SEO Friendly Title: IT services providers in Geelong

Focused on helping clients

Evongo is an IT services provider in Geelong, focused on helping clients turn their IT systems into the productive business asset they should be.

For more than 15 years we have been helping our clients achieve their business goals via our professional business IT support services, practical solutions and strategic technical advice. (more…)


SEO Friendly Title: Geelong IT services providers

Is your current IT provider helping or hindering your business? As experienced IT services providers in Geelong, the team at Evongo is here to help your business. From basic IT support to fully customised IT solutions, businesses get better results by partnering with Evongo.

Managed IT services

Simplify the management of your technology and keep things running smoothly with a managed IT services plan from Evongo. Our managed IT services are cost-effective and can be fully customised to suit your business requirements.

​Cloud services

Implementing the right cloud services in your business can help you gain greater agility, lower your risks and reduce your costs. Evongo’s cloud specialists can help you migrate to the latest cloud technology with confidence.

Mobile device management services ​

Evongo’s mobile device management services provide anywhere, anytime access to everything your employees need while maintaining security and control of your mobile devices.

IT security services

Businesses need to take every precaution to protect themselves from both external and internal security threats. Evongo’s IT security services specialists identify and reduce risks and maximise data integrity.

Data networking services

The ability to exchange information quickly, easily and securely is a focal point for organisations of all sizes. Evongo can design, deploy and maintain a customised data networking services solution to suit your business.

Business continuity services

Gain peace of mind knowing that if an unplanned event happened, such as a natural disaster, technology failure, malicious activity or user error, you can be up and running again as soon as possible with our reliable business continuity services.

IT strategy planning services ​

Evongo’s CIO-level IT strategy planning consultants will ensure you align the right technology solutions to your business goals. We will help you avoid wasting time and money on technology by creating a clear path forward via a technology roadmap.

Hardware and software

Get the very best price on all the latest hardware and software technology through Evongo’s network of leading distributors and IT vendors. Our experienced team will help source the right products to meet your specific needs.


SEO Friendly Title: Recommended Technology Platform


At Evongo, we work hard to build what we call our ” Recommended Technology Platform”. We know that using products across this platform will give you a great platform to operate your business from (we know this because we “Eat our own dog food” and use ALL of the services below to run our own company).
Our engineers are trained in and keep up to date with technology across this core set of products to make sure that we can quickly, efficiently and expertly assist you with working with those products.
We also maintain a strong network of contract engineers that we can call on for specific expertise in high level or advanced customisation of these core services.

Recommended Technology Platform

  • HP Servers
  • HP Desktops & Laptops
  • Microsoft Surface
  • HP Switches
  • Netgear Switches
  • HP Printers
  • Draytek Routers
  • Sophos Routers and Wireless
  • Ruckus Wireless
  • Ubiquiti Wireless
  • Datto Wireless
  • Webroot Anti-Virus
  • StorageCraft ShadowProtect
  • StorageCraft ImageManager
  • APC Power Systems
  • Eaton UPS
  • Microsoft Office365 (Exchange / SharePoint)
  • Microsoft Azure
  • Microsoft Server Platforms (latest release including Exchange and SQL)
  • Microsoft Virtualisation – Hyper-V
  • VMware
  • Microsoft Windows 10 Pro and above
  • Microsoft Office 2016 and above
  • Datto Office365 Backups
  • 3CX Phone System v15.5 and above
  • Yealink IP Phones
  • Rackworld Racks and Cables

Third Party Vendors

Whilst we pride ourselves on our troubleshooting skills and abilities to solve many different types of technical problems, please bear in mind that for 3rd party products outside our Recommended Platform, it may take us some extra time to familiarise ourselves with managing and supporting these products.

If the issues can and should be supported by the 3rd party vendor, then we may help you liaise with the vendor directly to get the problem solved in the most efficient and timely manner for you.

We may still be able to purchase items from other vendors at your request (depending on whether our distributors stock it), however if any unforeseen issues arise in the setup, installation and ongoing use, we may need to invoice you separately for this time.


SEO Friendly Title: News from your IT services providers in Geelong

As leading IT services providers in Geelong, the team at Evongo stays up to date with the latest technology and business IT services news across cloud computing, IT security services, business continuity, data networking services, and more.


SEO Friendly Title: About Evongo IT support services in Geelong

We are committed to helping you gain greater business success through technology

Our professional IT support team is well trained in the latest technology and industry-best practice and has a thorough understanding, built up through years of practical experience, of how to apply technology to improve business performance and achieve specific business objectives.

Whether you  want to simplify mobile device management, move your business to cloud computing or need assistance with business IT services in any way, we are here to help.

Thank You

SEO Friendly Title: Thank You

Thank you for contacting Evongo, we will be in touch with you as soon as possible.


SEO Friendly Title: Contact an IT services provider in Geelong

Evongo is a trusted IT services provider in Geelong and has been servicing the local area for over 15 years. If you are interested in finding out more about our managed IT services, cloud computing services, data networking services or other business continuity services, please contact us to arrange a free no-obligation consultation.


SEO Friendly Title: Legal



In these Conditions, the Rate Schedule and every Quote, Order, Plan contract, or other arrangement in connection with the supply of Goods or Services by Evongo Pty Ltd the following words have the following meanings:

After Hours” means from 17:00 – 08:30 Hours Monday to Friday and all day Saturday and Sunday, including Public Holidays;

Business Hours” means Monday to Friday from 08:30 to 17:00 hours excluding Public Holidays;

Client”, “You” or “Your” means a person who seeks or obtains a quote for, or who orders, Goods or Services from Us, and includes both a person whose name is on the Order or on an email attached to which is an order, a person who places an order, and a person on whose behalf an Order is placed or on whose behalf it appears and order is placed, and in any case each of their heirs, successors and assigns;

Conditions” means these terms and conditions;

“Goods” means any goods and/or services sourced by Us or provided by Us in connection with any such goods and/or services including computer hardware and Software and any goods or services provided in connection with any of those things;

“GST” has the meaning given to it under A New Tax System (Goods and Services Tax) Act 1999 (Cth):

“Order” means any order requested by You to Us for Goods or Services in any form;

“Quote” means a quote provided to You by Us;

“Period” means a particular number of half-days, days, weeks, fortnights, months, or any other period, as may be agreed between Us and the You as the period during which some Services will be provided;

“Plan” means any arrangement between Us and You (whether alone or in conjunction with any other person) for Services (including unlimited support) and/or the provision of Goods provided by Us under an arrangement in connection with Work agreed to be done or progressed for or on behalf of You or any other person at Your request, including as set out in a Plan Schedule;

“Plan Schedule” means the key terms applicable to Plans as set, and as may be varied by Us, from time to time in its absolute discretion without notice to You;

“Public Holidays” means any day which is a public holiday throughout Victoria other than a bank holiday;

“Rates” means the hourly rates and other charges for Services (including any call-out fees and any Return/Cancellation Fees) set out in the Rates Schedule, a Plan, Plan Schedule, Quote, contract or arrangement entered into by Us and You or in these Conditions, and includes any monies payable to Us on a quantum meruit basis for any work it has done;

“Rate Schedule” means the schedule of rates, charges and conditions for the services of Ours as set, and as may be varied, by Us from time to time in its absolute discretion without notice to You;

“Reasonable Assistance Limits” has the meaning set out in clause 17.2;

 “Return/Cancellation Fee” means a fee charged pursuant to clause 12.5 as set by Us from time to time;

“Service request” means a request for service such as adds, moves, changes and technical assistance;

“Services” means the provision of any services by Us including Work, advice and recommendations;

“Software” includes software and any installation, update, associated software and any services provided in connection with any of these things;

Us”, Our” or “We” means Evongo Pty Ltd 49 151 995 756 and its heirs, successors and assigns; and

 “Work” means anything We may do, provide, customise, produce or acquire, whether or not in connection with, or for the purposes of, You or Your use or benefit, and includes testing, troubleshooting, installation and configuration of new equipment or software, consulting, scoping, planning, documenting and quoting for complex items.

In these Conditions, the Rate Schedule and every Quote, Order, Plan, contract, or other arrangement in connection with the supply of Goods or Services by Us, unless the contrary intention appears:

Words denoting the singular number only shall include the plural number and vice versa;

Reference to any gender shall include every other gender;

Reference to any Act of Parliament, Statute or Regulation shall include any amendment currently in force at the relevant time and any Act of Parliament, Statute or Regulation enacted or passed in substitution therefore;

Headings and words put in bold are for convenience of reference only and do not affect the interpretation or construction of these Conditions;

All references to dollars ($) are to Australian Dollars;

A reference to time is to Melbourne, Australia time;

A reference to an individual or person includes a corporation, partnership, joint venture, association, authority, trust, state or government and vice versa;

A reference to a recital, clause, schedule, annexure or exhibit is to a recital, clause, schedule, annexure or exhibit of or to these Conditions;

A recital, schedule, annexure or description of the parties forms part of these Conditions;

A reference to any agreement or document is to that agreement or document (and, where applicable, any of its provisions), as amended, novated, supplemented or replaced from time to time;

Where an expression is defined, another part of speech or grammatical form of that expression has a corresponding meaning;

A reference to “includes” means includes without limitation;

A reference to “will” imports a condition not a warranty; and

A reference to bankruptcy or winding up includes bankruptcy, winding up, liquidation, dissolution, becoming an insolvent under administration, being subject to administration and the occurrence of anything analogous or having a substantially similar effect to any of those conditions or matters under the law of any applicable jurisdiction and to the procedures, circumstances and events which constitute any of those conditions or matters.


Unless otherwise agreed by Us in writing, these Conditions are deemed incorporated in and are applicable to (and to the extent of any inconsistency will prevail over) the terms of every Quote, Order, Plan, contract, or other arrangement in connection with the supply of Goods and/or Services by Us to You.

The invalidity or enforceability of any one or more of the provisions of this Agreement will not invalidate, or render unenforceable, the remaining provisions of this Agreement.


    1. The minimum term that You acquire the service for is outlined in Our Quote to You, beginning from the first of the next month after the date of signing or approving the Quote.
    2. After the expiry of the Committed Term, an extension of the Term will automatically commence for the same period as the original Committed Term and will continue indefinitely, unless earlier terminated by you as specified in Clause 4

    1. This Agreement may be terminated by You upon ninety (90) days written notice if We:
      1. Fail to fulfil in any material respect its obligations under this Agreement and do not cure such failure within thirty (30) days of receipt of such written notice.
      2. Breach any material term or condition of this Agreement and fail to remedy such breach within thirty (30) days of receipt of such written notice.
      3. Terminate or suspend our business operations, unless it is succeeded by a permitted assignee under this Agreement.
    2. This Agreement may be terminated by Us upon ninety (90) days written notice to you.
    3. If either party terminates this Agreement, we will assist you in the orderly termination of services, including timely transfer of the services to another designated provider. You agree to pay us for rendering such assistance at our normal rates as outlined in our current Rate Schedule.
    4. Should You wish to terminate this Agreement before the end of the commitment term, You agree to pay all of the remaining payments up until the end of the commitment term.

    1. You acknowledge that no employee or agent of Ours has any right to make any representation, warranty or promise in relation to the supply of Goods or Services other than subject to and as may be contained in the Conditions.

    1. Any notices given under the Conditions shall be in writing and sent by e-mail to the last notified e-mail address of Yours.

    1. The Conditions shall be governed by and construed in accordance with the laws of Victoria and the parties submit to the non-exclusive jurisdiction of the Courts of Victoria.

    1. You may not assign Your rights and obligations under this Agreement without the prior written consent of Us.

    1. We may at any time vary these Terms and Conditions by publishing the varied Terms and Conditions on Our website. You accept that by doing this, We have provided You with sufficient notice of the variation. We are under no other obligation to notify You of any variation to these terms and conditions.



    1. Term and effect: Quotes will only be valid for 7 days unless otherwise specified in the Quote. A Quote is merely an invitation to You to place an Order with Us and the acceptance of a Quote by You will not create a binding contract between You and Us.
    2. Quote is valid for 7 days only. Expiry dates on quotes are set to be able to inform Us when the quote is still active or to be discarded. Once discarded the quote will need to be requested again.
    3. Once a quote has been confirmed by Us, then the prices in the quote will be confirmed as the final agreed price. A quote is confirmed as ‘final’ as soon as both parties agree with the final price after any last changes requested by You.
    4. The price in the final quote may vary from the original request if there is any price or product changes requested by You. We reserve the right to alter product and prices in the quote, as long as the quote has not been confirmed with You.
    5. Quotes and estimates shall be deemed to correctly interpret the original specifications and are based on the cost at the time the quote or estimate is given. If You later require any changes to the quotes, and We agree to the changes, these changes will be charged at Our prevailing rate.
    6. Once the Quote has been confirmed and converted to an Order, the Order will be subjected to our normal Terms and Condition of Sale.
    7. The general minimum turnaround time for Quote request to be actioned is usually 24 hours. In the event that a quote is required urgently please let us know so that we can respond to it accordingly.
    8. When a special price or discount offer has been applied to this Quote, no other special promotion, discount or bonus offer will be applicable.
    9. In the event that products in the Quote are subjected to any price and supply fluctuations that is outside of Our control We reserve the right to update the price and product in the Quote accordingly. If a product has undergone a price drop or a price increase, the Quote will then be adjusted accordingly. If there is a product that is no longer available, the product will then be replaced or substituted based on Your request and is subject to Your final approval.
    10. Price on non-stocked products are subjected to Price and stock fluctuations and can only be confirmed once the Quote is turned into an Order. While We endeavour to honour every price quoted, if there is a price increase that is beyond our control, We reserve the right to increase the price as necessary.
    11. Once a Quote has already passed the expired date, We may cancel the quote or estimate without having to notify or receive an approval from You.
    12. ETA information is based on an estimate given by our vendors and cannot be held as the actual promised date.
    13. Freight charges will be added to the Order unless otherwise stated. Any included delivery charges are estimates only.
    14. We do not keep inventory and as such only order items once we receive a completed order from a client. If You would like to return an item or cancel an order, a restocking fee may apply. We will need to get approval from the distributor that the stock is returnable before being able to issue a refund as not all products can be returned.
    15. Prices are based upon total Quote Purchase.
    16. Unless Specified, all items on quote are covered by manufacturer’s warranty covering parts and labour for hardware only on a return to depot basis.
    17. Varying or withdrawing Quotes: We may vary or withdraw a Quote at any time in Our absolute discretion and without prior notice to You. We may do so for any reason We consider fit, including, e.g. where the Goods or Services become unavailable or the cost price of Goods or Services increases after the date of the Quote.

