Latest publications 09 Apr 2026 Detecting socially engineered messages Socially engineered messages pose a significant threat to organisations. They can have a big impact, helping malicious actors access accounts, systems or sensitive information. Learn how to spot a socially engineered message, including through email, SMS, social media or messaging apps. 09 Apr 2026 Security tips for social media and messaging services It's a great way to stay in touch and share content online. This guide covers the risks of using social media and messaging apps and what to look out for. It also covers ways to help keep accounts safe for business and personal use. 25 Mar 2026 Securing space This guidance explains LEO SATCOM cyber security risks and provides mitigation strategies and considerations. It also includes questions to help organisations ensure secure and resilient services from providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 06 Oct 2021 Malicious email mitigation strategies Socially engineered emails containing malicious attachments and embedded links are routinely used in targeted cyber intrusions against organisations. This publication has been developed to provide mitigation strategies for the security risks posed by these malicious emails. 06 Oct 2021 Managed service providers: How to manage risk to customer networks There are several mitigation strategies that managed service providers can implement to protect their own networks and manage the security risks posed to their customers’ networks. 06 Oct 2021 Marketing and filtering email service providers This publication provides high level guidance on how to use email service providers (ESPs) in particular deployment scenarios. The considerations and controls described in that publication also apply to ESPs sending email on other organisations’ behalf. 06 Oct 2021 Protecting against business email compromise Business email compromise is when malicious actors use email to abuse trust in business processes to scam organisations out of money or goods. Malicious actors can impersonate business representatives using similar names, domains or fraudulent logos as a legitimate organisation or by using compromised email accounts and pretending to be a trusted co-worker. 06 Oct 2021 Questions to ask managed service providers Asking the right questions to managed service providers can help organisations better understand the cyber security of their systems and the services they provide. 06 Oct 2021 Risk management of enterprise mobility (including Bring Your Own Device) This publication has been developed to provide senior business representatives with a list of enterprise mobility considerations. These include business cases, regulatory obligations and legislation, available budget and personnel resources, and risk tolerance. Additionally, risk management controls are provided for cyber security practitioners. Pagination Previous page ‹‹ Page 21 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary