Blog

The Dangers of Phishing – Help Employees avoid the Cybercrime trap

To help you be more informed and proactively educate your employees on phishing attacks, we have curated this blog and e-book. In this blog and e-book you will learn the most common types of phishing attacks, how to spot them, tips to protect your company and educate your employees.

What is Phishing?

Phishing is...

Alliance Business Technologies is Proud to Announce…

ABTechnologies is proud to announce that in May this year we have been awarded two ‘Top Performing Partners for 2018’ awards. ‘Cloud Market Place Partner of the Year’ for Australia at the 2018 Cloud Summit in Florida, USA, and ‘Growth Partner of the Year’ as well as ‘Technical Excellence’ at the Barracuda Networks Awards. Our Operations Manager,...

Disaster Recovery: Why Define your RPO and RTO

While it is nearly impossible to predict what the next disaster will be, it is easy to prepare for, especially if you have an effective business continuity plan. The first step towards having a secure and available business environment is determining your Recovery Point Objective (RPO) and Recovery Time Objective (RTO). RPO and RTO are both essential...

Notifiable Data Breaches Scheme

A consolidated guide about the Data breach preparation and response — The OAIC has released a guide titled Data breach preparation and response — A guide to managing data breaches in accordance with the Privacy Act 1988 (Cth) (Privacy Act). Find this guide here. This guide consolidates the information provided in the Data breach...