    1. Order forms: You may place an Order for Goods and/or Services with Us.  Normally, We will require that You provide either a completed Order form or You approve the quote electronically via either an email or a web based system with the date and Your details, including Your full legal name or description and any applicable ABN or ACN number (including the full name or description of any person on whose behalf the order is placed), Your address together with any relevant Quote number and date.
    2. Approval of Orders: You will need to sign the Order or have it duly executed on Your behalf, unless the Order is sent by email or via the web based ordering system, in which case the Order will be treated or deemed as if signed by or on behalf of You by the person whose name appears as the sender of the email or submitter of the form.
    3. Reliance on appearance of validity: Absent actual knowledge to the contrary, We may rely upon the apparent validity of an Order. If any Order is signed or sent by email or approved through the web based ordering system by a named person, that person warrants that the Order is, and it is acknowledged the Order is deemed in favour of Us to be:
      1. signed by, and duly authorised by, both the person who signed the Order and the person who sent the email; and
      2. duly authorised by the person on whose behalf the Order is placed or apparently placed.
    4. Acceptance and Orders: An Order has no effect unless or until it is accepted by You in writing and, until We have received from You payment in clear funds for the Order and any related freight, delivery and (where applicable) in-transit insurance costs in clear funds.
    5. No obligation to deliver: We are not obliged to deliver any Order until we have received payment in clear funds from You for the Order, any related freight, delivery and (where applicable) in-transit insurance costs or where We are unwilling or unable to complete the Order for any reason provided it refunds any payment made by You in respect of the Order.
    6. Credit checks: For the purposes of ascertaining the credit standing or history of a prospective customer to whom We are considering extending credit or payment terms, You hereby consents to Us undertaking a credit reference check in respect to You.
    7. Cancellation of Orders: You will not cancel an Order unless We agree to do so in writing in Our absolute discretion. You acknowledge that, amongst other things, We cannot cancel an Order once the manufacturer or supplier has despatched the relevant Goods and that such despatch often occurs the same day as the Order is placed by Us.
    8. Processes and Procedures: We have processes and procedures that We follow in the course of the provision of Our Services and the supply of Goods. You agree to co-operate with Us and to comply with such processes and procedures as advised to You from time to time.

  1. Rates exclude Tax: All rates and amounts charged or quoted for Goods and/or Services by Us are exclusive of Tax and any other applicable taxes or government charges (unless otherwise stated in writing by Us).
  2. Rates Schedule: You must pay for Goods and Services at the Rates set out in any applicable Plan and the Rate Schedule as applicable from time to time during the provision of the Goods and/or Services.
  3. Vary Rates: We reserve the right vary any Rate and/or the Rate Schedule from time to time (subject to any fixed pricing for specific periods in any Plan), in its absolute discretion and without notice to You.
  4. Call-out fees: You acknowledge that call-out fees may be charged in addition to the Rates at Our absolute discretion and that the amount of the call-out fee will depend upon where the Services are provided.
  5. Return/Cancellation Fee: Where We arrange a return or refund on behalf of You, or where an Order is cancelled by You after acceptance by Us, We may charge You a Return/Cancellation fee to cover the administration costs to Us in processing the return or refund, or in processing the Order, the cancellation and any refund. We may deduct the Return/Cancellation fee from out of any moneys otherwise due to be refunded to You by Us.
  6. Expenses: You must pay any out of pocket expenses incurred by Us in providing the Services to You in addition to the Rates, charges and call-out fees, upon written demand. Such expenses will include travel costs, flights, car hire, petrol, insurance, taxi fares, accommodation and related meal allowance, tolls and car parking expenses. Where appropriate, We will obtain prior written authorisation from You before such expenses are incurred.
  7. Separate charges for Goods and Services: We may in Our absolute discretion charge for Goods separately from Services or may charge for Goods and Services together.
  8. Calculation of increments: Where a charge is calculated based on increments of time, e.g. 1 hour or 30 minutes, We will charge the applicable rate for the whole increment of time even if work is done during part of, but not for the whole of, that increment of time.
  9. Change in underlying costs: Without prejudice to any other rights of Ours under these Conditions, where there is any increase in the underlying costs incurred by Us in connection with the supply of Goods or Services to You, We may, in our absolute discretion, vary any of Our Rates.
  10. Pre-Paid Blocks of Service: Where You agree to buy Pre Paid Blocks of Service during a Period, payment must be made in advance for the Pre-Paid Blocks of Service at the rate applicable pursuant to the Rates Schedule for all Services. Each such rate being less any discount agreed in writing between Us and You in respect of the Pre-Paid Blocks of Service. Services included in a Pre-Paid Block of Service rate during the Period:
    1. are calculated in accordance with the applicable minimum time periods and increments set out in the Rates Schedule; and
    2. are only provided by Us during the applicable Period. Where Services are provided for a specified Period:
      1. the Services remaining unused for that Period cannot be rolled over into any subsequent Period; and
      2. We are not liable to refund, re-imburse, pay damages or otherwise compensate or indemnify You in respect of those unused Services.

    1. Service and Plan Variations: Currently, We offer the Services and Plans referred to in the Rates Schedule and any Plan Schedule. We may withdraw the provision of, or vary the scope or terms of, or add to or change, the Services without notice to You, from time to time in Our absolute discretion.
    2. Copies on Request: We will provide You with a copy of the current Rates Schedule upon request. Plan Schedules are tailored for particular Plans and are available to Clients participating in the Plan.

    1. We may subcontract any or all of the Services to be performed, but shall retain prime responsibility for the Services under these terms.

    1. Delivery liability: We will use all reasonable endeavours to despatch Goods by the due date, but do not accept any liability for non-delivery or failure to deliver on time where this is caused by circumstances beyond the reasonable control of Ours, including, for example, due to failures in supply to Us or delays caused by third parties, such as delivery companies or manufacturers.
    2. Availability to accept delivery: You must be available to accept the Goods at Your nominated delivery address during Business Hours unless otherwise arranged.
    3. Passing of Risk: Delivery is deemed to take place when the Goods are delivered to Your nominated address, whereupon risks of loss, breakage and all damage and all other risks pass to You. Nothing in this clause 3 will affect title to the Goods.
    4. Obligation to insure: You will ensure that Goods are adequately insured from the time of delivery under clause 3.
    5. Retention of Title: Until We receive full payment in cleared funds for any moneys due to Us by You on any account or for any reason:
      1. title to, and property in, Goods supplied to You remain vested in Us and does not pass to You;
      2. You must hold those Goods as fiduciary bailee and agent for Us and must not sell them;
      3. You must keep those Goods separate from other goods and maintain the Goods and their labelling and packaging intact;
      4. Where You sell the goods in breach of these Conditions, You are required to hold the proceeds of any sale of those Goods on trust for Us in a separate account (however any failure to do so will not affect Your obligation to deal with the proceeds as trustee and remit them to Us);
      5. We may, without prior notice, enter into any premises where We suspect those Goods may be, take possession of those Goods and sever and remove those Goods (notwithstanding that they may have been attached to other goods not the property of Ours) and for this purpose, You hereby irrevocably authorise and direct Us (and Our employees and agents) to enter into such premises as its duly authorised agent and You hereby indemnify and hold harmless Us from and against any costs, claims, allegations, demands, damages or expenses or any other acts or omissions arising from or in connection with, such entry, repossession or removal.
      6. You irrevocably appoint Us as Your attorney to do anything We consider necessary in order to enter such premises and repossess the Goods as contemplated by this clause 5.

    1. General Returns Policy: Notwithstanding anything in these Conditions, You acknowledge that We supply Goods subject to all applicable conditions, including returns and claims policies, of any relevant manufacturer or supplier. You will accept Goods subject always to these Conditions and the terms of such conditions and will indemnify and hold Us harmless in respect of any further or other obligation or any failure or default on the part of that manufacturer or supplier.
    2. Customised Goods not returnable: Where Goods have some element of customisation for You, are supplied pursuant to an Order for Goods that is in the opinion of Ours special or unusual, the Goods are obtained from overseas, the Goods are obtained from a supplier who is no longer trading, or the Goods are otherwise not readily returnable by Us to the manufacturer or supplier or any related services may not be cancelled, You may not return the Goods to Us or cancel the related services.
    3. Duty to inspect: You will inspect all Goods immediately upon their delivery. Within 7 days of such delivery You may give written notice to Us of any matter or thing, by reason of which You might wish to return the Goods, ask for a refund, or make a claim. If no such notice is given on time, You will accept the Goods without any such return, refund or claim.
    4. Return Condition: Where You are entitled to return Goods under these Conditions, You must return the Goods in their original condition and unopened, provided always that where, upon opening the packaging it becomes apparent that the Goods are different to what is described on the packaging or that the Goods are faulty, the Goods may be returned.
    5. Return costs: You will pay all costs and expenses incurred by Us in arranging the return of the Goods to a manufacturer or supplier and/or the cancellation of any related services unless that manufacturer or supplier pays such costs.
    6. Consequences of use, installation, customisation or sale: You will indemnify and hold Us harmless in respect of all allegations and claims in respect of Goods once such Goods have been used, installed, customised or re-sold by You (without prejudice to the recourse of such a customer to the manufacturer of the Goods).

    1. Service limitations given the science of computing: You acknowledge that a reasonable incident of the Services may involve trial and error and that it is a science applied often in novel or unknown circumstances and involving experiment. In particular, You acknowledge that the Services may involve tests, troubleshooting, advice and recommendations that may prove incorrect or inappropriate, particularly in an attempt to cure a problem You are having. While We will make what We consider (in Our absolute discretion) to be all reasonable endeavours to provide appropriate tests, troubleshooting, sound advice and good recommendations in order to assist You, You will always indemnify and hold Us harmless in the provision of our Services to You.
    2. Reasonable Assistance Limits: We are only obliged to provide what We consider, in Our absolute discretion, to be reasonable assistance in the circumstances (including with the installation and customisation of new software or hardware for You or any other Work) under any Plan and You will pay for additional work at the Rates unless otherwise agreed. Without limiting the discretion of Us to determine what reasonable assistance is, normally, reasonable assistance is limited to work done during Business Hours over a period of time not exceeding any period that We have allowed or allows for the Work or has estimated or estimates the Work will take, whether or not notice of the time allowed or estimated is given by Us to You.
    3. Recommendations, suitability, functionality and fitness for purpose: The parties acknowledge that:
      1. We may recommend that You purchase Goods provided by third parties from time to time;
      2. Recommendations may be made in situations where You have made known to Us the purpose for which the Goods will be used or some function sought to be fulfilled;
      3. You acknowledge that We have no control over many factors involved with the suitability, function or fitness for purpose of Goods in an existing or new computer environment, e.g.
        1. the compatibility or ability of the Goods to fit into or perform to expectations in the receiving computer/internet environment; or
        2. the behaviour of third party supplier, e.g. in relation to support;
      4. You acknowledge that for a whole number of reasons outside of Our control, the Goods may fail to meet Your expectations, may not turn out to be fit for all or any of the purposes sought, may not be suitable or may not function properly in all or any respects;
      5. You acknowledge that the Services provided by Us may involve the very task of seeking to customise Goods so they may be fit for particular purposes and that customisation may be a very substantial project in itself;
      6. Accordingly You will accept the sole responsibility for, and indemnify and hold Us harmless in respect of:
        1. decisions as to whether or not to follow recommendations by Us;
        2. decisions as to whether or not to purchase or customise Goods or obtain Services for that or any other purpose; and
        3. any failure or defect in suitability, function or fitness for purpose of any Goods and/or Services, including a responsibility to obtain Your own independent advice or second opinion from a suitably qualified person;
      7. Where We provide Services with a view to achieving Your purposes, suitability, function or fitness for purpose (whether expressed, agreed or otherwise), You must pay for those Services on time without any set-off or counter-claim, whether or not We are able to achieve any of such purposes, suitability, function or fitness for purpose, provided always that We have acted in good faith and have made what We consider, in Our absolute discretion, to have made all reasonable endeavours to achieve those outcomes.
    4. Testing Procedures: You will follow the instructions of Ours with regard to testing or troubleshooting any problems and that if those do not resolve the outstanding problems, We will, subject to these Conditions, allocate such resources as We consider reasonable in the circumstances towards their resolution.

    1. Force Majeure: If We are unable to supply any Goods or Services due to circumstances beyond Our reasonable control, We may cancel the Order (even if the Order has already been accepted) or cease to provide the Services by written notice to You, in which case You will hold Us harmless.
    2. We will not be liable for any breach of contract due to any matter or thing beyond Our control, including failures by third parties to supply goods, services or transport, stoppages, transport breakdown, fire, flood, earthquake, acts of God, strikes, lock-outs, work stoppages, wars, riots or civil commotion, intervention or public authority, explosion or accident.

    1. Alterations to Specifications: We make every effort to supply the Goods in accordance with the Order however We may supply alternate Goods subject to minor variations in actual dimensions and specifications where these are changed by the manufacturer of the Goods after the Order date and before delivery.
    2. Substitute Goods: If We cannot supply the Goods ordered by You, We may supply alternate Goods of equal or superior quality provided however that You will not pay a higher price than the price Quoted or otherwise agreed for the Goods ordered.

    1. Reliance on Manufacturer’s Warranty: You will rely on the warranties provided by the manufacturer of Goods supplied by Us (where applicable) and will deal direct with such manufacturer rather than Us for all claims covered by such warranties.
    2. No claim for manufacturer’s default: You indemnify and hold Us harmless in respect of the performance or otherwise, by any manufacturer of Goods supplied to You by Us, of any of the obligations of such manufacturer in respect of such Goods. This includes any damages or moneys due to You arising under, or in connection with, any breach by the manufacturer of any the manufacturer’s warranties in respect of the Goods.

    1. Exclusion: Except as specifically set out herein and so far as may be permitted by law, any term, condition or warranty in respect of the quality, fitness for purpose, condition, description, assembly, manufacture, design or performance of the Goods or Services, whether implied by statute, common law, trade usage, custom or otherwise, is hereby expressly excluded.
    2. No liability for program or data loss: You indemnify and hold Us harmless in respect of any allegation, claim, loss or expense of Yours or any third party for any program or data loss or damage suffered by You or that third party arising directly or indirectly from the supply of the Goods or Services by Us to You. You acknowledge You are solely responsible for backing up Your programs and data in order to mitigate Your own potential loss of programs and data.
    3. Limit on consequential damage: You indemnify and hold Us harmless in respect of any allegation or claim as to any indirect or consequential losses or expenses suffered by You or any third party, howsoever caused, including but not limited to loss of turnover, profits, business or goodwill or any liability to You or any third party.
    4. Limit on damage from a failure in supply: You indemnify and hold Us harmless for any allegation or claim for loss or damage by You or a third party where We have failed to meet any delivery date or cancels or suspends the supply of Goods or Services.
    5. General limit on liability: Except as otherwise expressly stated in these terms and conditions, We are not liable for any loss or damage of any kind however caused (including, but not limited to, by the negligence of Us) which is suffered or incurred by You in connection with:
      1. Goods or Services provided to You or any Work;
      2. these Terms and Conditions;
      3. Your use of Our website (including the use of a credit card or other debit device) or any linked website;
      4. the non-availability of Goods or Our Services for any reason;
      5. any act or omission of Ours or the provision of inaccurate, incomplete or incorrect information by You, or
      6. for any other reason whatsoever.
    6. Limitation options: To the extent that any legislation implies a condition or warranty that cannot be excluded but can be limited, clause 5 does not apply to that liability and Our liability for any breach of that condition or warranty is limited to Our doing any one or more of the following (at its election):
      1. replacing the Goods or supplying equivalent Goods, Services or Work;
      2. repairing the Goods or the Work;
      3. paying the cost of replacing the Goods or the Work or acquiring equivalent Goods, Services or Work; or
      4. paying the cost of having the Goods or the Work repaired.
    7. Laws still apply: Nothing in these Conditions is to be interpreted as excluding, restricting or modifying or having the effect of excluding, restricting or modifying the application of any State or Federal legislation applicable to the supply of the Goods or Services which cannot be excluded, restricted or modified.
    8. Severance: If any provision contained in the Conditions is unlawful, invalid or unenforceable, those provisions may be severed without prejudice to the validity and enforceability of the remaining provisions of the Conditions.

    1. We make every effort to ensure that all prices and descriptions quoted are correct and accurate. In the case of an error or omission, We may rescind the affected contract by written notice to You, notwithstanding that We have already accepted Your Order and/or received payment from You. Our liability in that event will be limited to the return of any money You have paid in respect of the Order.



    1. We are collecting Your personal information for the fulfilment of Quotes, Orders and the provision of Goods or Services to you and it may retain and use it for any such purposes (“Authorised Purposes”).
    2. You are required to provide your personal information to Us for Authorised Purposes.
    3. We may disclose Your personal information to other persons for the purposes of the fulfilment of Quotes, Orders and Work for you or in order to provide Goods or Services to You, to verify the information You provide, for enquiries about Goods or Services that may be suitable for your purposes, or to confirm Your requirements, to anyone proposing to supply Goods or Services to You, or to acquire Goods or Services on Your behalf, or in respect of enquiries relating to any of the foregoing.
    4. Otherwise We will not disclose Your personal information without Your consent unless authorised by law.
    5. Your personal information will be held by Us at Our Principal Place of Business and You can contact Us to request to access or correct it.
    6. We rely on You to submit correct information and details where requested. You accept that You may incur additional expenses if you submit incorrect information.

    1. We make no representations or warranties in relation to information available on Our website, including without limitation:
      1. that the information on Our website is complete or correct;
      2. that Our website will be continuously available or free from any delay in operation or transmission, virus, communications failure, internet access difficulties or malfunction in hardware or software; and that We endorse any internet site linked to Our website or any third party products or services referred to on Our

    1. We will maintain at Our own expense, commercial general liability insurance for personal injury and property damage for a general aggregate of $2,000,000. At Your request We will provide You with certificates, including renewal certificates evidencing such coverage within thirty (30) days of commencing this Agreement, at every renewal and at other times as may be reasonably requested by You.



    1. In order for Us to provide You with the agreed Service, You agree to follow Our process for lodging of Service Requests as outlined in Appendix A.

    1. In order to provide You with the agreed Service, You agree to give Us access to various items of Yours including but not limited to, equipment, people and sites as and when required.
    2. You agree to allow Us to install software on Your Equipment that allows Our technicians to access Your systems at any time. This software allows Us to view system statuses, send monitoring information, see users’ desktops and control Your PC’s. This may require that devices are left on overnight or weekends.

    1. At times We may need to contact Your third party providers on Your behalf, such as Your internet provider. Some of these providers may require Your authorisation for Us to deal on Your behalf. It is Your responsibility to ensure that We are able to deal freely with these providers.

    1. Payment due date: All invoices issued to You are due and payable to Us within the terms stated on the invoice (unless otherwise agreed in writing). by cash, cheque, credit card or direct deposit in accordance with these Terms and Conditions and in the way set out in the Invoice.
    2. 7 days late: Where You fail to pay an invoice within seven (7) days of the due date, We may, in Our absolute discretion and without prior notice, suspend or discontinue the supply of Goods and/or Services to You.
    3. Recoveries: All legal and other costs and expenses incurred in connection with the recovery of late payments will be added to the amount due by You to Us and will be recoverable from You, in addition to the original invoice cost. If You default in payment of any invoice on time, moneys which would have become due by You at a later date shall be immediately due and payable without any further notice to You. Collectively, all of these moneys are referred to in these Conditions as a “Sum Due”.
    4. Interest: If payment of any Sum Due is not made on time, We will charge interest daily on the Sum Due at the maximum rate allowed by law, calculated and charged daily on and from the due date until the Sum Due is paid in full.
    5. Application of funds: All payments of the Sum Due made by You to Us will be applied as follows:
      1. first in or towards payment of any costs (including legal costs), charges, expenses or outgoings paid by Us in relation to any dishonoured cheque fees, collection costs or any other action taken by Us for the recovery of any amounts owing by You to Us;
      2. secondly, in or towards payment of any interest due or payable hereunder, and
      3. thirdly, in or towards payment of Your debts to Us in order from the longest standing due to the most recently incurred.
    6. Security: We may require You to provide security over Your property (including the Goods or any other property of Yours) as collateral to be held as security for any Sum Due or as a condition precedent to the continuation of supply of Goods or Services by Us to You.
    7. Payment arrangements: In the event that a repayment arrangement is made in relation to any Sum Due and the supply of Goods or Services is resumed, but then a repayment due under that arrangement is not made on time, We may, in Our absolute discretion and without prior notice, again suspend or discontinue the supply of Goods or Services to You.
    8. Power of Attorney: You hereby irrevocably appoint Us as Your attorney to do anything We consider fit for the recovery of the Sum Due or the creation, perfection or enforcement of any collateral held or to be held as security for any Sum Due.
    9. Other remedies: We may exercise any of Our rights and remedies including taking legal action against You for the recovery of any moneys due to Us, notwithstanding it may have exercised other rights under these Conditions.

    1. You agree that employees are one of Our most valuable assets, policy and professional ethics require that Our employees not seek employment with, or be offered employment by You during the course of engagement and for a period of two (2) years thereafter (or the maximum amount permissible by a Court).
    2. You agree that Our damages resulting from breach of this clause 1 would be impracticable and that it would be extremely difficult for Us to ascertain the actual amount of damages. Therefore in the event You violate this provision, You agree to immediately pay Us 100% of the employee’s total annual salary, as liquidated damages and We shall have the option to terminate this Agreement without further notice or liability to You. The amount of liquidated damages reflected herein is not intended as a penalty and is reasonably calculated based upon the projected costs We would incur to identify, recruit, hire and train suitable replacements for such personnel.

    1. All Software licences are the responsibility of You and not that of Us. It is the duty of Yours to store all licences for all Software used, so that that they can be reproduced if and when required. This includes all Software installed by Us.
    2. You indemnify and hold Us harmless against any claim, allegation, loss, damage or expense arising directly or indirectly from:
      1. any unauthorised Software use by You;
      2. any breach of any Software licence in respect of Software provided to Us by You to be installed on one of Your computers;
      3. otherwise as a result of Us installing Software at Your where You are not authorised to use the Software; and
      4. any problem, defect or malfunction associated with any Software (or related services) supplied by third parties.
    3. All copyright in custom software remains the sole property of Ours unless alternate arrangements are made as part of a separate software agreement.

    1. Warranty and breach: You warrant that any confidential or copyright information or intellectual property (of any kind and in any form held) or provided by You to Us belongs to You. In the event of any breach of this warranty, You will pay all sums due to Us as If such warranty had not been breached (and regardless of any non-performance of any obligation by Us on account of or in connection with the breach of such warranty). You indemnify and hold Us harmless in respect of any allegations, claims, loss, costs or expenses in connection with such breach of warranty by You.
    2. Retention of title: All copyright and other intellectual property rights in any Work created, commissioned or acquired by Us in the course of the supply of Services by Us to You will be the exclusive property of Ours unless otherwise agreed in writing by Us and You.
    3. Confidential Information: We acknowledge that in the course of providing Services to You, We may learn from You certain non-public personal and otherwise confidential information relating to You, including Your customers, consumers or employees. We shall regard any and all information We receive which in any way relates or pertains to You, including Your customers, consumers or employees as confidential.
    4. You also acknowledge that all information and services, consulting techniques, proposals, and documents disclosed by Us or which comes to Our attention during the course of business and provided under this agreement constitute valuable assets of, and confidential and/or proprietary information to Us.


As such, both parties shall take all commercially reasonable steps to not disclose, reveal, copy, sell, transfer, assign, or distribute any part or parts of such information in any form, to any person or entity, or permit any of its employees, agents, or representatives to do so for any purpose except unless permitted in writing by the disclosing party or as required by applicable law.


Terms and Conditions

SEO Friendly Title: Terms and Conditions

Terms and Conditions of Supply of Products & Services

Every quotation or purchase of Products and/or Services from Evongo Pty Ltd, are subject to the following terms and conditions without limitation or qualification. Evongo reserves the right to change these terms and conditions at any time, effective upon the posting of new terms and conditions on its website. It is the Customers responsibility to ensure that they have read, understood and agree to the most recent terms and conditions available on the website.

“Agreement” means these Terms and Conditions of Supply of Products and Services.”Confidential Information” includes trademarks, service marks, domain names, logos and other branding elements (“Marks”); and patents, copyrights, inventions, know-how, processes and software; and all associated rights in these. “Customer” means a person, firm or corporation, jointly and severally if there is more than one, acquiring Products or Services from Evongo; “Evongo ” means Evongo Pty. Ltd; “Intellectual Property Right” means any patent, trademark, service mark, copyright, moral right, right in a design, know-how and any other intellectual or industrial property rights, anywhere in the world whether or not registered; “Managed Equipment” means networking equipment and devices that Evongo has agreed to support under a Managed Services plan; “Managed Services” means a service provided by Evongo to the Customer to support the Customer’s Managed Equipment and end users; “Products” means any item, goods, equipment supplied by Evongo to the Customer; “Services” means Managed Services, hosting services, training services, consultation services supplied by Evongo or a third party to the Customer. “Services Schedule” means a document identifying the Managed Equipment and number of users that Evongo has agreed to support under a Managed Services Agreement. “Term” means the minimum duration of the Managed Services plan.

a. Unless otherwise agreed by Evongo in writing, these terms and conditions apply exclusively to every sale of Products or Services by Evongo to the Customer and cannot be varied or supplanted by any other conditions without the prior written consent of Evongo.
b. Any written quotation provided by Evongo to the Customer concerning the proposed supply of Products or Services is valid for as per quote expiry and is an invitation only to the Customer to place an order based upon that quotation.

a. Normal business hours are from 8.30am to 5pm Monday to Friday (except Victorian public holidays).
b. Any work done outside of normal business hours will be considered after hours and will be charged at Evongo’s current after hours rate.

a. Payment for all Products and Services must be made by cash, cheque or EFTPOS.
b. The Customer shall make all payments due according to the due date on the invoice, without any deduction whether by way of set-off, counterclaim, discount, abatement or otherwise unless the Customer has a valid court order requiring an amount equal to such deduction to be paid by Evongo to the Customer.
c. The Customer must notify Evongo of any dispute within 7 days of receipt of an invoice. Failure to notify Evongo within this time, will be construed as a waiver of any of its rights to dispute the invoice.
d. If the Customer fails to pay Evongo any sum due, Evongo may without prejudice to any other remedy available to it:
i. charge the Customer interest at the current legal rate on any sum due for the period from the due date until the date of payment in full;
ii. charge the Customer for all expenses and costs (including legal costs, debt collection fees and dishonoured cheque fees) incurred by Evongo resulting from the default and in taking whatever action it deems appropriate to recover any sum due;
iii. suspend or terminate the supply of any Products or Services to the Customer by giving written notice to the Customer and Evongo shall not be liable for any damages whatsoever resulting from the action taken.
e. Evongo shall be entitled at any time and from time to time to increase its fees by giving the Customer not less than 90 days prior written notice.

a. Until full payment in cleared funds is received by Evongo for all Products supplied by it to the Customer, as well as all other amounts owing to Evongo by the Customer, title and property in all Products remain vested in Evongo and do not pass to the Customer.
b. Until ownership of the Products has passed to the Customer, the Customer must:
i. hold the Products on a fiduciary basis as Evongo’s bailee;
ii. store the Products (at no cost to Evongo) separately from all other Products or any third party in such a way that they remain readily identifiable as property of Evongo;
iii. not destroy, deface or obscure any identifying mark or packaging on or relating to the Products;
iv. maintain the Products in a satisfactory condition and keep them insured on behalf of Evongo for their full price against all risks to Evongo’s
reasonable satisfaction.
c. Until ownership of the Products has passed to the Customer, the Customers right to possession of the Products shall terminate immediately if:
i. the Customer has a bankruptcy order made against them or makes an arrangement or composition with creditors, or otherwise takes the benefit of any statutory provision for the time being in force for the relief of insolvent debtors, or (being a body corporate) the Customers convenes a meeting of creditors (whether formal or informal), or enters into liquidation (whether voluntary or compulsory) except a solvent voluntary liquidation for the purpose only of reconstruction or amalgamation, or has a receiver and/or manager, administrator or administrative receiver appointed of the Customers undertaking or any part thereof, or a resolution is passed or a petition presented to any court for winding up or for the granting of an administration order in respect of the Customer, or any proceedings are commenced relating to the insolvency or possible insolvency of the Customer; or
ii. the Customer suffers or allows any execution, whether legal or equitable, to be levied on its property or obtained against the Customer, or the Customer fails to observe/perform any of its obligations under this agreement or any other contract between the Customer and Evongo, or the Customer is unable to pay its debts within the meaning of the Insolvency Act 2008 or the Customer ceases to trade; or the Customer encumbers or in any way charges any of the Products.
d. Evongo shall be entitled to recover payment for the Products notwithstanding that ownership of any of the Products has not passed from Evongo.
e. The Customer grants Evongo, its agents and its employees an irrevocable licence at any time to enter any premises where the Products are or may be stored in order to inspect them, or, where the Customers rights to possession has terminated, to recover them and Evongo would be indemnified from and against all costs, claims, demands or actions by any party arising from such action.

a. It is not the policy of Evongo to accept the return of Products that were correctly supplied, except by the approval of management of Evongo. If Evongo in it’s sole discretion agrees to accept the returned Products, all such Products must be returned in their original condition including packaging and manuals.
b. A restocking fee may be charged at the sole discretion of Evongo. Before returning any Products an RA number must be obtained from Evongo, this should be clearly affixed to the item.

a. The risk in the Products and all insurance responsibility for theft, damage or otherwise in respect of the Products will pass to the Customer immediately upon delivery of the Products to the premises nominated by the Customer.

a. Any period or date for delivery of Products or provision of Services stated by Evongo is intended as an estimate only and is not a contractual commitment.
b. Evongo will not be liable for any consequences of late delivery howsoever caused.
c. If, through circumstances beyond the control of Evongo, Evongo is unable to effect delivery or provision of Products or Services, then Evongo may cancel the Customer’s order (even if it has already been accepted) by notice in writing to the Customer.

a. Evongo warrants that all Services will be carried out with reasonable care and skill by personnel whose qualifications and experience will be appropriate for the tasks to which they are allocated.
b. Evongo warrants that all Products supplied to the Customer will be free from material defect for a period of 30 days from the date of delivery. This warranty shall be limited to the replacement of or repair of the faulty Products, or the issue of a credit note, or the granting of a refund or other such compensatory measures as Evongo at its discretion considers appropriate in the circumstances, and shall be conditional upon the Customer complying with the conditions of the manufactures warranty (where applicable). Such measures shall relate only to the actual faulty Products or their value.
c. Where possible Evongo will transfer to the Customer the benefit of any warranty or guarantee given to Evongo.
d. Except as expressly provided in these Terms and Conditions, no warranty, condition, undertaking or term, express or implied, statutory or otherwise is given or assumed by Evongo, and all such warranties, conditions, undertakings and terms are hereby excluded to the fullest extent permitted by law.

a. Evongo does not exclude its liability to the Customer for direct damage to tangible property caused by the negligence of Evongo’s employees in connection with the performance of their duties or by defects in any Product supplied. Evongo’s total liability under this clause shall be limited to $2,500 for any one event or series of connected events.
b. Save in respect of claims for death or personal injury arising from Evongo’s negligence, in no event will Evongo be liable for any damages resulting from lost profits, loss of anticipated savings, nor for any damages that are an indirect or secondary consequence of any act or omission by Evongo, whether such damages were reasonably foreseeable or actually foreseen.
c. Except as provided above in the case of personal injury, death and damage to tangible property, Evongo’s maximum liability to the Customer for any cause whatsoever (whether in the form of the additional cost of remedial Services or otherwise) will be for direct costs and damages only and will be limited to the amount received by Evongo from the Customer in respect of the managed services in the previous 12 months.
d. The Customer is responsible for the safety of Evongo’s employees or of its subcontractors whilst on the Customer’s premises, and must comply with all relevant statutory requirements and maintain adequate insurance against the appropriate risks.
e. Evongo shall have no liability to the Customer for any loss of original data due to any error or omission by the Customer, or due to any event that takes place at the Customer’s Premises, unless such event is caused by Evongo’s negligence.
f. The Customer’s statutory rights as a consumer (if any) are not affected. All liability that is not expressly assumed in this agreement is hereby excluded to the fullest extent permitted by law. These limitations will apply regardless of the form of action, whether under statute, in contract or tort, including negligence, or any other form of action. Nothing in this Agreement shall exclude or limit liability for fraudulent misrepresentation.
g. The parties hereby acknowledge and agree that the limitations contained in this clause 9 are reasonable in light of all the circumstances.

