Cyber security has become top of mind for any business looking to adequately protect their IT infrastructure. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And if you haven’t, it […]
Four reasons why all businesses should embrace the ACSC Essential 8 Framework – How robust is your cybersecurity?
What are the pillars in the ACSC Essential 8 and how does your NFP stack up?
For any NFP keen to shore up their cybersecurity, the ACSC Essential 8 provides a valuable and cost-effective framework. The benefits of the framework were highlighted in our recent blog, Mitigation strategies for cyber-attacks: Essential 8 for NFPs. But what are the pillars that make up the framework and how can they help you assess […]
Mitigation strategies for cyber-attacks: Essential 8 for NFPs
As with all businesses, cyber security has become top of mind for Australian not-for-profits (NFPs) looking to adequately protect their organisation. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And […]
Body Temperature Access Control Terminal
Screen employees or visitors for a fever quickly with this no-contact access control terminal Why do I need the Body Temperature Access Control Terminal? While most of us are working from home, there are many, who are still required to go to work during this very difficult time.
The 5 types of Insider Threat Facing Businesses
There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of […]
VIDEO How to detect a data breach that bypasses your security controls
Transcript Trent: Thanks for joining us Dave David: Thankyou Trent Trent: Good to see you David: Glad to be here mate Trent: I’ve got a question for you it’s from the news recently and it’s about a data breach in the health industry in Victoria.
Why an automated IT Quarterly Report just isn’t good enough
Back in the dying days of the 1990s, a truly funny movie called Office Space came out. While the Y2K bug was all the rage at that time, this isn’t what the movie chose to send up. Instead, its most memorable moments revolve around whacking a defenceless printer to pieces in a field, and the […]
On TV for Charity – Vivian Sia’s Story
Recently Techware’s Chief Commercial Officer, Vivian Sia has wrapped filming a television show in the name of charity. The Nationally broadcast television show Philip Island: Unearthing your Wild-side – produced by Charity TV Global was made to support a long time Charitable Partner of Techware, Southern Cross Kids Camps.
Managed Detection and Response: The new Security Strategy
Just last month, we celebrated the 75th anniversary of D-Day. This historic occasion which brought about the end of World War Two also brings to mind one of history’s most ignominious failures: the Maginot Line. After investing millions in extensive fortifications, the French discovered that building thicker walls is no defence if the gate is left wide open.
The end of data breach? Introducing People Centric Security
Transcript: Trent: Welcome back, thank-you for joining us today I’m joined by a very special guest David Sia, CEO of Techware. Thanks for joining us Dave.