Blog

Navigating Beyond the Essential Eight: Evisent’s Advanced Cybersecurity Approach

Navigating Beyond the Essential Eight: Evisent’s Advanced Cybersecurity Approach

Case Studies Opinion
In the dynamic landscape of cybersecurity, Australia's Essential Eight framework has been a cornerstone for organisations aiming to fortify their...
Read More
AT&T’s Data Breach Saga: A Wake-Up Call for Digital Security

AT&T’s Data Breach Saga: A Wake-Up Call for Digital Security

Security
In a startling revelation that has sent shockwaves through the digital world, AT&T has confirmed a massive data breach impacting...
Read More
Google Cracks Down on Spoofed Emails for Enhanced Phishing Protection

Google Cracks Down on Spoofed Emails for Enhanced Phishing Protection

Security
In a significant move to bolster email security, Google has announced a crackdown on spoofed emails, setting the stage for...
Read More
Beware: The New Wave of Phishing Attacks on Microsoft 365 and Gmail Accounts

Beware: The New Wave of Phishing Attacks on Microsoft 365 and Gmail Accounts

News Security
In the ever-evolving landscape of cyber threats, a new player has emerged, targeting the very core of our digital security....
Read More
Transforming Small Business Operations in Australia with Evisent Partnership

Transforming Small Business Operations in Australia with Evisent Partnership

Productivity
Hello, Australian small business owners! As you navigate the complexities of managing your enterprise in today's dynamic environment, it's imperative...
Read More
Navigating the Surge in Sophisticated Phishing Attacks Targeting Financial Services

Navigating the Surge in Sophisticated Phishing Attacks Targeting Financial Services

Security
In the past few days, the financial services sector has witnessed a significant uptick in phishing and credential theft attempts,...
Read More
Cyber-Attacks: The Leading Culprit Behind Business Outages and the Role of MSPs Like Evisent

Cyber-Attacks: The Leading Culprit Behind Business Outages and the Role of MSPs Like Evisent

Opinion Security
Today, we're diving into a topic that's causing a fair bit of stir in the business world: cyber-attacks and their...
Read More
Microsoft Intune Suite Revolutionises Endpoint Management: Security, Simplification, and Savings Unleashed

Microsoft Intune Suite Revolutionises Endpoint Management: Security, Simplification, and Savings Unleashed

Security
Microsoft has just announced a pivotal advancement in endpoint management with the launch of three innovative solutions within the Microsoft...
Read More
Australia Watches Closely as US Proposes ‘Know Your Customer’ Requirements for Cloud Providers

Australia Watches Closely as US Proposes ‘Know Your Customer’ Requirements for Cloud Providers

Opinion
In a significant move towards enhancing cybersecurity measures, the United States is set to propose 'Know Your Customer' (KYC) requirements...
Read More
Strengthening Law Enforcement’s Digital Capabilities: AUDa’s Push for Enhanced Training

Strengthening Law Enforcement’s Digital Capabilities: AUDa’s Push for Enhanced Training

News Productivity
In a move to bolster the capabilities of law enforcement in the digital era, the Australian Domain Administration (auDA) is...
Read More
Guard Against DarkGate Malware: Evisent’s Solution to Microsoft Teams Phishing Threats

Guard Against DarkGate Malware: Evisent’s Solution to Microsoft Teams Phishing Threats

Security
In the ever-evolving landscape of cybersecurity threats, the recent revelation of Microsoft Teams phishing attacks pushing DarkGate malware serves as...
Read More
AnyDesk Under Siege: Hackers Breach Servers in a Shocking Cyberattack!

AnyDesk Under Siege: Hackers Breach Servers in a Shocking Cyberattack!

