Yearly Archives - 2018

Securing your Web Site with HTTPS to build trust with your audience.

Chrome web browser is now marking all HTTP sites as "not secure".                 Chrome used to display a neutral information icon, but starting with version 68, the browser will warn users with an extra notification in the address bar. Chrome currently marks HTTPS-encrypted sites with a green lock icon and "Secure" sign. Google has been nudging users away...

Why Upgrade and Finance your New IT Infrastructure

Whether it is to keep pace with modern technology, to accommodate growth, or most importantly, improving your business’s security, the reality of undertaking a business venture is that from time to time you will be required to put money into what essentially runs your business; your IT infrastructure. Although this may require investment, staying put...

The Dangers of Phishing – Help Employees avoid the Cybercrime trap

To help you be more informed and proactively educate your employees on phishing attacks, we have curated this blog and e-book. In this blog and e-book you will learn the most common types of phishing attacks, how to spot them, tips to protect your company and educate your employees. What is Phishing? Phishing is an email that...

Alliance Business Technologies is Proud to Announce…

ABTechnologies is proud to announce that in May this year we have been awarded two ‘Top Performing Partners for 2018’ awards. ‘Cloud Market Place Partner of the Year’ for Australia at the 2018 Cloud Summit in Florida, USA, and ‘Growth Partner of the Year’ as well as ‘Technical Excellence’ at the Barracuda Networks Awards. Our Operations Manager,...

Disaster Recovery: Why Define your RPO and RTO

While it is nearly impossible to predict what the next disaster will be, it is easy to prepare for, especially if you have an effective business continuity plan. The first step towards having a secure and available business environment is determining your Recovery Point Objective (RPO) and Recovery Time Objective (RTO). RPO and RTO are both essential...

Notifiable Data Breaches Scheme

A consolidated guide about the Data breach preparation and response — The OAIC has released a guide titled Data breach preparation and response — A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth) (Privacy Act). Find this guide here. This guide consolidates the information provided in the Data breach notification — A...