Identity & Access

Simple Guide to Follow for Better Endpoint Protection

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. The number of endpoints a company has will vary by business size. Companies with less than 50 employees have about...

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them!

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to...

Checklist for Better Digital Offboarding of Employees

Digital footprints cover today's modern workplace. Employees begin making these the moment they're hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a company, there is a process that needs to happen. This is the process of “decoupling” the...

Important IT Policies Any Size Company Should Implement

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking can cause issues for small and mid-sized business owners. Employees aren’t mind readers. Things that you think...

MFA Security Updates

In case you missed our recent email notification, as a part of our continually improvement across our clients we will be rolling out some additional security enhancements aimed at tightening security. Remember, security is a shared responsibility and if your business has never undertaken MFA improvements, had a Business Technology Review, or a Vulnerability Assessment, then...

MFA Phishing Warning: Beware of fake callers and SMS messages

It has recently come to our attention that a number of our clients are getting targeted by multifactor authentication (MFA) phishing attacks. What does this consist of you ask? It is exactly as it sounds, cyber criminals pretending to be legitimate companies, employees, or as yourself, in order to ‘phish’ for MFA and one-time passcodes (OTPs)...

Improving security posture by blocking legacy authentication

We have spoken to you about Multi-Factor Authentication and it is good to see so many of our clients are taking MFA seriously and are using to keep their data safe. But sometimes we still see user accounts being compromised. How is that possible? The main culprit here is older software. Applications that can’t use...

What are Passphrase Passwords?

Whether you are accessing emails on your smartphone or documents on your work PC, you will typically be asked to prove who you are by providing credentials. Passwords can be hard to remember but then again, a password that lacks complexity can quickly become a weak gateway allowing an unauthorized person to read your emails...

How can we help protect you?

The security landscape continually changes. New vulnerabilities and threats are discovered all the time. It is important for you to know that you can rely on ABT to protect you as well as possible. It is a little bit like protecting your home. 100% guaranteed security is impossible, but if you take all the recommended precautions...