What is Multi-Factor Authentication and Why Should You Use It?
Since our previous post centred on proper password security practice, the next step is to go over multi-factor authentication (MFA/2FA) and how this security feature complements your newfound great password habits. This seemingly simple solution protects sensitive accounts better than even the most complex passwords, but what really is MFA and how does it work? […]
Top 5 Password Security Practices Your Employees Don’t Do
Password security has always been a leading cause of successful cyber breaches. Most employees do not take password security seriously and the increased likelihood of compromised data that this brings with it. Here are the top five password security rules that every employee should follow. Make your passwords strong Employees tend to make passwords […]
Tech Tips: Windows 10 ‘Hidden’ Features
There are many features in Windows 10 that require a bit of digging to find out about. We’ve done the hard part for you and will show you some of the ways you can navigate Windows 10 more efficiently. In this article we will cover: Saving multiple items on the clipboard Windows snapping Make File […]
5 Tips to Defend Against Ransomware
Since the onset of remote work, major ransomware attacks are now constantly filling up our news feeds. A new ransom record is broken every other day and the attacks are becoming increasingly sophisticated and severe for businesses. It’s become such an issue that politicians and governments around the world are beginning to feel the pressure […]
Tech Tips: Collaborating with Microsoft OneDrive and SharePoint
Microsoft SharePoint combined with OneDrive for Business is a powerful way to share and collaborate on your work documents. In this article we show you how to make the most of the sharing and storing functionalities provided by Microsoft. Sharing links with others Sharing links is an easy way to securely share files on the […]
Evisent and the Microsoft CSP Program
What is the Microsoft CSP Program? The Cloud Solution Provider (CSP) licensing programme was created to enable companies like Evisent to partner with Microsoft and allow for their cloud services to be distributed to customers (e.g., Office 365, Microsoft 365 and Azure). With combined resources and service infrastructure, partners then provide support services to Cloud customers in […]
10 Methods of Cyber Attack
1.Phishing A phishing attack is typically delivered via email and from a believable trusted source (e.g., a bank, streaming service, or charity). It combines social engineering techniques and technology to trick unsuspecting people into giving over sensitive information such as passwords and credit card details. A more sophisticated hacker may do extensive research on potential employee targets and create […]
Gamification and Cybersecurity Training
Gamified Behaviour Modification in Cybersecurity Training According to the Australian Cybercrime Online Reporting Network (ACORN), Victoria accounts for approximately 25% of Australia’s victims of cybercrime. The average cost for individual businesses is around $276,323, depending on the type of attack. Collectively, Australian businesses are out-of-pocket nearly $29 billion annually. As technology advances and more businesses move toward online models, […]
Working From Home or the Office?
Our take on productivity and security concerns Reaching as far back as the working class can remember, the traditional nine-to-five job has been the norm in most countries. Unfortunately (or fortunately) the pandemic has forced the global population into isolate working conditions. This has reignited the contentious debate over which one is more productive – working from the office or your pyjamas? In the pre-pandemic job market, employers expected their hours to be worked in […]
What Modern MSPs Need: Transparency, Enterprise Grade IT Support, and a Personalised Touch
Most MSPs roots are deeply embedded in break and fix business models. Is your PC suddenly underperforming and slow? We’ll refresh it for you and replace your old hardware. Software not working as it should? Let us take remote access and figure out the solution. While this is perfectly fine, and an important part of […]