Four reasons why all businesses should embrace the ACSC Essential 8 Framework – How robust is your cybersecurity?

Cyber security has become top of mind for any business looking to adequately protect their IT infrastructure. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And if you haven’t, it […]

Read more

What are the pillars in the ACSC Essential 8 and how does your NFP stack up?

For any NFP keen to shore up their cybersecurity, the ACSC Essential 8 provides a valuable and cost-effective framework. The benefits of the framework were highlighted in our recent blog, Mitigation strategies for cyber-attacks: Essential 8 for NFPs. But what are the pillars that make up the framework and how can they help you assess […]

Read more

Mitigation strategies for cyber-attacks: Essential 8 for NFPs

As with all businesses, cyber security has become top of mind for Australian not-for-profits (NFPs) looking to adequately protect their organisation. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And […]

Read more

Body Temperature Access Control Terminal

Screen employees or visitors for a fever quickly with this no-contact access control terminal Why do I need the Body Temperature Access Control Terminal? While most of us are working from home, there are many, who are still required to go to work during this very difficult time.

Read more

The 5 types of Insider Threat Facing Businesses

There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of […]

Read more

Why an automated IT Quarterly Report just isn’t good enough

Back in the dying days of the 1990s, a truly funny movie called Office Space came out. While the Y2K bug was all the rage at that time, this isn’t what the movie chose to send up. Instead, its most memorable moments revolve around whacking a defenceless printer to pieces in a field, and the […]

Read more

On TV for Charity – Vivian Sia’s Story

Recently Techware’s Chief Commercial Officer, Vivian Sia has wrapped filming a television show in the name of charity. The Nationally broadcast television show Philip Island: Unearthing your Wild-side –  produced by Charity TV Global was made to support a long time Charitable Partner of Techware, Southern Cross Kids Camps.

Read more

Managed Detection and Response: The new Security Strategy

Just last month, we celebrated the 75th anniversary of D-Day. This historic occasion which brought about the end of World War Two also brings to mind one of history’s most ignominious failures: the Maginot Line. After investing millions in extensive fortifications, the French discovered that building thicker walls is no defence if the gate is left wide open.

Read more