News Security
In a startling revelation that has sent shockwaves through the tech community, AnyDesk, a widely-used remote access solution, has confirmed...
Read More
The Pitfalls of Direct M365 Purchases: Why Companies Should Think Twice

The Pitfalls of Direct M365 Purchases: Why Companies Should Think Twice

Opinion
In the ever-evolving world of business tech, Microsoft 365 (M365) has become a go-to for many Aussie organisations, offering a...
Read More
Brute Force and Stealth Tactics in Cyber Espionage – Strengthening Defences with Evisent

Brute Force and Stealth Tactics in Cyber Espionage – Strengthening Defences with Evisent

Security
In the ever-evolving landscape of cybersecurity, staying vigilant is key to safeguarding against emerging threats. A recent report from Trend...
Read More
Unveiling the Digital Pandora’s Box: 26 Billion Record Leak Exposes Dropbox, LinkedIn, and Twitter Users

Unveiling the Digital Pandora’s Box: 26 Billion Record Leak Exposes Dropbox, LinkedIn, and Twitter Users

News Security
Beyond the Breach: The Crucial Role of Cybersecurity Partners in Safeguarding Business Integrity In the wake of the staggering 26...
Read More
Unlocking Efficiency: Microsoft Copilot Now Accessible for Small Businesses in Australia

Unlocking Efficiency: Microsoft Copilot Now Accessible for Small Businesses in Australia

Productivity
In a groundbreaking move, Microsoft has recently announced the expansion of its Copilot feature to companies with under 300 seats,...
Read More
Fortifying Cyber Defenses: Microsoft’s Crucial Update and Its Business Benefits

Fortifying Cyber Defenses: Microsoft’s Crucial Update and Its Business Benefits

Security
In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount for businesses. A recent development from Microsoft...
Read More
Strengthening Cybersecurity Defenses Down Under: Urgent Call for MFA Implementation

Strengthening Cybersecurity Defenses Down Under: Urgent Call for MFA Implementation

Security
In the wake of the recent cyber attack on X, previously known as Twitter, the spotlight is once again on...
Read More
The Power of Office 365: A Quick Overview of Essential Tools

The Power of Office 365: A Quick Overview of Essential Tools

Productivity
In today's digital age, productivity is crucial for business success. With numerous tools available, it can be overwhelming to choose...
Read More
Queensland Passes Mandatory Data Breach Notification Scheme

Queensland Passes Mandatory Data Breach Notification Scheme

News
In today's digital age, the protection of personal information has become a major concern. With the increasing number of data...
Read More
Protect Your Business with Managed Service Providers (MSPs)

Protect Your Business with Managed Service Providers (MSPs)

News Opinion
In today's digital age, the threat of cyber attacks is a constant concern for businesses of all sizes. According to...
Read More
Personal Data of Almost 200 Patients Exposed in Hack of Melbourne Hospital Staff Members’ Email

Personal Data of Almost 200 Patients Exposed in Hack of Melbourne Hospital Staff Members’ Email

News Security
In today's digital age, data breaches have become an alarming reality. The recent incident at a Melbourne hospital, where the...
Read More
Government to Scrap Privacy Act Exemption for Small Businesses

Government to Scrap Privacy Act Exemption for Small Businesses

News Security
Businesses generating up to $3 million annually will be subjected to new data privacy standards, following the government's recent declaration...
Read More
The LastPass Data Breach: A Cautionary Tale of Inaction and Crypto Losses

The LastPass Data Breach: A Cautionary Tale of Inaction and Crypto Losses

News Security
In the ever-evolving digital world, security is of utmost importance. This is especially true when it comes to safeguarding passwords,...
Read More
The MGM Grand Cyberattack: A Case Study in Human Error and Corporate Risk

The MGM Grand Cyberattack: A Case Study in Human Error and Corporate Risk

News Security
The ransomware group ALPHV, also known as BlackCat, has reportedly compromised MGM Grand casinos, affecting its operations across multiple states...
Read More
Responding to Data Breaches: A Compliance Checklist for Australian Businesses

Responding to Data Breaches: A Compliance Checklist for Australian Businesses

“How to” Guides News Security
Data breaches are an unfortunate reality in today's interconnected world. For businesses operating in Australia, navigating the aftermath of a...
Read More
$4k in savings on our clients’ M365 Licensing, can we do the same for you? Limited opportunity, price increases effective 1st September 2023

$4k in savings on our clients’ M365 Licensing, can we do the same for you? Limited opportunity, price increases effective 1st September 2023

“How to” Guides Case Studies News
Microsoft will be increasing their licensing subscription costs effective from 1st September 2023, posing a significant financial impact on businesses...
Read More
Why MFA is No Longer Effective Against Business Email Compromise Due to AiTM Attacks