a. Unless the relevant party has prior written consent of the other or unless required to do so by law, neither party will disclose or make any Confidential Information available to any other person, or use the same for its own benefit, other than as contemplated by these terms and conditions.
b. Each party’s obligations under this clause will survive termination of these terms.
c. The provisions of clauses 10.a and 10.b shall not apply to any information which:
i. is or becomes public knowledge other than by a breach of this clause;
ii. is received from a third party who lawfully acquired it and who is under no obligation restricting its disclosure;
iii. is in the possession of the receiving party without restriction in relation to disclosure before the date of receipt from the disclosing party; or
iv. is independently developed without access to the Confidential Information.

a. Evongo will not be responsible to the Customer or any third party for any breach of any software license in respect of software provided to Evongo by the Customer to be installed on a Customer’s computer.
b. All software (third party or line of business applications) require a vendor support agreement
c. The Customer hereby indemnifies Evongo against any loss, damage, costs, harm or other expense whatsoever arising either directly or indirectly as a result of Evongo installing software at the request of the Customer.
d. Where Evongo provides software to enable the Customer to use its Services, Evongo grants the Customer a non-exclusive, non-transferable licence to use the software solely in connection with those Services.
e. The Customer hereby agrees to comply with any terms and conditions reasonably required by the owner of the copyright in any software to protect the owner’s interest in that software.

a. Evongo undertakes to comply with the provisions of the Data Protection Act 1998 and any related legislation insofar as the same relates to the provisions and obligations of this Agreement.
b. Evongo gathers and holds personal data about the Customer, including name, physical and email addresses, and telephone numbers.
c. Evongo does not hold credit card information.
d. The obligations set out in this clause 12 shall remain in force notwithstanding termination of this Agreement.
e. The Customer understands that in certain situations Evongo’s employees may be in a position to see the contents of the Customers files.
f. It is the Customer’s obligation to use encryption and personal security programs to increase the security and privacy of their files if any of their files are particularly private or are required under any professional or statutory regulations to be kept confidential.
g. All Evongo employees sign a client data confidentiality agreement, a copy of which is available on request.

a. Where Evongo agrees to support the Customer’s end users via a Managed Services plan:
i. the Managed Service will only be available for the Managed Equipment and number of users as set out in the Services Schedule.
ii. the Managed Services will cover up to 3 devices per user (1 x mobile phone, 1 x tablet, 1 x PC or laptop) devices must be used in the business by a named user in the Services Schedule
iii. Evongo may not cover all devices due to age or unreliability issues and advice given to upgrade or replace these
iv. Only business grade hardware is supported
v. Evongo may make a reasonable recommendation to implement software or hardware to improve security and/or reliability and this is not implemented in a timely fashion, liability for outages caused or remediation of issues may not be covered by Evongo Managed Services
vi. the Customer must give Evongo Administrator-level access to all Managed Equipment at all times and Evongo may refuse to give the Customer Administrator-level access to it.
vii. The Customer must allow Evongo remote access the Managed Equipment at all times.
viii. Evongo will monitor the Managed Equipment to give advance warning of and reduce the likelihood of any failure or breakdown. However the Customer agrees that the monitoring tools cannot detect all impending faults and may not always prevent hardware failure.
ix. The Managed Services does not include setting up, installing or moving hardware, software or Services.

a. Either party may cancel any Service at any time by giving the other party 30 days prior written notice following expiry of the contract Term.
b. Upon termination of a Service the Customer will immediately return to Evongo all Products that the Customer does not own but has been licensed to use during the term of Service.
c. Upon termination of a Service Evongo will make available to the Customer all usernames and passwords once:
i. all Products licensed to the Customer to use during the term of service are returned to Evongo; and
ii. all monies owed to Evongo are paid in full.

a. The Customer acknowledges that Evongo has a substantial investment in it’s employees that provide service to the Customer and that such employees are subject to Evongo’s control and supervision. In consideration of this investment, the Customer agrees not to solicit, hire, employ, retain or contract with any Evongo employee, without first receiving Evongo’s written consent.
b. If any employee of Evongo Pty Ltd terminates or is terminated of employment with Evongo (regardless of the reason for termination) and is employed by the Customer (or any affiliate or subsidiary of the Customer) in any capacity either during or within a 6 month period, the Customer shall immediately pay Evongo Pty Ltd an amount equal to 50% of the then current yearly salary or wage paid by Evongo to such employee.



SEO Friendly Title: Privacy

Evongo ( respects and is committed to protecting your privacy. We thus take extraordinary steps to handle any personal information collected on our website only in ways compatible with this Privacy Policy.

This website may collect certain information about your visit – such as the name of the internet service provider and the internet protocol (IP) address through which you access the internet, the date and time you access the site, the page(s) that you visit while on the site, and the internet address of the website from which you linked directly to our site.

Evongo is the sole owner of the information collected on this website. We do not (or will never) sell, share or rent this information to others in ways different from what is disclosed in our privacy statement below. This information is only used to administer our website, analyse trends and to generally help improve our site, and will never result in your receiving of spam e-mails.

Information gathered from visitors
In common with other websites, log files are stored on the Evongo web server – saving details such as the visitor’s IP address, browser type, referring page and time of visit. Cookies may be used to remember visitor preferences when interacting with the website. This information is not linked to a visitor’s personal identification in any way.

Information entered on our enquiry form – including, but not limited to, email addresses – will not be sold, rented or leased to third parties.

Where registration is required, the visitor’s email and a username may be stored on the server. Email addresses will not be sold, rented or leased to third parties.

A cookie is a piece of data stored on the visitor’s hard drive containing information about the visitor. Cookies and tracking technologies are useful for gathering information, such as browser types and operating systems, tracking the number of visitors to a website and understanding how visitors use the websites they browse. This information can help customise a website for specific users. Evongo generally uses cookies for login convenience only.

This Privacy Policy applies solely to Evongo. We are not necessarily aware of, nor are responsible for, differences in privacy statements of external websites linked to or from ours.

Changes to our policy
We may need to update this policy from time to time, in order to address new issues and reflect changes on our website. Please refer back to this policy regularly.

Continued use of the Evongo website signifies your acceptance of our Privacy Policy.

About: Industries we work with

SEO Friendly Title: IT support for Geelong industries

At Evongo, our IT support clients range from small local businesses with only a handful of staff to bigger organisations managing the needs of hundreds of people and numerous sites across the country.

We work with many different industries including manufacturing, construction, accommodation and food services, financial and insurance services, electrical services, retail, wholesale and trade, transport, education and training, not-for-profit organisations and many more.

Everything about our approach to supporting businesses is fine-tuned to ensure we deliver great results for our clients, no matter how big or small. Contact us to find out how we can tailor our business IT services to your specific needs. We can help you with managed IT servicescloud computing services, IT security servicesdata networking services and more.

About: Our Methodology

SEO Friendly Title: As Geelong IT providers, Evongo delivers great results

Through Evongo’s simple five-stage methodology, we can help you leverage technology to advance your business. We have developed a straightforward, well-defined set of processes that have achieved great results for our clients.

1.  Discover 

Evongo works closely with you to understand the way you currently do business and the outcomes you wish to achieve. Discovering how to unlock the potential for your business is our specialty. We help guide you through the possibilities and provide you with the most appropriate business IT services solution.

2.  Plan

Work smarter and more efficiently than ever before with an innovative solution developed by our experienced IT strategy planning professionals, specifically for your business. Our team only suggests complete and workable solutions that are practical and can integrate well with your existing technology.

3.  Implement

Experience seamless integration and minimal disruption to your business through our time-tested, comprehensive implementation services. The Evongo team has both the industry experience and qualifications to ensure each data networking project is delivered on time, within budget and to your satisfaction, every time.

4.  Train

Implementing new technology can be a welcome improvement to your business and your team, providing everyone knows how to use it. Evongo’s training services are fully flexible and can be customised to suit the individual requirements of your business and your people.

5.  Support

Businesses today rely heavily on their technology systems and therefore keeping them working is vital. Evongo’s IT support services can be tailored to suit your unique business needs. Our managed IT services provide a simple solution to managing your IT infrastructure and supporting your employees.

Services: Data Networking Services

SEO Friendly Title: Data networking services in Geelong

Connecting you to your network

The ability to exchange information quickly, easily and securely is a focal point for organisations of all sizes. The ever-increasing demand to access company information on the go, along with the sheer amount of data available and today’s resource-intensive applications, provides new challenges for business.

Delivering the right information to all the right people and devices at the right time is vital. Evongo’s data networking services provide new, more efficient ways for you to engage customers and keep your people connected.

Build a customised data networking solution for your business

We can design, deploy and maintain a customised data networking solution that will allow you to transfer your data safely and securely across multiple platforms and operating systems. Our mobile device management services ensure data networking protection without compromising flexibility.

As trusted IT providers, Evongo has strong relationships with a wide range of wholesale carriers and technology suppliers, allowing us to deliver the most appropriate IT support services and solutions for your business.

We also provide IT security services and business continuity services to ensure your data is safe, recoverable, and accessible at all times.

Services: IT Strategy Planning Services

SEO Friendly Title: IT strategy planning services, Geelong

Evongo’s IT strategy planning services help Geelong businesses align technology to business goals.

Do you have a plan?

Professional sports teams know that to win you need a game plan and this rule also applies in business. Whether you are looking to improve your productivity, increase your bottom line, gain more market share or whatever your goal may be, it is essential to have an IT strategy plan in place.

Get the results your business needs

A clearly defined technology strategy and roadmap from Evongo will provide you with the direction required to meet your key business objectives. Our team will work closely with you to develop a complete and workable IT strategy plan and then manage the implementation of your plans.

IT strategy planning from Evongo

Our IT strategy planning will:

Why do so many businesses trust our advice?

Experience – Our consultants have years of industry experience and can provide the guidance and IT strategies required to produce the outcomes your business needs.

Independence – We are technology agonistic so you can trust our advice to reflect your specific requirements, rather than being technology or vendor bias.

Practical – We focus on the best way to help you achieve your business goals rather than the best way to justify the latest technology.

Our experienced team will help you define a clear path for your future. We can create a roadmap to move your business to a cloud service, improve your data networking, introduce a reliable business continuity solution, or whatever your business goals may be. Contact us to find out more information about an IT strategy plan from Evongo.

Services: Mobile Device Management Services

SEO Friendly Title: Geelong mobile device management services

Evongo’s mobile device management services allow Geelong businesses flexibility while maintaining control.

Easily organise and secure all your mobile devices

How secure are the mobile devices connected to your business systems? What if they were lost or stolen? Can you guarantee people aren’t accessing your private company data?

Alleviate the complexity of controlling your mobile devices and keep your critical business data secure on both company and employee-owned mobile devices through our mobile device management services.

Features of our mobile device management services

Secure any device

Apply consistent data security policies across all IOS, Android and Windows mobile devices.

Secure email

Secure your business email, calendars and contacts on all mobile devices.

Secure apps

Implement a secure framework to distribute, protect and manage all applications company-wide.

Secure content

Access critical business content and collaborate securely across any network on any mobile device.

Secure BYOD

Protect both company data and employee privacy on all bring your own devices (BYOD).

Monitoring and asset management

Monitoring and reporting are essential requirements as businesses introduce mobile devices into the workplace.

What you will experience

Evongo’s mobile device management service provides a simple solution to managing all your mobile devices. Our professional IT support team can also provide a fully managed IT service to take care of all your business IT needs. If you are looking for IT support in Geelong please contact us to find out how we could help your business.

Services: Business Continuity Services

SEO Friendly Title: Geelong business continuity services

Effective business continuity planning has never been more important

How vulnerable are you? What if your business faced an unforeseen technical problem or human error led to the loss of critical data?

How quickly could your systems be recovered in the event of a natural disaster or a malicious attack?

Failing to prepare for such events could mean huge financial losses and major disruption to your business. That’s why it’s important to have a business continuity plan that can ensure quick and efficient recovery if something was to go wrong.

Safeguard your business with Evongo’s business continuity services

Businesses of all sizes rely so heavily on technology and stored data these days, therefore having a business continuity plan that can ensure quick and efficient recovery is crucial.

We can provide your company with a secure, automated and cost-effective cloud-based backup and disaster recovery service and then monitor and manage everything to ensure your data can easily be restored if something was to go wrong.

If you are looking for a Geelong IT provider with experience in business continuity services, the Evongo team are here to help. We have had over 15 years’ experience in business continuity planning and helping clients adequately protect their business from potentially disastrous events.

We can also help protect businesses from an unsolicited attack on your IT systems and data with our IT security services. If you are interested in learning more about how we can help protect your company or some of the other business IT services that we provide, please contact us.

Services: Hardware and Software

SEO Friendly Title: Hardware and software IT distributors in Geelong

Get the best price on the latest technology through our network of leading distributors and IT vendors

Benefit from Evongo’s strong vendor relationships with leading technology suppliers.

There are so many options with technology these days and choosing the right products for your business can be quite complex. Our experience in dealing with industry-leading manufacturers of both hardware and software allows us to provide you with informative and reliable advice on the technology and licensing models that would best fit your requirements.

As trusted IT providers in Geelong, we’ll help source the right products to meet your specific needs. Whether you’re looking for the right cloud computing solution for your business, want the best IT security service, or need help with getting the right data networking technology, our expert team can help. We also provide IT strategy planning services to ensure you align technology to your business goals.

Services: IT Security Services

SEO Friendly Title: IT security services Geelong

IT security is one of the biggest challenges facing businesses today

Regardless of size or industry, the likelihood of an unsolicited attack on an organisation’s IT systems and data has increased significantly. Not only are companies facing external attacks or intrusion from malicious sources, they are also being attacked internally by disgruntled or former employees. The risks include data breach, service disruption and identity fraud – which can all result in significant damage to a business.

Is your business at risk?

Evongo’s IT security services team can help you identify any vulnerabilities in your IT systems and environment by conducting a comprehensive security audit. The process involves actively testing the security of your web-based information systems, infrastructure and applications to expose any potential threats. We then provide you with a report on the vulnerabilities found and our recommendations.

Maximise network security and data integrity with tailored IT security services from Evongo

Our IT security specialists have implemented a wide range of solutions for our clients and as such have a wealth of expertise and experience with all the major security tools and technologies.

We can help secure your business with:

Access control – Enforcing security policies will enable you to control who or what can access your network so you can keep out potential attackers.

Data loss prevention – With the right data loss prevention technologies you can stop staff from uploading, forwarding or even printing your critical data.

Web security – Control your staff’s web use by blocking access to inappropriate and harmful websites while still allowing access to valuable content when required.

Email security – Email is the number one threat for a security breach so defending against spam, phishing and virus-laden emails is vital.

Mobile device securityMobile device management services let you control which devices can access your network and apply consistent data security policies to keep your network private.

Firewalls – A firewall will protect your business by using a set of defined rules to allow or block traffic from the internet to your internal network.

VPNs – A VPN encrypts your data so your remote workers can access your private company information without data being intercepted and read by anyone else.

