Latest publications 09 Apr 2026 Detecting socially engineered messages Socially engineered messages pose a significant threat to organisations. They can have a big impact, helping malicious actors access accounts, systems or sensitive information. Learn how to spot a socially engineered message, including through email, SMS, social media or messaging apps. 09 Apr 2026 Security tips for social media and messaging services It's a great way to stay in touch and share content online. This guide covers the risks of using social media and messaging apps and what to look out for. It also covers ways to help keep accounts safe for business and personal use. 25 Mar 2026 Securing space This guidance explains LEO SATCOM cyber security risks and provides mitigation strategies and considerations. It also includes questions to help organisations ensure secure and resilient services from providers. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 06 Oct 2021 Secure administration Privileged access allows administrators to perform their duties, and is often seen as the ‘keys to the kingdom’. This publication provides guidance on how to implement secure administration techniques as part of the management of privileged access. 06 Oct 2021 Securing PowerShell in the enterprise This publication describes a maturity framework for PowerShell, balancing the security and business requirements of organisations. This framework enables organisations to take incremental steps towards securing PowerShell across their environment. 06 Oct 2021 Security configuration guide: Apple iOS 14 devices ASD has developed this guide to assist Australians to understand risks when deploying iOS 14 devices and the security requirements that need to be met to allow them to handle classified data. 06 Oct 2021 Security configuration guide: Samsung Galaxy S10, S20 and Note 20 devices ASD has developed this guide to assist Australian’s to understand risks when deploying Samsung Galaxy and Samsung Note devices and the security requirements that need to be met to allow them to handle classified data. 06 Oct 2021 Security configuration guide: Viasat Mobile Dynamic Defense ASD has developed this guide to assist Australian’s to understand risks when deploying Viasat MDD devices and the security requirements that need to be met to allow them to handle classified data. 06 Oct 2021 Using remote desktop clients Remote access solutions are increasingly being used to access organisations’ systems and data. One common method of enabling remote access is to use a remote desktop client. This publication provides guidance on security risks associated with the use of remote desktop clients. Pagination Previous page ‹‹ Page 22 Next page ›› Alerts and Advisories Advice, guidance and publications Reports and statistics News Programs Glossary