Microsoft Updates November 2022
Our team at Evisent are continually monitoring developments in the ever-evolving world of Information Technology. Microsoft releases more than 100 updates each month, we have filtered to bring you those that we feel are most relevant to you and your business. . Cameo in PowerPoint Live This update integrates your Teams camera feed into your […]
Australian Cyber Attacks: Your security, your responsibility.
There have been frequent reports in the media recently in relation to personal information held by businesses being compromised by cyber-criminals. The companies involved have primarily been larger businesses, such as Optus, Medibank, Telstra, National Australia Bank (via third-party employee benefits provider), and Woolworths-owned My Deal to name a few. It is important to consider […]
Optus Data Breach – Recommended actions
As you are likely aware, on the 22nd September Optus disclosed what may have been the single largest data breach in Australian Corporate history, putting your identity and business cyber security at risk. Recent developments suggest that most data may have been deleted, although there is no certainty at this stage. Our team at Evisent […]
Microsoft Office “Follina” Zero-Day Attack
Experts have uncovered a new cyber attack, codenamed “Follina”, that bypasses traditional protections, including most popular anti virus softwares.. Key Points for Businesses This attack is a zero-day exploit. This means that it’s a new discovery with no known way to eliminate the threat it poses yet via official Microsoft patches.. It exploits Microsoft Office […]
Seven Ways to Maximise Cloud Solutions for Your Small Business
Cloud computing has been front and centre of the global shift to remote working. Find out how you can maximise this technology for your small business. The onset of the COVID-19 pandemic rendered many business practice obsolete. Face-to-face brainstorming sessions… Team building activities… Even the entire concept of the office… But the global crisis also […]
The Importance of Virtualised Infrastructure Security
A torn-down virtual infrastructure creates risks for any business. And it can have a significant impact on how quickly you can retrieve your data and resume operations following an attack. These days, many businesses use virtualised infrastructure for more straightforward data storage. It’s because this approach is superior to physical solutions due to enhanced flexibility, […]
Enhancing Productivity With Google Chrome: The 12 Best Extensions To Improve Your Workflow
Working from your computer or smartphone is convenient, but it can also be distracting. To maintain productivity, you should install effective Google Chrome Extensions. Google Chrome is arguably the most popular browser on the planet. It’s best known for allowing faster loading of websites, optimised performance, and an intuitive interface. As a result, it can […]
How Xero Improved Productivity with a Digital Communication Tool (Plus Five Other Technologies You Can Use to Boost Employee Productivity)
Higher office productivity leads to faster project completion and happier customers. With these technological solutions, you empower your people to work more efficiently. When a company scales to the point where it has millions of customers spread over 180 countries, effective internal communication is a priority. It’s an even bigger concern when that company helps […]
Tech Tips: Microsoft Teams
Microsoft’s been rolling out several updates for their most popular applications and, of course, Teams gets a lot of attention. With Teams fast becoming a staple within education and the workplace, we’re going over 5 tips to get more out of Teams everyday. 1. Using the command bar functions The search bar at the top […]
What Are the Different Types of Multi-Factor Authentication?
The fact most data breaches are the result of human error is not a contentious issue in the cybersecurity industry. Stolen credentials are involved in 61% of data breaches and they increase the cost of a data breach by 23%. Many of these breaches can be prevented by enabling multi-factor authentication on all sensitive accounts […]