Vulnerability assessments – Conducting a regular vulnerability assessment will identify any weakness in your network that might be a security threat.

Penetration testing – A penetration test mimics the actions of an actual attacker so we can evaluate the effectiveness of your security measures.

Please contact us for more information about our range of IT security services. Our security experts can also provide advice on secure cloud computing solutions or explain how we provide IT security via our managed IT services in Geelong.

Services: Cyber Security

SEO Friendly Title: Cyber security Geelong

Cybersecurity for small to medium businesses

At its fundamental simplest form, cybersecurity is protecting your local business network from attacks from the outside world. Sadly, in many cases, cyber security is only something many local Geelong business owners contemplate after they have been involved in a cybersecurity incident (when it is too late)

Myths about Cybersecurity

I’m too small for cyber attackers/hackers to worry about me

Small business owners often believe mistakenly that their business is too small and insignificant for global hackers to worry about them. This is so misguided and can only end in a bad situation. Phishing scams, Trojans from hacked websites or websites set up with malicious intent can all impact a business network. Cyber attackers are looking for any vulnerability they can find. If you have a weakness they will attempt to exploit this at your cost.

I will talk with an IT business after if it happens.

Sometimes we can work miracles and potentially recover information but this is a very rare scenario. Defence and preparation is a much better strategy than recovery.

Technology is my best defence against cyber attack

Technology is only part of the defence against cyber-attack.


Are all staff constantly on the lookout for malicious behaviour? Are they or have they been trained in best practice cyber security?  Technology is often the first line of defence but if a phishing email slips through or staff set up loose and simple passwords you could be inviting trouble into your business


Regardless of the size of your operation, does your business have online and offline backup policies and procedures, are these procedures tested regularly? Do you have staff procedures should an attack happen? What next, who do they/you call? How are staff alerted to internal issues/hacks?


Cyber Security is so much more than simply installing virus protection on your laptop. As a business owner, you are tasked with a myriad of jobs that you must oversee and it’s easy to understand how some are overlooked. Payroll, Superannuation, BAS lodgement, tax returns, One-touch payroll and the list goes on. As a business owner cyber Security is easy to let it slide because it’s not something to worry about. Sadly it is and it is something many business owners realise too late.

A good cybersecurity system puts a solid defence in place and then also provides a quick recovery to ensure business continuity with minimal interruption to your business. We can work with any size business to ensure we have all the core areas of cybersecurity covered.

Call us now to discuss how we can help provide cyber security to your business. We pride ourselves on being Geelong’s business cybersecurity experts

Services: Remote Access – Working from home

SEO Friendly Title: Remote Access Geelong, Bellarine and Surfcoast

Geelong, Bellarine and Surf coast businesses have been scrambling to set up remote access from home for many employees and the scramble continues. Many employees live on the Surfcoast and Bellarine Penisula including locations such as Torquay, Anglesea, Lorne, Queenscliff and Ocean Grove. The location itself has very little bearing on setting up home remote access, what is important is hardware and internet connectivity (broadband access).

Home Hardware

COVID-19 has created unprecedented demand in a short time frame for remote home access so most of our workforce can remain home in isolation. The good news for employers is that you can simply plug into existing personal computer hardware your employees have at home. Laptops, desktops or Macs, they can all be utilised to access work-related files and emails.

If you need to purchase new hardware this can be done at base levels to avoid excessive costs and you do not have to be an existing client of Evongo nor do you have to have an advanced IT set up. The entire job can often be performed remotely, without any of our team members ever having to visit your staff members’ homes.

What do your staff need to access?

Most businesses we deal with the staff require access to:

We can limit the access your staff have so they only see the files you want them to see. It’s important to protect your business’s confidential information. Staff can be restricted at a variety of levels when using remote access to work files and servers. SO they only get the information that is relevant to them.

Emails are essential and often it is a good opportunity to review your current email arrangements to see if they can be set up more efficiently to best suit your company requirements.

After your home remote access has been set up and established we can actively protect and support these devices on an ongoing basis. We can ensure the connection is secure and that the devices your staff are using are actively protected.

Internet Access

Internet access will always play a key role in ensuring a seamless workflow when working remotely. We can asses and or make recommendations, particularly if staff members have unreliable internet access at home.

Evongo is a leading provider of work from access in the Geelong region if you would like to learn more please contact us now.

Services: Cloud Services

SEO Friendly Title: Cloud services for Geelong businesses

Move to cloud computing with confidence

You want to ensure you only subscribe to cloud services that are cost effective, secure and that will work for your business in terms of functionality. That’s where we can help. Evongo’s Geelong-based cloud computing specialists have the industry experience and expertise to help you identify the right solution for your business.

We take a strategic approach to moving businesses to the cloud

Evongo’s cloud services team makes moving to cloud computing a smart and cost-effective choice for Geelong business, by:

Benefits of cloud computing

Experience always-on availability – most cloud service providers are extremely reliable and maintain 99.99 percent uptime.

Gain greater agility – with access to everything you need, when and wherever you need it.

Lower your risks – with your data and applications backed up in a secure offsite location.

Improve collaboration – with the ability to communicate and share information from anywhere in the world.

Less maintenance to worry about – with upgrades and support being managed for you.

Only pay for what you use – with a pay-as-you-go model, allowing you to easily scale up or down as your company’s needs change.

The Evongo team can help you successfully migrate to the latest cloud technology. We also provide IT strategy planning services to ensure you align the right technology solutions to your business goals. Please contact us to find out more about cloud computing, business IT support, data networking, or any other business IT services that you may be interested in.

Services: Managed IT Services

SEO Friendly Title: Geelong managed IT services

We make IT management in Geelong easy – a simple solution for a complex world

As leading IT providers in Geelong, Evongo understands that when it comes to technology you just want it to work. You don’t want to have to worry about whether your data is being backed up properly or whether your network is secure. You also don’t want to be hassled by your employees who can’t work due to technical issues.

Evongo’s managed IT services plans are designed specifically to take the stress away by proving a simple, cost-effective solution to managing your IT infrastructure and supporting your employees.

Managed IT service features

Help desk and remote support

Evongo’s friendly help desk team provides telephone and remote support services to our managed IT services clients from our head office in Geelong.

​Our team members are all passionate about keeping you working efficiently. That’s why we have gone to great lengths to ensure we have the right people, tools and processes in place to deliver exceptional support services.

Onsite support

Sometimes issues are beyond the scope of remote support, especially problems with computer hardware. If this is the case Evongo’s onsite support team is always ready and available to help.

Our skilled technicians have a proven track record of resolving problems quickly and efficiently and are always aiming to minimise the disruption to your business.

Monitoring and maintenance

Evongo’s remote monitoring and management platform allows us to proactively monitor the health and performance of your IT infrastructure. This system allows for early detection and remediation of issues before they become a problem.

In addition to proactive monitoring, our technicians conduct regular maintenance to ensure all your servers, workstations, mobile devices and networking equipment are functioning at peak performance.


Protecting your business from both internal and external threats is something we take very seriously. Evongo’s systematic approach to managing the security of your network is designed to reduce your exposure to security threats.

Our expert IT security services team provides all the comprehensive security measures you need to stay safe including monitoring, managing and routinely testing your security devices and systems to ensure your environment is well protected.

Backup and disaster recovery management

Businesses today are so reliant on technology to conduct business, therefore having the right business IT support, backup and disaster recovery measures in place is critical to protecting your organisation.

Evongo’s strict backup and disaster recovery management process, along with the use of market-leading technologies, will provide you with effective data protection and ensure business continuity no matter what type of disaster comes your way.

Technology steering meetings

Gain access to Evongo’s wealth of experience and expertise and get the results you’re looking for. We will work closely with you to help address your challenges, meet your goals and identify ways you can leverage technology to advance your business.

This service includes short-term and long-term planning and budgeting, quarterly reviews and ongoing consulting and guidance to help you get maximum value out of your investment in information technology.

What you will experience

Why do our managed IT services get such great results for our clients?

It all comes down to our structure and process. We believe we have the best people employed and we use the best technology and platforms available to the industry, but all that would mean nothing without having the right structure and processes in place to ensure nothing gets missed.

We have more than 15 years’ experience providing managed IT services to Geelong businesses and we know what it takes to keep our clients happy and their technology working smoothly.

Please contact us for more information about managed IT services for your business. We also provide mobile device management servicescloud computing services, data networking services and much more.

Services: IT Support

SEO Friendly Title: IT Support Geelong

Having a reliable Geelong IT support team is one of the biggest strengths a business can have today. Technology is essential to everyday operations and when systems fail, it is crucial to have experienced professionals equipped to help.

Our highly trained Evongo team is the preferred choice for Geelong business owners. We pride ourselves on our unmatched customer service and advanced expertise, putting to practice more than 15 years of industry experience.

Rather than providing a reactive service, where we show up to fix something that is broken, we keep our finger on the pulse working to maintain nothing goes wrong in the first place, minimising the disruption to your business and ensuring the smooth run of your IT services.

Whether you are a small digital agency, a large retail store, or an established construction company, we are prepared to provide competitive and tailored IT support that you will struggle to find elsewhere.

Evongo offer affordable and flexible options for your business, and provide you with timely effective services when you need them most.  Our support services can assist you with issues, big or small, remote or onsite, including:

Contact us today on 03 5228 3000 for a free no-obligation consultation today and experience the best IT support Geelong has to offer.


Windows 10 is getting a very useful Windows 11 feature

There’s no denying that Windows 11 has a lot of really cool new features.


If you haven’t made the move from Windows 10 yet, you’re missing out.


But there’s good news. To make the (eventual) move from Windows 10 to 11 a little easier, Microsoft is sharing a couple of 11’s most useful features.


The first should make printing a little easier. We can hear your cheers from here! Anything that makes printing easier is OK in our book too. Printers don’t have a terrible reputation for nothing…


This feature makes printing PIN-protected. That means when you want to print a document, you’ll send it off to the printer – but it’ll only print when you’ve reached the printer and entered your PIN.


This removes the risk of you printing something confidential and leaving it on the printer for everyone to see.


Or accidentally printing several copies of the same document. Yes, this will reduce paper waste.


And that’s not all…


There’s a second really useful feature coming over to Windows 10. It’s called Focus Assist and works alongside do not disturb.


Switching on do not disturb is great when you want a little uninterrupted time to finish a task or do some research. But if you use it a lot, you might miss a notification that you really needed to see.


Focus Assist stops that from happening. You use it alongside do not disturb and it still allows important and time-sensitive notifications and messages to reach you.


These features have been in testing since June this year. There’s still no date for when they’ll be released to everyone with Windows 10. But they’re on their way.


If you can’t wait to try more of the time saving and productivity boosting features that Windows 11 has to offer, give us a call to see how we can help you make the switch.

The Entrepreneurial Operating System can help your business focus on growth

As IT professionals, the concept of an operating system is a basic principle for us. Without Windows, macOS or even iOS, our devices wouldn’t run.


But what about an operating system for your business? Is that a crazy idea?


No, it’s not. If you think of an operating system as the fundamentals of how you want your business to operate, it makes perfect sense.


That’s where EOS comes in.


Have you heard of it before? EOS – or the Entrepreneurial Operating System – is a framework to help optimize how your business runs.


EOS has the potential to become the very core of your business, helping everyone to understand what they should be doing, and why.


It’s something that we feel not enough business owners are aware of. And while there may not be a direct link between EOS and your technology, we feel it could become an important tool in your business’s growth and development.


This guide is your introduction to EOS, so you can see if it’s right for you.



What is EOS?


EOS was designed and developed by Gino Wickman when he was just 21. He noticed that many of his fellow entrepreneurs lacked confidence and made mistakes when making business decisions.


He created EOS as a way of empowering business owners to take control of their companies in the right way, which would then allow them to take risks with confidence.


The model differs from others because it can be used by any business in any sector, anywhere in the world.


There are six key components that you focus on, in the right order (we’ll look at them in a moment). These allow you to strengthen your business, prime it for growth, and make sure everyone in the business understands their role and the part they play in the business’s success.


The program has a heavy focus on a comprehensive business strategy, as well as management theories which help you:


· See the best way of doing what you want to do

· Keep control of your business

· Make fewer mistakes along the way


Before any business gets started with EOS, your whole team should read Gino Wickman’s book Traction. This will help everyone understand exactly what needs to change, and more importantly, why. It helps everyone to realize their role in the change and why everyone must pull together.



The 6 key components


EOS focuses on 6 key components that will help you get the most out of the program and see the best results from your work. Each component must be followed for the highest chance of success.



As we’ve mentioned, you need to get everyone in the business on board. The entire team needs to know where the business is going and how you’re going to get there



You can’t achieve great vision without great people. Surround yourself with a great team from the top to the bottom



You must reduce the business down to a simple set of numbers that will give you the exact view of where you are, at a very simple, straightforward level



It’s only when these first three components are strong that you are able to develop an open, honest business. You can’t move on to the next three components until you’ve made everything visible, allowing you the right focus for the next steps.




You’ll become excellent at problem-solving, making sure that business issues disappear for the long-term rather than temporarily



You’ll learn to systemize your business by identifying and documenting all of its core processes. These define the way you run the business, so you need to create consistency and scalability



This step allows you to bring discipline and accountability to your people. Everyone should know what they’re supposed to be doing, and what will happen if they don’t





While the key components tell you what you’ll gain from using EOS, the principles tell you how you’ll get there.



Your first step is to create a plan for how to run your business. Yes, you probably have a good idea how to run your business already. But this will look at what you want to accomplish, who will be involved in helping, and what resources you’ll need



Of course, when you have a plan, you’ll need to understand how to execute it. This stage helps ensure every new idea in your strategy has been well thought out in order to prevent you making mistakes. Careful consideration means your strategy will have the very best chance of success



The other thing you need is the right control mechanisms and business operating tools. This gives everyone clear guidelines what they should be doing and what will happen if tasks aren’t completed properly



Your initiatives


As part of your strategy, you’ll be setting goals and initiatives. These may be for yourself, or for the wider business to get involved with. Whatever the initiative, it should be broken down depending on its size and the commitment needed to complete it.



These are your big initiatives that will take the most time. A good example of a boulder would be a new product or service that you’d like to introduce



These are the medium-sized initiatives. They take up some time, but they’re not necessarily enormous tasks that need huge teams and months to develop. An example may be creating an app or refreshed website for your business



Yes, you’ve guessed it, these are the smallest of your initiatives. Things that you need to get done but that won’t be all-consuming. A new hire might fall into this category.



Your people


We all know that a business is nothing without its people. In EOS, there are two roles that are absolutely vital if you want success. You’ll need to carefully consider who takes on which role, as well as anything they might need from you in order to fulfil the role to the best of their ability.


The visionary

Ideally, this will be your role as the business owner. It involves coming up with new ideas for products and/or services your business can offer. The operators – your team – are there to support you by being experts at their jobs and helping to bring your ideas to life.


The integrator

This person brings order to the chaos you create as the visionary. They should have a wealth of experience to provide support that helps with real, measurable business growth.



Your main consideration is to understand how your whole team will fit together to make sure each area in your strategy gets the right support at the right time.


However, it’s also important that your people are given the right level of autonomy throughout the process. This can be a delicate balancing act, but when you have the right people in the right roles, navigating the rest shouldn’t be too difficult.



Anything else?


EOS doesn’t use many traditional benchmarks, but it does leave room for your business to create its own unique culture and systems that most accurately reflect the company and its values.


An official EOS implementer is a popular choice for businesses that want to benefit from another level of accountability and direction. This is someone who works directly for EOS and will – at extra cost – come into your business and set up the whole process for you.


This could be a good choice. It means you’re able to commit fully without wondering if you’re doing everything the right way…


While this isn’t a program that will deliver fast results, its potential to improve everything from a business’s culture to employee mindset and even business growth is enormous.


If you’d like any help or advice on how your technology can work alongside EOS, or you’d just like to discuss your IT requirements, we’d love to talk. Get in touch

The business owner’s briefing: Reduce the burden on your brain

Focus more, be interrupted less… and get stuff done
When you’re a business owner or manager, you have a lot of responsibilities. There are also
many people who want to speak to you throughout your working day.
Unfortunately, that means that you may be interrupted more often than you’d like. And you
have to split your focus on things you’d rather give your full attention to.
It can be a big frustration.
Many business owners and managers feel this way. You are not alone!
It’s not to say that you don’t want to help out or that you haven’t got time for people. Of
course, you still care! These are your people here to help you succeed.
But sometimes wouldn’t it be nice to just sit down and complete something without being
Understand this: The more things you have to switch between during the day – and the more
unscheduled interruptions – the greater the burden on your brain.
It can lead to a feeling to total cognitive overload by the end of the day.
You’ll recognize this as getting home in a bit of a daze, and feeling like you don’t have enough
energy for your family. It’s a horrible feeling.
Fortunately, the past couple of years have given us all the productivity tools that we need.

There are five key areas to focus on:
• Scheduling
• Planning
• Workflows
• Automation
• Focus

This briefing will show you some solutions that other business owners and managers rely on.
They’re all included in Microsoft 365, which means some of them integrate with other 365
apps you use.
Of course, not every tool mentioned here will be suitable for you. Not everything will fit in
with the way that you like to work, or the way that your business runs.
But if you can use just one or two of these tools to relieve your brain of some of its burden,
that’s a great start.

Let’s start by looking at your calendar. Get your calendar right and that can eliminate many of
your productivity issues in one go.
Whoever you’re meeting and whether it’s by video call or in real life, your calendar needs to be
organized around how you personally best work. In other words, let your calendar be a slave
to you, not the other way round!
Microsoft Outlook offers lots of features that make scheduling easier.
For example, you can use the Scheduling Assistant and Room Finder to help you
coordinate the right attendees and find a meeting room. There’s even an AutoPick feature that
can work out the most suitable time and date for everyone.
For virtual meetings, use Teams. There are so many useful tools built in to make your
meetings more productive.
Another great tool for managing your diary is Bookings. This not only allows you to share
your schedule so people can book their own appointments with you, but it also lets you
customize the types of meetings or appointments you hold most often. That means the app
will automatically block out the right amount of time, and arrange the best location (whether
virtual or real) for each meeting.
Bookings will copy all the details across to your Outlook calendar too, so you’re not forever
switching between apps to know what’s next.
Our pro tip: In Bookings, set scheduling policies so your entire day’s calendar isn’t open to
other people. For example, if you prefer to meet in the mornings and focus on other work in
the afternoons, you’d only let people schedule morning meetings.
Two other pro tips on scheduling. The first can help to eliminate constant interruptions from
your team. If that’s an issue for you, then schedule time every day where you are free to chat
– “Ask Me Anything”, if you like.
This could be just 30 minutes a day. It works best when it’s the same time each day. And you
have to be strong to push back on non-urgent interruptions outside your daily Ask Me
Our other pro scheduling tip could be a real game changer for you.
Schedule time for important tasks that you want to complete without interruption in the
same way you’d schedule time for a meeting. Block it out of your diary and make yourself
It’s such a simple idea but a powerful one.

One of the best ways to keep on track with what you need to be focusing on is to plan each day
You’re probably used to doing this already to some degree, but you can take your daily
planning to the next level.
Start each day or week by creating a detailed to do list. Microsoft’s To Do app is a favorite
way to create a list and keep on top of it.
The additional features really make this tool a necessity. It allows you to track, organize and
prioritize all of your tasks each day. But that’s not why it’s so good.
Each task can be broken down into steps, and you can even create checklists to drill into
details. And here’s the really great part – you can assign tasks to members of your team, send
them reminders, and see what progress has been made.
That saves you time checking in with colleagues to see how they’re getting on, or chasing them
on email.
Pro planning tip: When you’re making your plans each day, you’ll probably notice some of
your tasks could easily be completed by other people. Don’t forget to delegate whatever you
can, and if you need to, find experts you can outsource the things you can’t handle in-house.
There are thousands of people out there waiting to do tasks for you on platforms such as
Fiverr and Upwork.

When everybody knows what they’re supposed to be doing, there’s far less room for confusion.
And when your people have a clear, well laid-out plan to follow, they’re less likely to need to
interrupt you to check details. It’s all there for them to see.
Planner is a fantastic tool for this (in some 365 subscriptions it’s now being integrated into
Teams, and is called Tasks by Planner).
Yes, there are lots of project planning tools available, and honestly, they mostly work in a
similar way. Planner is really easy to use. When you’re trying to save time, that’s a big deal.
Planner allows you to create projects and include all the people that need to be involved. You
create plans, buckets, and tasks, and can assign things to people where you need to. Any time
you make an update to a plan, the right people are notified, and there’s an in-built calendar
that lets you see due dates at a glance.
One of the really great things about Planner is that you can track your time and progress on
each task or project. Reports will detail how much time was spent on each part, which allows
you a better level of planning for future projects. It also saves you lots of time when it comes
to compiling and creating your own reports, it’s all done for you!
If you spend a lot of your time working on or overseeing projects, Microsoft Project might
be a better solution.
This tool helps to take things to the next level, allowing you to set up dynamic scheduling,
based on things like team members involved and the level of work required. With Microsoft
Project, you are able to create the dashboard that suits the project best, and take a deeper look
at each stage of the task.
You may need to pay more to access it.
Pro workflow tip: Get your team to take responsibility for their own projects, overseeing
their own workflow. This will help relieve some of your burden and give them more

One of the biggest tools at your disposal is automation.
Automating tasks that take up a lot of your time or are repetitive can save you hours every
week. And it can do the same across your entire business.
One of the best apps to help you get started is Power Automate.
This tool lets you automate many of your business functions, from data entry and reporting, to
processing forms and even invoicing. It can even make recommendations on the tasks you
could automate to make your life easier and to make you much more productive.
Everyone in the business can use it. You simply create ‘flows’ using the simple low-code drag
and drop tools, along with pre-built connectors. It also connects with your other apps and
services within Microsoft. It can even monitor your social media accounts, posts, and form
entries to capture and analyze data and trends.
If you’re not already using this tool, you’re wasting a lot of time on tasks that you don’t
personally need to be doing!
Another great thing about Power Automate is its ability to extract information from print and
digital documents, which can make things like processing paper invoices easier.
It’s a tool that every business needs to look at. There will be several functions you can use.
Pro automation tip: Power Automate allows you to link together two apps using connectors.
This means information can be copied from one app to the other. Which can save you and
your people having to enter data multiple times across different applications

If you find it difficult to focus on tasks without being interrupted, Focus Assist is for you.
It allows you to silence all digital interruptions for a set amount of time.
You may have already used it in some capacity, but in Windows 11 the feature has recently
been updated to make it even more useful.
In Windows 10, Focus Assist gave you the ability to minimize the notifications that would
distract you from the task at hand, but it needed to be switched on to work.
The updated version provides an integrated focus timer, which gives you greater control over
how and when notifications should be muted.
There is also a new do not disturb feature in Focus Assist, as well as the ability to simplify your
start menu, and clean up your taskbar.
Pro focus tip: If there are notifications you really don’t want to miss, set up priority
notifications under Do Not Disturb. That way you’ll never miss something vital, or a
personal message.

How we can help you more
Of course, there are countless other applications and tools that you can use as part of, or
alongside your Microsoft 365 subscription. Here we’ve highlighted some of the tools that
many business owners and managers find most useful.
Hopefully, you’ll finish this briefing and be raring to go, trying out applications to help reduce
your own cognitive load, but also to boost the productivity of everyone in the business.
It’s not always easy knowing where to start, and which tools might be the best option for your
specific circumstances.
If we can offer you any help or advice, we’d love to assist. Just give us a call.

What could digital IT transformation do for your business?

As an ambitious business owner, you’re always looking for new ways to help your business develop, improve, and grow, no matter how successful it already is.


You’ll also want to improve the experience for your customers.


And of course, you’ll be aware that your IT infrastructure plays a big part in this growth and the overall experience.


That works both ways. Sometimes it’s that same infrastructure that can limit how your business evolves. If you’re running older systems, or perhaps systems that don’t fully meet your needs, growth can be held back.


This is where digital IT transformation comes in.


Maybe you’ve never heard that term before. Or perhaps the concept is new to you.


Here’s a one line explanation:


Digital IT transformation is about using modern technology to create or modify business processes, culture, and customer experiences.


It involves a complete reassessment and overhaul of your technology, with the goal of improving the efficiency and delivery of your products or services.


We can make this easier with a few case studies of how big businesses you’ve definitely heard of, used digital IT transformation. Just because these are big names doesn’t mean it isn’t relevant to you… this is for all businesses, of all sizes.





Are you old enough to remember when Netflix’s business model was based on direct mail?


They’d mail their customers a DVD. Customers would watch it, post it back, then wait a few days for another DVD to arrive through their letterbox.


Of course, Netflix led the way to the streaming world we enjoy today.


That was digital IT transformation. They used technology to flip their business model on its head.


This has not only improved customer experience (now you wait seconds instead of days for a movie), but it’s also increased customer loyalty too. As of March this year, Netflix has a market value of $168 billion.





Believe it or not, in 2004, Lego was on the brink of bankruptcy. This pushed the company to start its digital IT transformation journey, which is still ongoing today.


First, Lego digitized its supply chain processes, which allowed it to gain more insight into production delays and manufacturing costs.


Then between 2008 and 2016 the company centralized its HR applications, moved to a digitized shop floor system, and streamlined its decision-making processes.


To improve customer experience, Lego added mobile apps, games and even movies to its products. The first Lego film generated an additional $467 million in revenue (off a production budget of $65 million).





When you think of Kodak today, you think of a dead camera company.


As the digital revolution took hold at the start of the century, cameras evolved from using film to storing photos digitally.


Kodak held firm with film (despite inventing the first digital camera!) under the impression that launching a digital camera would cannibalize its existing business.


Which we now know was not the case. Kodak’s failure to digitally transform at the right time led to the company losing a lot of money, and bankruptcy in 2012.


Eventually, after a big financial loss, Kodak took the step towards digital photography, but it was too late.



Of course, these are extreme cases and big famous businesses, but they highlight just what a difference embracing digital IT transformation (or failing to embrace it) can make to your business.


There are 4 main areas of transformation that you need to consider:



1. Process transformation


This is most appropriate when a business needs a radical transformation.


It can modernize your processes, integrate new technology, and save money, while still incorporating your core systems.


Process transformation can result in the most drastic changes to your business.


Before you begin, and to help decide whether it’s the right step for you right now, you need to ask yourself what your goals are for transformation:


· Do you need to upgrade your systems?

· Will you need to bring in new technology?

· Will you change your processes to a new structure?


It’s really important to set baseline metrics when deciding on process transformation. These will help you understand if the transformation is a success.


So, as well as setting new KPIs (Key Performance Indicators), you should also set baseline metrics based on your expectations of the new structure, and the typical results of your old structure.


Include things like time, cost, errors, and downtime suffered.


You should involve your team in this process. Ask for feedback on how your current system is working, it’s benefits and drawbacks.


Find out how the people using the systems would make improvements, and how their jobs could be made simpler. What would they like to see in a new system? How can they see new processes improving their role and making them more productive?


This kind of feedback can give you the most valuable insight into how your systems should be working to make the biggest improvement.


And before you embark on process transformation, you should create an ideal workflow path. This will help you identify the areas that you need to focus on first, and to really understand both the system tasks that take place, and the human element too.



2. Business model transformation


As we saw in the case studies, it’s possible to adapt or even completely reinvent your current business model to open up new opportunities for growth.


Never has this been more evident than in our post-pandemic society. Covid-19 really changed the way we think about customer experience and digitization of products and services.


As businesses we were forced to make quick decisions and digitally transform practically overnight. And although there was some tweaking along the way, we learnt a lot about the barriers that are actually in place to prohibit change, and those that we place there ourselves – you just need to look at the way the healthcare industry quickly overcame privacy concerns when it shifted to virtual appointments.


Not every business model transformation needs to be at the level of Netflix. It could mean something as simple as using data to offer customers add-on products and services that complement what they already buy, and the needs they’ve communicated to you.



3. Domain transformation


This is not necessarily the most commonly used area of digital IT transformation, but it’s worth your consideration.


New technologies have the ability to redefine your products or services in a big way. A good example of this is the way Amazon moved into a new domain with AWS (Amazon Web Services). AWS is now the most popular cloud service provider in the world.


While it wasn’t an obvious move for Amazon to dip a toe into the cloud computing industry, it was able to leverage services it already used – in this case, massive storage capacity – to create a brand new offering to its customers.


Lego also did this with its expansion into film and gaming.


Think about the products and services you already offer. Is there anything that you currently use that could be leveraged to offer another product or service?



4. Organizational transformation


It’s crucial that if your business spends time and money updating its technology and designing its processes and products, that its internal values and behaviors evolve to mirror this change, too.


Failure to get buy-in from your people could result in the complete failure of your transformation, even if everything else is primed to work. Just a little resistance can mean adoption of your new technology is slower than it should be.


And you don’t need us to point out that the result of this would be a loss of revenue, productivity, and potentially even your people.


Make the time to clearly communicate your vision for transformation. Do this regularly. Involve your people in the processes, and ask for – and importantly, listen to – their feedback along the way. Everyone should understand the risk and why it’s worth taking.



The rules


Regardless of your sector or industry and your current infrastructure and systems, any digital IT transformation strategy has 3 very important rules:


Rule 1: You must modernize your existing critical IT infrastructure if you want to increase efficiency and your management overheads.


Rule 2: You must automate your IT processes if you want to reduce risk and accelerate provisioning and deployment of applications. This includes automating the delivery and use of IT services.


Rule 3: You must transform your IT processes and operations if you want to align your IT goals, your staff, and their roles.



Of course, this is a very brief overview to a process that can be extremely complex.


Here’s a great quote on this, from transformation scientist George Westerman:


“When digital transformation is done right, it’s like a caterpillar turning into a butterfly, but when done wrong, all you have is a really fast caterpillar.”


That means, without the right investment from you, digital IT transformation just won’t happen. You need to have the right systems in place, but if you don’t know how to use them properly, you haven’t really transformed anything.


Ready to talk about this for your business? Let’s arrange a no obligation conversation to run through all the areas that will be most important.

Russian cyber-attack threat: How to protect your business

The ongoing Russian invasion of Ukraine has led to a sharp rise in cyber-attacks.

And while many of the attacks are between these two countries, there is very real potential for other countries to fall victim to cyber-attacks by Russia, thanks to the sanctions placed upon it.

President Joe Biden’s declared the government has been improving national cyber security defenses for some time now.

They’re focusing on the infrastructure to make sure that water, electricity, and oil pipeline services aren’t at increased risk of attack.

The White House has also issued a warning and some very good cyber security advice to all businesses.

There are a series of actions that businesses should be taking immediately to protect themselves against cyber-attacks, and other data security risks.

To start with look at implementing multi-factor authentication. This is where you generate a login code on another device, to prove it’s really you logging in.

Data backups should also be checked on a regular basis. Ideally there should be a copy of data that cannot be changed during a cyber-attack.