Why MFA is No Longer Effective Against Business Email Compromise Due to AiTM Attacks

News Security
In the digital age, security has become a paramount concern for businesses worldwide. One of the most common methods of...
Read More
Cybersecurity Breach Hits Australian Financial Firm Perpetual Digital

Cybersecurity Breach Hits Australian Financial Firm Perpetual Digital

News
Perpetual Hit by Third-Party Security Breach In a recent turn of events, Perpetual, a renowned financial services provider in Australia,...
Read More
Assessing Cyber Risks: Safeguarding the National Disability Insurance Scheme (NDIS)

Assessing Cyber Risks: Safeguarding the National Disability Insurance Scheme (NDIS)

Security
In today's interconnected world, where technology plays a pivotal role in various sectors, cybersecurity has become a critical concern. This...
Read More
<strong>Top Ten Questions to Ask Your IT Provider About Cyber Security Measures Protecting Your Business</strong>

Top Ten Questions to Ask Your IT Provider About Cyber Security Measures Protecting Your Business

“How to” Guides Security
In today's digital age, cyber security is a critical concern for businesses of all sizes. As threats continue to evolve,...
Read More
Microsoft Updates November 2022

Microsoft Updates November 2022

News
Our team at Evisent are continually monitoring developments in the ever-evolving world of Information Technology.  Microsoft releases more than 100...
Read More
Australian Cyber Attacks:  Your security, your responsibility.

Australian Cyber Attacks: Your security, your responsibility.

News Security
There have been frequent reports in the media recently in relation to personal information held by businesses being compromised by...
Read More
Optus Data Breach – Recommended actions

Optus Data Breach – Recommended actions

News Security
As you are likely aware, on the 22nd September Optus disclosed what may have been the single largest data breach...
Read More
Microsoft Office “Follina” Zero-Day Attack

Microsoft Office “Follina” Zero-Day Attack

Security
Experts have uncovered a new cyber attack, codenamed "Follina", that bypasses traditional protections, including most popular anti virus softwares.. Key...
Read More
Seven Ways to Maximise Cloud Solutions for Your Small Business

Seven Ways to Maximise Cloud Solutions for Your Small Business

Productivity Security Uncategorised
Cloud computing has been front and centre of the global shift to remote working. Find out how you can maximise...
Read More
The Importance of Virtualised Infrastructure Security

The Importance of Virtualised Infrastructure Security

Security Uncategorised
A torn-down virtual infrastructure creates risks for any business. And it can have a significant impact on how quickly you...
Read More
Enhancing Productivity With Google Chrome: The 12 Best Extensions To Improve Your Workflow

Enhancing Productivity With Google Chrome: The 12 Best Extensions To Improve Your Workflow

Productivity
Working from your computer or smartphone is convenient, but it can also be distracting. To maintain productivity, you should install...
Read More
How Xero Improved Productivity with a Digital Communication Tool (Plus Five Other Technologies You Can Use to Boost Employee Productivity)

How Xero Improved Productivity with a Digital Communication Tool (Plus Five Other Technologies You Can Use to Boost Employee Productivity)

Productivity
Higher office productivity leads to faster project completion and happier customers. With these technological solutions, you empower your people to...
Read More
Tech Tips: Microsoft Teams

Tech Tips: Microsoft Teams

“How to” Guides
Microsoft’s been rolling out several updates for their most popular applications and, of course, Teams gets a lot of attention....
Read More
What Are the Different Types of Multi-Factor Authentication?

What Are the Different Types of Multi-Factor Authentication?

Security
The fact most data breaches are the result of human error is not a contentious issue in the cybersecurity industry....
Read More
What is Multi-Factor Authentication and Why Should You Use It?

What is Multi-Factor Authentication and Why Should You Use It?

