Data Protection

Why You Need to Think Twice Before Using Lensa AI & Other Self-Portrait Apps

It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram. You think, “How can I make one?” Filters and self-portrait apps have come a long way. You can now make yourself look like Hollywood’s version of a character in the next hit animated film. It still kind of...

4 Proven Ways to Mitigate the Costs of a Data Breach

No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Approximately 83% of organisations have experienced more than one data breach. (IBM Security 2022 Cost of a Data Breach Report) These breaches hurt businesses in many ways. First, there is the immediate cost of remediating the...

Don’t Set Yourself Up to Fail: Tips for Safer Home Security Setups

The global home security market has been growing by leaps and bounds. By 2026, experts expect the market to expand at a rate of 20.1%. This is on top of an expected increase of 21.6% from 2021 to 2022. From Ring doorbell cams to entire home security systems, consumers want these solutions. Watching your front...

What’s Changing in the Cybersecurity Insurance Market?

Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises, and usually covered items like data processing errors and online media. Since that time, the policies for this type of liability coverage have changed. Today’s cyber insurance policies cover the typical...

What Cybersecurity Attack Trends Should You Watch Out for in 2023?

The new year has just begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks. Sixty-eight percent of surveyed business leaders feel that cybersecurity risks are getting worse. They have a...

8 Tech Checks to Make Before You Travel

Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When you go on a trip, not having your technology there when you need it can ruin your day. Travel smarter and more securely by doing several checks before you go. Use...

Who’s in charge? The need for third party (and internal) admins

We frequently receive requests from clients to grant administrative access to third parties or internal staff. Third parties often need some form of access to manage the application they are responsible for, and internal admins sometimes assist with running IT. ABT will generally be hesitant to provide these administrative credentials. Here is why. Ultimately, we sign...

How can we help protect you?

The security landscape continually changes. New vulnerabilities and threats are discovered all the time. It is important for you to know that you can rely on ABT to protect you as well as possible. It is a little bit like protecting your home. 100% guaranteed security is impossible, but if you take all the recommended precautions...

Data Security Breaches – What you need to know

Almost immediately after clients started to work from home the number of data breaches increased. Our Information Security team, led by security specialists such as Jarred Jenkins and Damien Coultis, will pick up new cases of unlawful access to data, file encryption attacks and breached security perimeters almost daily. Typically, our engineers will first assess the...

Business Continuity Planning

Will your employee be able to work from home in the event of a catastrophe or company lock down? Disasters can come in all shapes and sizes. Over the last several months a number of disasters have affected the ability of  Australian businesses to operate, and as the world faces a continued risk with the COVID-19 (Corona)...