All data should also be encrypted, meaning it would have no value and be unusable if anyone did manage to access it.

It’s also a good idea to have an emergency plan ready to go that will help mitigate any attack quickly and effectively.

Businesses are also being advised to give their staff training to help them spot and avoid the common tactics used by cyber criminals.

These include phishing attacks where they send an email pretending to be someone else. And spoof login web pages, where they hope you will enter real login details in error.

If you have an IT support partner already, speak with them to make sure all of your systems are fully up-to-date and patched as necessary.

They can also help you to audit how well you’re performing with the items above, and get a plan in place to help you respond to an attack or attempted attack.

If you don’t have an IT support partner – or you feel your current one isn’t able to help you with your data security, we can help. Call us.

Your essential cloud migration strategy checklist

If you’ve ever considered moving your business’s data and applications over to a cloud-based solution, you’d be forgiven for breaking out in a cold sweat and forgetting about the entire thing.

It’s complex. And there’s a lot that can go wrong from increased downtime to data loss or things not working as they should.

But when you get it right, the benefits are countless. They can include big cost savings, increased security, and better scalability. Not to mention access to extra features that may be available.

Download our brand new guide to see how your business would benefit. It includes an essential cloud migration checklist.

Printing devices are often overlooked when it comes to security. But the reality is, cybercriminals can hack your printer to get confidential information

Your printer is probably the last piece of computer equipment you thought needed protection from cybercriminals. But the truth is very different. Attackers actively try to locate the weakest links in security to gain access to and exploit valuable data. And among the weakest links is the printer. The thing with printers nowadays is that they have access to your devices, network, and the internet. This new open-access functionality makes them an ideal target for cyberattacks. Unfortunately, many business owners overlook the importance of securing their printers and mainly focus on computers and mobile phones. Most people still perceive printers as internal devices that serve basic functions. For this very reason, they are an easy target for cybercriminals. Other than performing unauthorized print jobs, hackers can access confidential information as well as all connected computers and networks all through a printer. You may also not be aware of the amount of valuable data your printer can store about you – tax files, bank details, financial records, employee information, personal information, etc. All a hacker needs to do is get into the operating system of your printer, and they can collect this sensitive data. If you’ve just realized the importance of securing your printer, keep reading. This article shares eight tips to help you do just that.


Many things can make a printer vulnerable to cyber threats and security breaches. So, you want to get the basics right to ensure the attacks don’t happen to you. To start with, make sure to change the default password on your printer. Since anyone can access a printer remotely, a simple “123456” code won’t suffice. Second, make sure you’re using your own router to print files remotely. Never connect to “Guest” networks.


This one is a no-brainer, but everyone could use it as a reminder. Make sure to check your print trays and get rid of unused pages carrying sensitive information. There’s no easier way to prevent data leaks than this. Alternatively, you can get a shredder for your office and shred the papers you don’t want anyone to see.


Invest time and effort to ensure that your malware and firmware protection are up to date and can handle all types of hacks. The good news is that many printers come with pre-built malware protection. HP, for example, installs the HP “SureStart” software in their printers that monitors approaching targets when the printer is on. The software can shut down the device if an attack comes its way. This is a great way to prevent attacks from spreading further within the network.


Unprotected printers in a network are an extremely easy target for cybercriminals. Sure, businesses and offices require printers to access networks to perform remote prints. But if you can do the job by disabling the network access, make sure you do that. If not, tweak the printer and network settings to only allow the device to take print jobs from the network you trust. This will help avoid outside interference and security breaches.


Updating a printer is equally as important as updating your phone to the latest software. Much in the way iOS developers look for bugs and fix them in a new update, printer manufacturers work toward known device vulnerabilities and update the software for added protection. Look for printer updates so you can easily overcome known threats to the printer. Ideally, update your printers every quarter to get the most out of the security benefits.


If you run an office, chances are you already have a firewall. But in case you missed this requirement, now’s the time to do it. Using a reliable firewall helps keep printers safe from cybercriminals. Your computers most likely come with pre-built firewalls, and all you need to do is keep them enabled. But there are also specialized firewalls for homes and offices that offer advanced security and make it virtually impossible for anyone to break in.


Printers with shared networks can perform distance printing. And when a print job is in transit and travels from a computer to a printer, hackers can intercept the data and exploit it.

To keep this from happening, encrypt your print jobs. Also, make sure the sensitive data on your printer’s hard or internal drive is encrypted as well. Keep in mind that when you print a document, that file is often stored as an image within the printer and makes it an easy target for hackers. It’s why you should use an encryption tool to protect your data. Luckily, many modern printers have this tool pre-built. You can use the tool to set up a secure password that allows printer storage encryption, remove user IDs and ex-employee access, delete documents from the print queue once they’re printed, and much more.


If you work in an office, chances are you aren’t the only person using the printer. Everyone that has access to it needs to be aware of the responsibilities that come with its usage. Make sure to talk to your employees about ways to ensure both the physical and virtual safety of the printers. Your staff should also be careful when using their mobile devices to print, as smartphones are easier to hack. Explain to them what phishing scams are and how they can avoid being the victim. Finally, make sure it’s clear to them how they can use confidential information in your company


Printers are the most overlooked devices when it comes to security. Given how most business owners consider them as merely internal devices whose sole function is to print documents, it’s no wonder they are a weak spot security-wise. Whether you use printers in your office or at home, take a moment to see how you can enhance its security before your next printing job. As cybercriminals are a growing concern, each of us is responsible for protecting our data. Luckily, the tips from this article will help you bring your printer’s security to another level. If you need more insight into protecting the security of your printers, get in touch with us today. We can set up a 10-15-minute chat to discuss how you can implement these changes and keep cybercriminals away.

Article used with permission from The Technology Press

Two thirds of remote workers use a faulty device, so they don’t get into trouble

Spilt drink on computer

A new report has discovered that 67% of remote workers are using faulty tech when they work remotely.


And often that’s because they’ve accidentally damaged the tech themselves… they don’t want to admit it to their boss in case they get into trouble.


A company that sells refurbished technology surveyed 2,500 employees.


It found that laptops were most likely to be broken, followed by keyboards, monitors, and PCs.


Most of the time the damage was done by spilled food and drink. Other causes of damage included other people in the house – such as a partner or housemates – and of course, pets.


We’ve all watched in horror as a cat brushes up against a full glass of water next to a laptop…


While more than half of people try to fix the damage, and 81% of people continue to use their faulty device with limited features, a third of workers switch to their personal devices instead.


As well as this causing a loss of productivity, it could also be a huge data security risk for your business.


Because it’s possible their personal laptop doesn’t have as much security protection as their work laptop does, such as:


· Security software

· Data encryption

· Enhanced password protection such as multi-factor authentication



Their personal devices also aren’t being monitored by your IT support partner.


When an attacker gains access to an unmanaged device, if it’s connected to your network, it’s possible they can get access to the wider network, and all of your business’s data.


This can result in your data being stolen and sold. Or worse, your data being encrypted so it’s useless to you – and you must pay for its return. This is called a ransomware attack and it’s the greatest cyber security threat to your business right now.


It’s not just access to your data that’s the problem. After a ransomware attack, there is a huge time and financial cost involved in making sure your network is clean, protected and secured.


Our advice is to make sure that everyone in your business understands the risks involved with using personal devices for work purposes, whether they work remotely or not.


You might want to make a golden rule that all work must only be done on business devices.


You could also create a culture where it’s OK if a device gets damaged, so long as it’s reported quickly.


If you need any help choosing the right technology or cyber security approach for your team, or creating new policies to help your staff choose to do the right thing, give us a call.

The 7 KPIs for ROI from IT

How to ensure your business’s spend on IT is an investment, and never an expense

No matter what kind of business you run, technology sits at the heart of it today. And it’s going to become more and more important in the future.

Big business thinkers see IT as a long-term investment. They understand the correlation between the short-term impact to cash flow, and the enormous long-term benefits of business growth, increased productivity and highly satisfied staff and customers.

To get your Return on Investment (ROI) there are several Key Performance Indicators (KPIs) to track. Our new guide tells you what they are.

The security problem of John’s “other” laptop

How to keep your business’s data ultra-safe during the Work From Home revolution

Working From Home and hybrid working are here to stay. And that means as businesses, we need to get a grip on security in our staff’s homes as much as we do in the office.

We’ve written a new guide to look at all the issues.

Defend and invest: Your technology strategy for 2022

Did you get a short break at Christmas? Even if it was just a few days, that break can give you a clear mind about where to take your business this year.

We call this the January Refresh & Refocus.

Let us tell you the two technology areas that will be the most important in 2022. They are Defend and Invest.

Defend is about protecting your business from cyber criminals. We believe cyber-crime is going to rise again this year, to levels never seen before.

Invest is about making sure technology is powering your business forward, not holding it back.

Our new guide looks at both these areas in detail.

Here’s a crazy question: Are you paying your IT support partner enough?

I bet that’s a question you’ve never asked yourself before…

But it’s important you do. Because in the world of technology, there’s a definite link between what you pay, and the quality of the service you receive.

Picking an IT provider on price alone is a false economy. If you’re paying too little, you’re running one of four big risks.

Find out what they are in our brand new guide.

Windows 11: The wait is over

All the benefits of using the very latest version of Windows in your business

After a four month wait, a brand new version of Windows is finally here. It’s a lot more secure, has better functionality and greater possibilities.

And it looks beautiful.

New PCs are now on sale with Windows 11, and the upgrade will be available for existing computers early next year.

Not all machines will be able to upgrade. There are tough hardware requirements.

We’ve listed them, plus the best benefits of the new Windows, in a brand new guide. It’s written so anyone can understand it.

Be prepared: Sooner or later your business WILL be attacked

5 steps to improve your ransomware resilience

Ransomware is the most terrifying data security threat your business has ever faced.

Imagine all your staff trying to login one morning. But all of them get a bright red screen saying your data has been locked away, and you must pay a huge ransom in Bitcoin to get it back.


Read our new guide now. We’ll answer all your questions about ransomware. Plus, you’ll discover five steps to improve your business’s ransomware resilience.

If your IT support company is ALWAYS fixing your technology… it’s time to switch

Improve profits with your IT partner’s Proactive Problem Prevention

Just fixing technology when it breaks is so 2010. These days most businesses prefer an IT partner who proactively prevents problems from happening.

If you don’t have this, you really need to read our brand new guide. You’ll see the countless benefits for your business of a more proactive approach to your IT.

10 apps you didn’t know you had in Microsoft 365

Boost productivity, save time, and improve customer experience

Most people see Microsoft 365 as the place to access Word, Excel, PowerPoint, and Teams.

But there’s so much more to it than that. There are so many apps bundled in, that whatever productivity problem you have in your business right now, the answer could be within 365.

Get our new guide. And we’ll tell you about 10 useful Microsoft 365 apps you didn’t even know you already had.

The biggest security threat to your business is on your payroll

Revealed: The real cost of insider attacks – and your strategy to prevent them

The chance of your business’s data being breached by an inside attack is high.

Most inside attacks are accidental. A well-meaning employee clicks on a bad link by mistake.

But there are some attacks caused by malicious attackers, deliberately looking to do damage, or make money.

Both of these kinds of attacks can be prevented and minimized by focusing on five key areas in your IT strategy.

Read our new guide now to assess how prepared your business is.

These are the threats to worry about

An easy to read guide to the 9 most terrifying types of malware

All businesses are being targeted by malware, all the time. And it’s estimated there are now one billion pieces of it out there.

What is malware? It’s malicious software that’s been designed to do damage to your IT systems or steal your data.

Malware terrifies most IT professionals. And it should terrify you too.

We’ve written a brand new guide to tell you about the nine most common types of malware. It’s been written so anyone can understand it.

Crisis: Your office is on fire

This is something none of us wants to experience. But it does happen.

There’s a small fire in your office. No-one is hurt and everyone is safe. But the damage to your workplace is unbelievable.

The flames. The heat. The smoke. And of course, the huge amounts of water used to put out the fire.

Here’s a good question – if there had been a fire in your office last night, what would you wish you’d got round to doing yesterday?

Think about all your computers and specifically the data on them. Is your data as protected and backed up as it could be?

Are you triple sure of that?

Read our brand new guide now. It’ll show you the things you need to make a priority to keep you protected from any disaster.

Cyber-crime: Your business’s 5 step plan to prepare and protect

Two years ago, two thirds of all organisations reported some type of incident relating to cyber-crime.

That’s bound to be higher now because of the fraud opportunities created by the rush to Work From Home.

In fact, overall, the world economy loses more than $1 trillion to cyber-crime every year.

It’s a figure that’s increased by more than 50% since 2018.

Fact: Your business needs to be as prepared as it can be against the threat of cyber-crime.

Read our brand new guide now. And you’ll see our recommended 5 step plan to prepare for an attack, and protect your business.

Repair or replace? 7 signs that you need a new computer

It’s always tempting to hold back on purchasing new IT equipment. Yet it can sometimes cost you more if you hang onto equipment for too long.

Did you know that if a device is more than 3 years old it’s cheaper to buy a new one?

It’s all about getting the balance right. Between equipment that can be repaired and will happily last another couple of years – versus slow, unproductive equipment that really needs to be replaced.

Read our brand new guide now. And you’ll learn 7 signs that will tell you whether you need new computers.

The top 5 questions you could ask us, that we’d love to say ‘YES’ to

The pandemic made hundreds of businesses round here question the quality of the IT support they were receiving.

We’ve been very busy recently talking to businesses, and onboarding new clients as their IT partner.

There are five questions that you could ask us, and we’d be delighted to answer with a very positive YES!

So, we’ve put them into this brand new guide. Download it instantly.

Your 2021 productivity super guide

Ready to make this a wildly successful year for your business?

To shake off the memories of 2020, and focus on increasing sales and profitability? Excellent.

A great place to start is helping you and your team to get more done in less time.

We’ve pulled together a productivity super guide, looking at setting goals, collaboration, and communication. And of course, it lists our most highly recommended productivity tools.

Download your guide instantly.

5 key IT areas you must address in your business’s 2021 growth strategy

All business owners and managers hate it when their staff’s productivity goes down.

Bad IT is often used as an excuse to start talking and stop working! So, now’s the time to make sure it can’t have a negative effect in 2021.

(it’s going to be a challenging enough year as it is)

You and your team could be more productive, more motivated – and ultimately make more money – with some changes to your technology strategy.

We’ve created a new, free guide to show you the 5 key things you must include in your IT strategy (number 3’s the one your staff will be delighted to help with).

Download it instantly – right now.

4 signs you’re under attack from ransomware

A ransomware attack is one of the most terrifying things that can happen to your business.

This is the computer attack where a hacker locks you out of your systems and data. And you must pay a ransom, typically in Bitcoin, to get access again.

What most people don’t realize is that hackers access your system weeks before they launch the attack. It takes time for them to set it up, and prevent IT security experts from helping.

So, there are signs to look out for – ways to spot if your system has already been breached, and an attack is imminent.

Download our brand new guide and know how to keep your business safe.

Download Guide

This is the ultimate secret to keeping your business data safe

Hackers are targeting all businesses, all the time. Using clever automated tools, and by sending out billions of emails every day.

It only takes one person to click on one bad link… and hackers can get into your system.

That’s why we’ve written a brand new guide. To tell you about the ultimate secret to keeping your business data safe.

You won’t believe how simple it is. Download your copy now.

Evongo securing Geelong businesses with quality IT security services

Is your Geelong small to medium business looking for trusted IT security services that will ensure the safety and wellbeing of your technology and data systems? Evongo is here to help. Our expert team of IT professionals are trained and fully equipped to safeguard your business from some of the biggest challenges they are facing today including malicious intrusions, external attacks, angry former employees, and identity fraud.

