Blog
Protect Your Business with Managed Service Providers (MSPs)
In today's digital age, the threat of cyber attacks is a constant concern for businesses of all sizes. According to...
Read More
Personal Data of Almost 200 Patients Exposed in Hack of Melbourne Hospital Staff Members’ Email
In today's digital age, data breaches have become an alarming reality. The recent incident at a Melbourne hospital, where the...
Read More
Government to Scrap Privacy Act Exemption for Small Businesses
Businesses generating up to $3 million annually will be subjected to new data privacy standards, following the government's recent declaration...
Read More
The LastPass Data Breach: A Cautionary Tale of Inaction and Crypto Losses
In the ever-evolving digital world, security is of utmost importance. This is especially true when it comes to safeguarding passwords,...
Read More
The MGM Grand Cyberattack: A Case Study in Human Error and Corporate Risk
The ransomware group ALPHV, also known as BlackCat, has reportedly compromised MGM Grand casinos, affecting its operations across multiple states...
Read More
Responding to Data Breaches: A Compliance Checklist for Australian Businesses
Data breaches are an unfortunate reality in today's interconnected world. For businesses operating in Australia, navigating the aftermath of a...
Read More
$4k in savings on our clients’ M365 Licensing, can we do the same for you? Limited opportunity, price increases effective 1st September 2023
Microsoft will be increasing their licensing subscription costs effective from 1st September 2023, posing a significant financial impact on businesses...
Read More
Why MFA is No Longer Effective Against Business Email Compromise Due to AiTM Attacks
In the digital age, security has become a paramount concern for businesses worldwide. One of the most common methods of...
Read More
Cybersecurity Breach Hits Australian Financial Firm Perpetual Digital
Perpetual Hit by Third-Party Security Breach In a recent turn of events, Perpetual, a renowned financial services provider in Australia,...
Read More
Assessing Cyber Risks: Safeguarding the National Disability Insurance Scheme (NDIS)
In today's interconnected world, where technology plays a pivotal role in various sectors, cybersecurity has become a critical concern. This...
Read More
Top Ten Questions to Ask Your IT Provider About Cyber Security Measures Protecting Your Business
In today's digital age, cyber security is a critical concern for businesses of all sizes. As threats continue to evolve,...
Read More
Microsoft Updates November 2022
Our team at Evisent are continually monitoring developments in the ever-evolving world of Information Technology. Microsoft releases more than 100...
Read More
Australian Cyber Attacks: Your security, your responsibility.
There have been frequent reports in the media recently in relation to personal information held by businesses being compromised by...
Read More
Optus Data Breach – Recommended actions
As you are likely aware, on the 22nd September Optus disclosed what may have been the single largest data breach...
Read More
Microsoft Office “Follina” Zero-Day Attack
Experts have uncovered a new cyber attack, codenamed "Follina", that bypasses traditional protections, including most popular anti virus softwares.. Key...
Read More
Seven Ways to Maximise Cloud Solutions for Your Small Business
Cloud computing has been front and centre of the global shift to remote working. Find out how you can maximise...
Read More
The Importance of Virtualised Infrastructure Security
A torn-down virtual infrastructure creates risks for any business. And it can have a significant impact on how quickly you...
Read More
Enhancing Productivity With Google Chrome: The 12 Best Extensions To Improve Your Workflow
Working from your computer or smartphone is convenient, but it can also be distracting. To maintain productivity, you should install...
Read More
How Xero Improved Productivity with a Digital Communication Tool (Plus Five Other Technologies You Can Use to Boost Employee Productivity)
Higher office productivity leads to faster project completion and happier customers. With these technological solutions, you empower your people to...
Read More
Tech Tips: Microsoft Teams
Microsoft’s been rolling out several updates for their most popular applications and, of course, Teams gets a lot of attention....
Read More
What Are the Different Types of Multi-Factor Authentication?
The fact most data breaches are the result of human error is not a contentious issue in the cybersecurity industry....
Read More
What is Multi-Factor Authentication and Why Should You Use It?
Since our previous post centred on proper password security practice, the next step is to go over multi-factor authentication (MFA/2FA)...
Read More
Top 5 Password Security Practices Your Employees Don’t Do
Password security has always been a leading cause of successful cyber breaches. Most employees do not take password security seriously...
Read More
Tech Tips: Windows 10 ‘Hidden’ Features
There are many features in Windows 10 that require a bit of digging to find out about. We’ve done the...
Read More
5 Tips to Defend Against Ransomware
Since the onset of remote work, major ransomware attacks are now constantly filling up our news feeds. A new ransom...
Read More
Tech Tips: Collaborating with Microsoft OneDrive and SharePoint
Microsoft SharePoint combined with OneDrive for Business is a powerful way to share and collaborate on your work documents. In...
Read More
Evisent and the Microsoft CSP Program
What is the Microsoft CSP Program? The Cloud Solution Provider (CSP) licensing programme was created to enable companies like Evisent to partner...
Read More
10 Methods of Cyber Attack
1.Phishing A phishing attack is typically delivered via email and from a believable trusted source (e.g., a bank, streaming service, or charity)....
Read More
Gamification and Cybersecurity Training
Gamified Behaviour Modification in Cybersecurity Training According to the Australian Cybercrime Online Reporting Network (ACORN), Victoria accounts for approximately 25% of Australia’s victims...
Read More
Working From Home or the Office?
Our take on productivity and security concerns Reaching as far back as the working class can remember, the traditional nine-to-five job...
Read More
What Modern MSPs Need: Transparency, Enterprise Grade IT Support, and a Personalised Touch
Most MSPs roots are deeply embedded in break and fix business models. Is your PC suddenly underperforming and slow? We’ll...
Read More
Windows 10 to Launch on July 29th
Microsoft has officially announced the released of it's next generation Operating System, Windows 10. The new Windows software will come...
Read More
Updates to Microsoft Cloud Services
Microsoft continues to develop and evolve its Cloud offerings, with many new features and options becoming available within Azure and...
Read More
Successful migration of internal infrastructure into the Cloud
Evisent has successfully migrated our entire infrastructure, including active directory, into the Cloud. This has allowed us to reduce physical...
Read More
Records of over 10m Australians leaked
The latest quarterly data breach report from the Office of the Australian Information Commissioner (OAIC) has revealed over 10 million...
Read More
Microsoft Azure datacentre Announced
Microsoft has announced the long awaited availability of Australia based Azure cloud services. Data centres are online in both Melbourne...
Read More
Microsoft announces visionary new products
Surface Pro 4 For those of you who've had the pleasure of using a Surface Pro 3, the latest model...
Read More
Microsoft adopts ISO/IEC 27018 for Personal Data, Privacy Protection in the Public Cloud
Here at Evisent we are an advocate of the Microsoft Cloud, which has really progressed by leaps and bounds recently. ...
Read More
Evisent partners with Australian Government Cyber Security Centre
Evisent is proud to announce our partnership with the Australian Signals Directorate, and the Australian Cyber Security Centre (ACSC) as part...
Read More
Evisent has new corporate headquarters
Evisent are now based at 480 Collins St, Melbourne, in the heart of the CBD. This new central base of...
Read More
Critical Windows Updates
Microsoft have released 8 "critical" updates in the June edition of it's "update Tuesday". Many of these patches should be...
Read More
ANU hit by major data breach
The Australian National University is currently assessing the full extent of the data breach that was discovered in mid April,...
Read More