Security
Since our previous post centred on proper password security practice, the next step is to go over multi-factor authentication (MFA/2FA)...
Read More
Top 5 Password Security Practices Your Employees Don’t Do

Top 5 Password Security Practices Your Employees Don’t Do

Security
Password security has always been a leading cause of successful cyber breaches. Most employees do not take password security seriously...
Read More
Tech Tips: Windows 10 ‘Hidden’ Features

Tech Tips: Windows 10 ‘Hidden’ Features

“How to” Guides
There are many features in Windows 10 that require a bit of digging to find out about. We’ve done the...
Read More
5 Tips to Defend Against Ransomware

5 Tips to Defend Against Ransomware

“How to” Guides Security
Since the onset of remote work, major ransomware attacks are now constantly filling up our news feeds. A new ransom...
Read More
Tech Tips: Collaborating with Microsoft OneDrive and SharePoint

Tech Tips: Collaborating with Microsoft OneDrive and SharePoint

“How to” Guides
Microsoft SharePoint combined with OneDrive for Business is a powerful way to share and collaborate on your work documents. In...
Read More
Evisent and the Microsoft CSP Program 

Evisent and the Microsoft CSP Program 

News
What is the Microsoft CSP Program?  The Cloud Solution Provider (CSP) licensing programme was created to enable companies like Evisent to partner...
Read More
10 Methods of Cyber Attack

10 Methods of Cyber Attack

“How to” Guides Security
1.Phishing   A phishing attack is typically delivered via email and from a believable trusted source (e.g., a bank, streaming service, or charity)....
Read More
Gamification and Cybersecurity Training

Gamification and Cybersecurity Training

Opinion
Gamified Behaviour Modification in Cybersecurity Training  According to the Australian Cybercrime Online Reporting Network (ACORN), Victoria accounts for approximately 25% of Australia’s victims...
Read More
Working From Home or the Office? 

Working From Home or the Office? 

Opinion Productivity Security
 Our take on productivity and security concerns  Reaching as far back as the working class can remember, the traditional nine-to-five job...
Read More
What Modern MSPs Need: Transparency, Enterprise Grade IT Support, and a Personalised Touch

What Modern MSPs Need: Transparency, Enterprise Grade IT Support, and a Personalised Touch

Opinion
Most MSPs roots are deeply embedded in break and fix business models. Is your PC suddenly underperforming and slow? We’ll...
Read More
Windows 10 to Launch on July 29th

Windows 10 to Launch on July 29th

News
Microsoft has officially announced the released of it's next generation Operating System, Windows 10. The new Windows software will come...
Read More
Updates to Microsoft Cloud Services

Updates to Microsoft Cloud Services

News
Microsoft continues to develop and evolve its Cloud offerings, with many new features and options becoming available within Azure and...
Read More
Successful migration of internal infrastructure into the Cloud

Successful migration of internal infrastructure into the Cloud

News
Evisent has successfully migrated our entire infrastructure, including active directory, into the Cloud.  This has allowed us to reduce physical...
Read More
Records of over 10m Australians leaked

Records of over 10m Australians leaked

Security
The latest quarterly data breach report from the Office of the Australian Information Commissioner (OAIC) has revealed over 10 million...
Read More
Microsoft Azure datacentre Announced

Microsoft Azure datacentre Announced

News
Microsoft has announced the long awaited availability of Australia based Azure cloud services. Data centres are online in both Melbourne...
Read More
Microsoft announces visionary new products

Microsoft announces visionary new products

News
Surface Pro 4 For those of you who've had the pleasure of using a Surface Pro 3, the latest model...
Read More
Microsoft adopts ISO/IEC 27018 for Personal Data, Privacy Protection in the Public Cloud

Microsoft adopts ISO/IEC 27018 for Personal Data, Privacy Protection in the Public Cloud

News
Here at Evisent we are an advocate of the Microsoft Cloud, which has really progressed by leaps and bounds recently. ...
Read More
Evisent partners with Australian Government Cyber Security Centre

Evisent partners with Australian Government Cyber Security Centre

Security
Evisent is proud to announce our partnership with the Australian Signals Directorate, and the Australian Cyber Security Centre (ACSC) as part...
Read More
Evisent has new corporate headquarters

Evisent has new corporate headquarters

News
Evisent are now based at 480 Collins St, Melbourne, in the heart of the CBD. This new central base of...
Read More
Critical Windows Updates

Critical Windows Updates

Security
 Microsoft have released 8 "critical" updates in the June edition of it's "update Tuesday". Many of these patches should be...
Read More
ANU hit by major data breach

ANU hit by major data breach

Security
The Australian National University is currently assessing the full extent of the data breach that was discovered in mid April,...
Read More