As a small business ourselves, we understand the multitude of concerns that businesses encounter. From managing a team of employees and marketing to hitting KPIs and making a profit. Often times, maintaining the general IT security of your business can be is the last thing on your mind, when in fact it is absolutely pivotal to its longevity.

Without professional and tailored IT security solutions, your business is vulnerable to network break-ins, theft of private information and data, as well as the financial well-being of your business.

Evongo’s services in IT security help to protect your business against threats such as these by implementing secure web, email, and mobile device security systems, building firewalls, conducting penetration tests and vulnerability assessments, installing VPNs and data loss prevention technologies, in addition to enforcing workplace security policies. With Evongo’s expertise, you can assure the safety and long-life security of your Geelong business.

If you’re in a position where you believe your small to medium Geelong business could be at risk of IT attacks, then you must get in contact with us today on (03) 5228 3000 or visit us at Suite 7, 18-20 Riversdale Road Newtown.

We at Evongo pride ourselves on outstanding customer service and ongoing support and can provide completely tailored and flexible solutions to suit your business’s circumstance. We look forward to hearing from you soon.

Geelong IT Security Services - Evongo

Workplace Cybersecurity Policies Geelong

Workplace cybersecurity policies are crucial documents made up of various statements that guide employees behaviour in reference to the security of private company information and IT systems. Such policies are not reserved only for big corporations like Apple or Amazon but are important for small to medium Geelong businesses.

We at Evongo help your small business develop a strong workplace cybersecurity policy that provides a clear guideline to the employees within your business, and in turn, builds a secure wall against exterior cyber threats.

Cybersecurity issues, minor or large, can have devastating impacts on small businesses, such as the loss of confidential information and data. To avoid this, you must provide employees with a workplace cybersecurity policy.

These policies are developed under the guidance of the Australian government and aim to protect businesses against the following cyber threats:

As part of our cybersecurity policies, Evongo guides employees through key areas of consideration that include the reasoning behind automatic updates, backups, access control, and encourage a multi-factor authentication measure, which requires two forms of proof to allow access.

Contact us on 1300 765 975 and talk to our expert professionals to start developing your cybersecurity policy for your small business in Geelong today! Our team look forward to your call. 

Download the Australian Government Small Business Cyber Security Guide Here

Business dark web scan Geelong

Dark web scanning is the practice of scanning the dark web (the darknet) to find if any individual’s personal or corporate logins and passwords have been compromised. If you know, how to look, and where to look, on the dark web it is not uncommon to find compromised passwords for sale on the dark web. And it’s not just passwords. The dark web is a very murky place and is a rabbit warren of data. Blogs and forums, chat rooms, private networks and hidden sites.

Typically the higher the level the employee in a particular business the higher the exposure to risk for the business if this information has become available for sale on the dark web. Based in Geelong but working for businesses across Australia it is not uncommon for us to find compromised passwords for executives for sale on the dark web.

Business continuity and cybersecurity are the champions of protecting your business and often considered the front line in protecting your data. But what if your usernames and or passwords have been stolen and or compromised. How would you know? What are the best practices to protect you from the dark web?

At Evongo we regularly perform dark web scans here in Geelong for small, medium and large businesses. You would be surprised how often we find compromised passwords for sale. The dark web is a very murky place and is a rabbit warren of data. Blogs and forums, chat rooms, private networks and hidden sites.

Business accounts, stolen email addresses, passwords and usernames. You would be amazed at what you can find for sale on the dark web. With the potential for exposure to risk can you afford not to have a dark webs scan done?

Evongo also offer Geelong businesses reliable and advanced IT support.

If you would like to discuss getting a dark web scan done for your business and your staff,  give us a call now.

Remote home IT support Geelong

COVID-19 has changed the way the world does business forever. In a scramble to get employees set up to work from home, many employees are utilising their staff’s hardware and internet connections. Remote home access IT support is where we access your home computers from our offices in Geelong via remote access and provide all the IT support required. The remote support we offer may include but not limited to:

Personal home computer hardware is not without its risks. Old, outdated equipment, questionable software, potential Trojans are gaining access to your system, limited virus protection if any and limited internet access (varying Internet Service Providers ISPs). At Evongo, we can provide an effective audit of all elements to actively run your business from multiple home locations with limited risk.

We are ensuring secure connections and that all required software is running smoothly. And if there is an issue when IT support is needed, we can be online very swiftly to address any questions or concerns you have.

Post COVID-19 the world is going to be a very different place, and many businesses will be reviewing work placements arrangements. It is now given now that many companies Post Covid-19 will be having more staff working from home. A report in the New Daily has a headline stating “Almost half of the workforce to work remotely after Coronavirus“.

If like many businesses you are contemplating a workforce restructure and need to step your IT resourcing up a level call Rod and the team at Evongo. Geelong’s specialist remote IT, support team, keeping businesses and staff connected.

Working from home remote access to emails and files, Geelong

In these unprecedented times, due to the announcement of a pandemic because of the Coronavirus / Covid-19, working from home, access to emails and remote access to files is something we are regularly asked about by our local Geelong based businesses.

If you are an existing client of Evongo here in Geelong, then the odds are that we already have you well set up for remote email access and remote file access. If not, this is something we can organise promptly. Occasionally there may be hurdles; however, this is rare.

If you are not an Evongo client, we can also help. As the pandemic spreads and all indications are that it will, it will not always be possible to visit on-site, but with remote access capabilities today we may be able to assist.

While it is possible to set up the following as needed for working from home:

At Evongo, we would recommend that as a business owner, you act sooner rather than later so that you are 100% set up to operate remotely in a worst-case scenario. Be prepared as best as you can.

Working from home enables staff to continue to work while either self-isolating and or to allow social spacing and assist in delaying the onset of the pandemic.

Call Rod and the team now for an initial assessment of what they can do for you to assist you or your team members in working from home with full remote access for all your staff. It’s often more straightforward than you expect and once set up; it will hold you in good stead moving forward. At Evongo, we are your business continuity experts.

Business continuity and your business in Geelong

What is business continuity?

Look up business continuity online, and you will be overwhelmed by a plethora of definitions using terms that are designed to shock. ‘Critical’, ‘disaster’, ‘fire’, ‘recovery’, ‘incident’, ‘cyber-attack’,’ flood’ and ‘dangers’ are just some of the words you will be confronted with on the home page of Google when searching for “IT and business continuity.”

While this is alarmist, this is what can happen when you don’t plan for business continuity at an IT level. Sadly for many local businesses here in Geelong, these words only come to mind when it is too late. Regardless of what incident has the potential to cause you pain, if you are prepared for such an event or incident, then the pain will be minimal if at all. Your customers will be none the wiser and business continues as per usual.

Business continuity is your ability as an organisation to continue functioning relatively unabated should a critical incident happen to your Information Technology (IT) systems. Business continuity is about;

When it comes to business continuity, you need to rely on the three core elements

  1. People
  2. Process
  3. IT technology

At Evongo, we take the hassle and the stress out of your IT business continuity planning and implementation. We will develop the required plans by identifying vulnerabilities and critical data sets in your business. We can then implement state of the art continuity plans and processes so that in the event of an incident occurring to your business you can continue functioning and you the business owner can do what you do best and make money.

Evongo also offer Geelong businesses reliable and advanced IT support.

Call us now to discuss your business continuity needs in Geelong and surrounds.

Cyber security for your business in Geelong

No matter the size of your business n Geelong, small, medium or large, the threat of cyber attacks is growing. Cybersecurity for business (and not just Geelong) is something that needs to be taken incredibly seriously. We find that we are often called after a cyber attack has happened. As the adage goes, “prevention is better than the cure”. Calling an IT business to come in and do a cyber attack rescue is sometimes like calling the fire brigade after your house has already burnt down and you have no insurance.

Before we get into some cyber threats to consider this year, the best thing you can do is prepare your IT defences as best you can in advance. Contact an IT professional and implement simple processes and systems.

It’s very difficult to retrieve data from a backup that doesn’t exist.

Threats on the rise

Crypto Locking Ransomware

Ransom ware continues to be a major issue for small to medium businesses and you would be amazed at how many local small to medium businesses in Geelong have been impacted. The re is often this misguided belief that hackers won’t be interested in your small to medium business here in Geelong. Think again. You are wrong if you are complacent. These people aren’t doing this manually. Thye have bots scouring the world wide web looking for businesses like yours that are vulnerable. There has also been a move to crypto hacking. The art of hijacking (unauthorised access) to your computer to aid in data mining for cryptocurrency.

Cyber security shortfalls

The advance in techniques adopted by cyber-attacks is growing rapidly and unless you are monitoring and aware of advances being made by these malicious cyber attackers you may be left vulnerable and exposed.  IT security is not a set and forget checklist item for your small to medium business. It is 24 hours a day seven days a week. Bots don’t take weekends off, in fact, they never take a break.

When security patches are released you need to activate them as soon as possible. Ideally, within a 30-day window as a worst-case scenario. It very hard to update a patch sometimes when you are too busy to be aware that a security patch has been released. (Windows 7 will create an entire raft of issues for those that have to update after Windows 7 End of Life)

The disgruntled employee

A disgruntled ex-employee may still have access to proprietary and confidential data or even worse a current may be logged in to areas when unauthorised or logging on to restricted computer files? Staff are downloading new applications on systems they shouldn’t be. You need to talk with your IT professional. This is not something again that can be monitored internally. The threat here is real and needs to be considered.

The Cloud is safe. No need to worry

Again, you can’t be complacent here. The cloud is not safe and your small to medium business needs to be prepared and following processes and protocol. At the end of the day, it gets down to awareness and process. Back up your files offline regularly. Are you using cloud-based services, are you using layered.authentication? Be aware it’s not straight forward. It needs to be considered.

Cybersecurity is a real threat for all businesses in the new millennium and calling an IT expert after you have been cyber-attacked can be too late.  Based in Geelong we service clients from all sizes of business in a vast range of business and industry categories. If you are concerned at your risk and exposure to cyber-attack call us now to discuss how we may be able to help.




Windows 7 End of Life

Does my Geelong business have to upgrade from Windows 7?

The definitive answer is YES. Stop running Windows 7 and upgrade.

Windows 7 was released back in 2009 at the same time that Windows Server 2008 was released. It essentially was released to get on top of many issues with Windows Vista which had not been received well for a variety of reasons. The release of Windows 7 and Windows Server 2008 was welcomed with open arms and generally considered a very successful improvement from Windows Vista.

When does Windows 7 stop working?

Windows 7 won’t stop working, it will continue to work however on the 14th January 2020 Windows 7 will reach its end of life phase (EOL). This essentially means Microsoft will no longer continue supporting Windows 7 or Windows Server 2008

If you continue to use either Windows 7 or Windows Server 2008 , you are leaving yourself and or your business wide open to exploitation. If new vulnerabilities are exposed your computers and or network can be exposed. The simple fact that Microsoft have been so vocal in declaring the EOL means hackers will be lining up to find those running these week and vulnerable systems and machines. Don’t leave your front door unlocked and wide open for Cyber criminals to walk right on in.

If you continue using Windows 7 or Windows Server 2008 you can purchase what is known as an ESU or Extended Security Update. This has a scaled cost and increases incrementally year on year. There may be a legitimate reason due to applications you may be running to maintain Windows 7 or Windows Server 2008, however the reality is that this will only apply in a very small percentage of business and maintaining Windows 7 and or Windows Server 2008 is not a long term option.
If you are a local Geelong based business or operate within the Bellarine or the Surf Coast you really need to give us a call.
Next Steps:

  1. If you haven’t already contact an IT professional (This is very serious and needs to be addressed)
  2. Replace outdated hardware
  3. Migrate existing devices to Windows 10. Update your software as an urgent priority

Evongo also offer Geelong businesses reliable and advanced IT support.

If you have any concerns or need more information call us now.

IT security services Geelong

In today’s increasingly interconnected world, IT security services are more important than ever and Geelong is not immune from the malicious hackers scouring the web. With the advent of the Internet of Things (IoT), we are more connected to the world via our devices – but this has important implications for privacy and security.

What is the IoT?

The Internet of Things (IoT) describes the network of connected smart devices, such as baby monitors, TVs, fridges, toasters and more, exchanging behavioural data with each other. On the surface, these devices aim to make our lives easier – but it’s important to remember the data exchange is not necessarily a one-way street.

How does it impact privacy and security?

With the increased connectivity the IoT and smart devices offer, comes increased risk of attack.

In order for these devices to help us, they need to watch or listen to what we do. However, if the devices are not fitted with encryption and the right security, hackers can gain access and control over not only the data, but the device itself.

In some cases, parents found baby monitors were being hacked to yell at sleeping children, and in a recent experiment, hackers were able to disable a cars accelerator through the entertainment system.

Do I need IT security services?

With our experienced IT security services team, Evongo here in Geelong can test and inspect your networks, technology and programs to ensure maximum data integrity and prevent the likelihood of hackers accessing your information.

By identifying potential weak spots, we can implement effective access control, technology and security policies to protect your business from potentially costly data breaches or attacks.

Please contact us to find out more about the IoT and if your IT security services are up to date.

The Notifiable Data Breaches scheme – what you need to know

Under the Notifiable Data Breaches (NDB) scheme, organisations and IT providers are obligated to notify individuals where personal information involved in a data breach and likely to result in serious harm. At Evongo, we are dedicated to protecting our clients and ensuring we are compliant with all obligations.

What are my obligations in the case of a data breach?

The Privacy Amendment (Notifiable Data Breaches) Act was passed in 2017 and requires organisations to:

The NDB applies to Australian Government agencies, credit reporting bodies, health service providers and businesses and not-for-profit organisations with an annual turnover of $3 million or higher. You can find out more via the Office of the Australian Information Commissioner website.

How can our IT providers protect your business?

Our trained specialists conduct vulnerability assessments and testing to understand potential points of weakness in your business, and install security frameworks and programs. We can:

At Evongo, we ensure all staff are educated and trained in the latest IT systems, data, access and protocols, and all staff policy documents are kept up to date – so we can help you protect your business and your data.

Please contact us for more information.

What you need to know about choosing the right Geelong IT provider

Is your current IT provider supporting your business the way you need? Here are some things to consider when choosing the right Geelong IT provider to help your business improve security, efficiency and processes.

Can your IT provider scale their services to meet your business needs?

At Evongo, we work with both large and small businesses and can adapt our processes, technology, training and support to meet the needs of a small team or an organisation with multiple sites. We make the effort to understand our clients’ needs, and tailor solutions to suit a vast array of industries, from manufacturing and construction through to financial institutions and not-for-profit organisations.

Do you have access to the latest technology?

Data and network security is a key factor when it comes to protecting businesses from the threat of fraud and costly data breaches. At Evongo, our experienced IT providers are trained in the latest data and networking technology, including cloud-based programs and mobile device management.

Does your IT provider offer training?

Implementing new technology and processes should be simple and cost-effective for your business. Your business will not benefit from new IT services unless everyone knows how to use them correctly, so training is an essential part of an IT provider’s service.

At Evongo, we have a fully flexible training program tailored to the specific, custom programs and technologies we implement as well as your specific business requirements.

Do you receive the support you need?

Technology is a vital part of any business, so it’s important to have the necessary support in the event of any issues. We have a range of support programs with the core focus of keeping your IT systems and technology functioning at optimum capacity so you can focus on growing your business.

At Evongo, we have more than 15 years’ experience as a leading IT provider in Geelong, tailoring high-quality, cost-effective solutions to help businesses maximise efficiency and productivity.

Please contact us for more information about how we can work with your business.