the onset of the pandemic.
Call Rod and the team now for an initial assessment of what they can do for you to assist you or your team members in working from home with full remote access for all your staff. It’s often more straightforward than you expect and once set up; it will hold you in good stead moving forward. At Evongo, we are your business continuity experts.
Meta Title: working from home, remote file and email access Geelong
Meta Description: Working from home and need access to emails and files. Talk to Rod and the team at Evongo, Geelong. Your business continuity is our business.
Business continuity and your business in Geelong
What is business continuity?
Look up business continuity online, and you will be overwhelmed by a plethora of definitions using terms that are designed to shock. ‘Critical’, ‘disaster’, ‘fire’, ‘recovery’, ‘incident’, ‘cyber-attack’,’ flood’ and ‘dangers’ are just some of the words you will be confronted with on the home page of Google when searching for “IT and business continuity.”
While this is alarmist, this is what can happen when you don’t plan for business continuity at an IT level. Sadly for many local businesses here in Geelong, these words only come to mind when it is too late. Regardless of what incident has the potential to cause you pain, if you are prepared for such an event or incident, then the pain will be minimal if at all. Your customers will be none the wiser and business continues as per usual.
Business continuity is your ability as an organisation to continue functioning relatively unabated should a critical incident happen to your Information Technology (IT) systems. Business continuity is about;
Process / instruction
Peace of mind
When it comes to business continuity, you need to rely on the three core elements
At Evongo, we take the hassle and the stress out of your IT business continuity planning and implementation. We will develop the required plans by identifying vulnerabilities and critical data sets in your business. We can then implement state of the art continuity plans and processes so that in the event of an incident occurring to your business you can continue functioning and you the business owner can do what you do best and make money.
Evongo also offer Geelong businesses reliable and advanced IT support.
No matter the size of your business n Geelong, small, medium or large, the threat of cyber attacks is growing. Cybersecurity for business (and not just Geelong) is something that needs to be taken incredibly seriously. We find that we are often called after a cyber attack has happened. As the adage goes, “prevention is better than the cure”. Calling an IT business to come in and do a cyber attack rescue is sometimes like calling the fire brigade after your house has already burnt down and you have no insurance.
Before we get into some cyber threats to consider this year, the best thing you can do is prepare your IT defences as best you can in advance. Contact an IT professional and implement simple processes and systems.
Install a monitored firewall
Update your email system with your IT supplier
Educate your staff (don’t click suspicious links)
Set up a backup system for local files (remote and offsite)
Backup your cloud systems regularly
Test your backup system
Update old and outdated hardware
Update old and outdated software (E.g. Windows 7 end of life)
It’s very difficult to retrieve data from a backup that doesn’t exist.
Threats on the rise
Crypto Locking Ransomware
Ransom ware continues to be a major issue for small to medium businesses and you would be amazed at how many local small to medium businesses in Geelong have been impacted. The re is often this misguided belief that hackers won’t be interested in your small to medium business here in Geelong. Think again. You are wrong if you are complacent. These people aren’t doing this manually. Thye have bots scouring the world wide web looking for businesses like yours that are vulnerable. There has also been a move to crypto hacking. The art of hijacking (unauthorised access) to your computer to aid in data mining for cryptocurrency.
Cyber security shortfalls
The advance in techniques adopted by cyber-attacks is growing rapidly and unless you are monitoring and aware of advances being made by these malicious cyber attackers you may be left vulnerable and exposed. IT security is not a set and forget checklist item for your small to medium business. It is 24 hours a day seven days a week. Bots don’t take weekends off, in fact, they never take a break.
When security patches are released you need to activate them as soon as possible. Ideally, within a 30-day window as a worst-case scenario. It very hard to update a patch sometimes when you are too busy to be aware that a security patch has been released. (Windows 7 will create an entire raft of issues for those that have to update after Windows 7 End of Life)
The disgruntled employee
A disgruntled ex-employee may still have access to proprietary and confidential data or even worse a current may be logged in to areas when unauthorised or logging on to restricted computer files? Staff are downloading new applications on systems they shouldn’t be. You need to talk with your IT professional. This is not something again that can be monitored internally. The threat here is real and needs to be considered.
