Yearly Archives - 2020

IT Business Strategy – What does good look like?

When it comes to business development, it is easy to look for short-term fixes and realize that things aren't working out the way you want it. What if we told you that your IT can help you change your business's success? Information Technology is continuing to challenge the way companies organize their business processes. Establishing new ways...

Who’s in charge? The need for third party (and internal) admins

We frequently receive requests from clients to grant administrative access to third parties or internal staff. Third parties often need some form of access to manage the application they are responsible for, and internal admins sometimes assist with running IT. ABT will generally be hesitant to provide these administrative credentials. Here is why. Ultimately, we sign...

Signature Roaming for Office 365

Microsoft have announced changes to the way Outlook stores email signatures expected in Q4 of this year.  As there is a lot of inaccurate information out there, we'll explain the update and how it compares to third-party email signatures like CodeTwo. What are the current changes to Outlook stored email signatures? Email signatures in Outlook for Windows...

What are Passphrase Passwords?

Whether you are accessing emails on your smartphone or documents on your work PC, you will typically be asked to prove who you are by providing credentials. Passwords can be hard to remember but then again, a password that lacks complexity can quickly become a weak gateway allowing an unauthorized person to read your emails...

How can we help protect you?

The security landscape continually changes. New vulnerabilities and threats are discovered all the time. It is important for you to know that you can rely on ABT to protect you as well as possible. It is a little bit like protecting your home. 100% guaranteed security is impossible, but if you take all the recommended precautions...

Data Security Breaches – What you need to know

Almost immediately after clients started to work from home the number of data breaches increased. Our Information Security team, led by security specialists such as Jarred Jenkins and Damien Coultis, will pick up new cases of unlawful access to data, file encryption attacks and breached security perimeters almost daily. Typically, our engineers will first assess the...

Business Continuity Planning

Will your employee be able to work from home in the event of a catastrophe or company lock down? Disasters can come in all shapes and sizes. Over the last several months a number of disasters have affected the ability of  Australian businesses to operate, and as the world faces a continued risk with the COVID-19 (Corona)...