Events

Cloud migrations: the Ingram Micro partnership in a Case Study

Last May, Alliance Business Technologies won the Ingram Micro’s Cloud Growth Partner of the Year in Australia for its ability to deliver powerful solutions and drive end-user digital transformation. Alliance Business Technologies faces cloud migration challenges every day. By taking advantage of Ingram Micro’s technical capabilities and internal resources, this partnership has made it possible to...

How to Create Insightful Dashboards in Microsoft Power BI

Data visualization is a powerful tool for communicating complex data. It presents it in a simple, easily understandable format. But it is not enough to simply create a graph or chart and call it a day. To truly make use of information, it is important to create insightful reports. Reports that effectively communicate the story...

The Biggest Data Breaches of 2022

The term ‘data breach’ has never been said so many times in Australia as it has the last few months. But it isn’t just Optus and Medibank, there have been quite a few data breaches in 2022 that you may, or may not, know about. Data breaches are a big deal, but they’re more common than...

How to spot a scam – Scam Awareness Week 2022

Alliance Business Technologies is proud to support Scams Awareness Week (7–11 November 2022). Scams Awareness Week is an annual campaign hosted by the ACCC and the Scams Awareness Network, which raises awareness about common scams and offers tips on how people can protect themselves from scammers. This year Scams Awareness Week is about empowering people to learn...

MFA Security Updates

In case you missed our recent email notification, as a part of our continually improvement across our clients we will be rolling out some additional security enhancements aimed at tightening security. Remember, security is a shared responsibility and if your business has never undertaken MFA improvements, had a Business Technology Review, or a Vulnerability Assessment, then...

Staying safe online #PlayitFairOnline

Use these tips to find out how to respond to online abuse and take control of youronline safety - whether you’re in the workplace or at home. Manage the voices you engage with You can control what you see and hear online. Conversation controls help you manage yoursocial media feeds and make sure these platforms are a...

Microsoft Virtual Lunch & Learn (Episode 3)

In our latest episode, Robert Crane (Microsoft MVP, CIAOPS) and Campbell Duncan (System Engineer, ABT) talk about current Microsoft news and updates, followed by our topic of the month 'MFA & Conditional Access - Why it's necessary'. Managing project lifecycles and enabling guest access for third parties, team templates, and archiving teams. -------------------------------------------------- CONNECT WITH US Web: https://abtechnologies.com.au...

Microsoft Virtual Lunch & Learn (Episode 2)

In our latest episode, Robert Crane (Microsoft MVP, CIAOPS) and Campbell Duncan (System Engineer, ABT) talk about current Microsoft news and updates, followed by our topic of the month 'Efficient Management of Projects & Teams'. Managing project lifecycles and enabling guest access for third parties, team templates, and archiving teams. -------------------------------------------------- CONNECT WITH US Web: https://abtechnologies.com.au LinkedIn: https://www.linkedin.com/company/alli......

Microsoft Virtual Lunch & Learn (Episode 1)

In our first episode of our monthly webinar series, Robert Crane (Microsoft MV) and Campbell Duncan (System Engineer, ABT) talk about current Microsoft news and updates, followed by our topic of the month 'Having The Right Data In The Right Place'. Issues affecting business data security and management decisions within Microsoft 365, Teams & SharePoint. -------------------------------------------------- CONNECT...

The Best Practices for Email Security Webinar

Last week we kicked off our Webinar Series. Modern attacks are rapidly growing in volume and sophistication. All it takes is for one employee to open a single malicious attachment, or click one infected link, and your company’s entire cybersecurity is put at risk. Due to these actions being so simple and common – opening an email, following a link to...