The Cloud is safe. No need to worry
Again, you can’t be complacent here. The cloud is not safe and your small to medium business needs to be prepared and following processes and protocol. At the end of the day, it gets down to awareness and process. Back up your files offline regularly. Are you using cloud-based services, are you using layered.authentication? Be aware it’s not straight forward. It needs to be considered.
Cybersecurity is a real threat for all businesses in the new millennium and calling an IT expert after you have been cyber-attacked can be too late. Based in Geelong we service clients from all sizes of business in a vast range of business and industry categories. If you are concerned at your risk and exposure to cyber-attack call us now to discuss how we may be able to help.
Meta Title: Small business cyber security Geelong. Should I be worried?
Meta Description: Geelong based Evongo is a leading cyber security IT business. We protect you from the web. Most people don't worry about cyber security until it is too late.
Windows 7 End of Life
Does my Geelong business have to upgrade from Windows 7?
The definitive answer is YES. Stop running Windows 7 and upgrade.
Windows 7 was released back in 2009 at the same time that Windows Server 2008 was released. It essentially was released to get on top of many issues with Windows Vista which had not been received well for a variety of reasons. The release of Windows 7 and Windows Server 2008 was welcomed with open arms and generally considered a very successful improvement from Windows Vista.
When does Windows 7 stop working?
Windows 7 won’t stop working, it will continue to work however on the 14th January 2020 Windows 7 will reach its end of life phase (EOL). This essentially means Microsoft will no longer continue supporting Windows 7 or Windows Server 2008
no paid support
No (security) patches
No security Updates
If you continue to use either Windows 7 or Windows Server 2008 , you are leaving yourself and or your business wide open to exploitation. If new vulnerabilities are exposed your computers and or network can be exposed. The simple fact that Microsoft have been so vocal in declaring the EOL means hackers will be lining up to find those running these week and vulnerable systems and machines. Don’t leave your front door unlocked and wide open for Cyber criminals to walk right on in.
Your system will become vulnerable to hackers
Your business may be exploited as an attack vector against a larger businesses (this is not good)
If you continue using Windows 7 or Windows Server 2008 you can purchase what is known as an ESU or Extended Security Update. This has a scaled cost and increases incrementally year on year. There may be a legitimate reason due to applications you may be running to maintain Windows 7 or Windows Server 2008, however the reality is that this will only apply in a very small percentage of business and maintaining Windows 7 and or Windows Server 2008 is not a long term option.
If you are a local Geelong based business or operate within the Bellarine or the Surf Coast you really need to give us a call.
If you haven’t already contact an IT professional (This is very serious and needs to be addressed)
Evongo also offer Geelong businesses reliable and advanced IT support.
If you have any concerns or need more information call us now.
Meta Title: Does my Geelong business have to upgrade from Windows 7?
Meta Description: 14 January is the deadline for End of Life phase for windows 7 and Windows server 2008. Geelong region based business and need help to understand? Call us now.
Meta Keywords: Windows 7, Windows server 2008, Geelong
IT security services Geelong
In today’s increasingly interconnected world, IT security services are more important than ever and Geelong is not immune from the malicious hackers scouring the web. With the advent of the Internet of Things (IoT), we are more connected to the world via our devices – but this has important implications for privacy and security.
What is the IoT?
The Internet of Things (IoT) describes the network of connected smart devices, such as baby monitors, TVs, fridges, toasters and more, exchanging behavioural data with each other. On the surface, these devices aim to make our lives easier – but it’s important to remember the data exchange is not necessarily a one-way street.
How does it impact privacy and security?
With the increased connectivity the IoT and smart devices offer, comes increased risk of attack.
In order for these devices to help us, they need to watch or listen to what we do. However, if the devices are not fitted with encryption and the right security, hackers can gain access and control over not only the data, but the device itself.
In some cases, parents found baby monitors were being hacked to yell at sleeping children, and in a recent experiment, hackers were able to disable a cars accelerator through the entertainment system.
Do I need IT security services?
With our experienced IT security services team, Evongo here in Geelong can test and inspect your networks, technology and programs to ensure maximum data integrity and prevent the likelihood of hackers accessing your information.
By identifying potential weak spots, we can implement effective access control, technology and security policies to protect your business from potentially costly data breaches or attacks.
Please contact us to find out more about the IoT and if your IT security services are up to date.
Meta Title: Geelong IT security services and the Internet of Things - Evongo
Meta Description: IT security services are more important than ever. With the Internet of Things (IoT) connecting devices to the world, privacy & security are crucial.
The Notifiable Data Breaches scheme – what you need to know
Under the Notifiable Data Breaches (NDB) scheme, organisations and IT providers are obligated to notify individuals where personal information involved in a data breach and likely to result in serious harm. At Evongo, we are dedicated to protecting our clients and ensuring we are compliant with all obligations.
What are my obligations in the case of a data breach?
The Privacy Amendment (Notifiable Data Breaches) Act was passed in 2017 and requires organisations to:
notify individuals where their personal information is involved in a data breach situation and could result in serious harm
recommend steps individuals can take
notify the Australian Information Commissioner about eligible data breaches
be prepared to undertake suspected data breach assessments to determine the severity of the breach and likely impact.
The NDB applies to Australian Government agencies, credit reporting bodies, health service providers and businesses and not-for-profit organisations with an annual turnover of $3 million or higher. You can find out more via the Office of the Australian Information Commissioner website.
How can our IT providers protect your business?
Our trained specialists conduct vulnerability assessments and testing to understand potential points of weakness in your business, and install security frameworks and programs. We can:
perform penetration testing to assess how effective your business security measures are
install and test firewalls
encrypt data using a VPN
enforce access control and web security policies
monitor emails and mobile devices.
At Evongo, we ensure all staff are educated and trained in the latest IT systems, data, access and protocols, and all staff policy documents are kept up to date – so we can help you protect your business and your data.
Meta Title: The Notifiable Data Breaches Scheme - Evongo
Meta Description: Evongo's IT providers ensure clients are protected and compliant with the Notifiable Data Breaches (NDB) scheme.
What you need to know about choosing the right Geelong IT provider
Is your current IT provider supporting your business the way you need? Here are some things to consider when choosing the right Geelong IT provider to help your business improve security, efficiency and processes.
Can your IT provider scale their services to meet your business needs?
At Evongo, we work with both large and small businesses and can adapt our processes, technology, training and support to meet the needs of a small team or an organisation with multiple sites. We make the effort to understand our clients’ needs, and tailor solutions to suit a vast array of industries, from manufacturing and construction through to financial institutions and not-for-profit organisations.
Do you have access to the latest technology?
Data and network security is a key factor when it comes to protecting businesses from the threat of fraud and costly data breaches. At Evongo, our experienced IT providers are trained in the latest data and networking technology, including cloud-based programs and mobile device management.
Does your IT provider offer training?
Implementing new technology and processes should be simple and cost-effective for your business. Your business will not benefit from new IT services unless everyone knows how to use them correctly, so training is an essential part of an IT provider’s service.
At Evongo, we have a fully flexible training program tailored to the specific, custom programs and technologies we implement as well as your specific business requirements.
Do you receive the support you need?
Technology is a vital part of any business, so it’s important to have the necessary support in the event of any issues. We have a range of support programs with the core focus of keeping your IT systems and technology functioning at optimum capacity so you can focus on growing your business.
At Evongo, we have more than 15 years’ experience as a leading IT provider in Geelong, tailoring high-quality, cost-effective solutions to help businesses maximise efficiency and productivity.
Please contact us for more information about how we can work with your business.
Meta Title: Choosing The Right Geelong IT Provider - Evongo
Meta Description: Here are some tips from Evongo about choosing the right Geelong IT provider to help your business improve security, efficiency and processes.