All advice, guidance and publications Title TypeAdviceGuidancePublication AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 16 Dec 2022 Publication Technical example: Configure macro settings Configuring macro settings protects an organisation’s systems from malicious macros. Macros are powerful tools. They were introduced to improve productivity however their functionality can also be used by cyber criminals to compromise a user’s system. 16 Dec 2022 Publication Technical example: Multi-factor authentication Multi-factor authentication (MFA) makes it harder for adversaries to use compromised user credentials to access an organisation’s systems. It is one of the most important cybersecurity measures an organisation can implement. 16 Dec 2022 Publication Technical example: Patch operating systems Patching operating systems is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to their devices and sensitive information. Patches improve the security of operating systems by fixing known vulnerabilities. 16 Dec 2022 Publication Technical example: Regular backups Implementing regular backups will assist your organisation to recover and maintain its operations in the event of a cybersecurity incident, for example, a ransomware attack. 16 Dec 2022 Publication Technical example: Restrict administrative privileges Privileged account credentials are prized by cybercriminals because they provide extensive access to high value assets within a network. Restricting privileged access to only users with a demonstrated business need is essential to protecting your environment. 16 Dec 2022 Publication Technical example: User application hardening User application hardening protects an organisation from a range of threats including malicious websites, advertisements running malicious scripts and exploitation of vulnerabilities in unsupported software. These attacks often take legitimate application functionality and use it for malicious purposes. User application hardening makes it harder for cybercriminals to exploit vulnerabilities or at-risk functionality in your organisation’s applications. Pagination Previous page ‹‹ Page 36 Next page ›› View other content topics Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary