All advice, guidance and publications Title TypeAdviceGuidancePublication AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 16 Dec 2022 Publication Technical example: User application hardening User application hardening protects an organisation from a range of threats including malicious websites, advertisements running malicious scripts and exploitation of vulnerabilities in unsupported software. These attacks often take legitimate application functionality and use it for malicious purposes. User application hardening makes it harder for cybercriminals to exploit vulnerabilities or at-risk functionality in your organisation’s applications. 21 Nov 2022 Publication An introduction to securing smart places Smart places, also known as smart cities, are places designed to provide enhanced services to citizens using a collection of smart information technology (IT)-enabled systems and devices that capture, communicate and analyse data. To achieve this purpose, previously discrete technologies and systems are interconnected to allow for large-scale coordination, real-time decision making, and increased visibility and situational awareness of the smart place’s status. 14 Oct 2022 Guidance Protect yourself: Updates Cybercriminals are always looking for easy paths to get onto your devices. 10 Jun 2022 Publication Mergers, acquisitions and Machinery of Government changes This publication provides guidance on strategies that organisations can apply during mergers, acquisitions and Machinery of Government changes. 18 May 2022 Guidance How to dispose of your device securely You should consider that any devices you dispose of could be accessed by strangers. 06 Oct 2021 Publication Bring Your Own Device for executives Bring Your Own Device (BYOD) scenarios enable organisations to take advantage of new technologies faster. It also has the potential to reduce hardware costs and improve organisational productivity and flexibility. However, BYOD also introduces new risks to an organisation’s business and the security of its information, which need to be carefully considered before implementation. Pagination Previous page ‹‹ Page 38 Next page ›› View other content topics Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary