Contact us
Portal login
1300 CYBER1 (1300 292 371)
You can view all our guidance from this page. Use the filters below to filter by audience type, title and summary and the sort options to sort for the most recently updated or published content.
18 May 2022
How to dispose of your device securely
You should consider that any devices you dispose of could be accessed by strangers.
24 Mar 2022
Back Up and Restore - Microsoft Windows
How to back up and restore files on your Microsoft Windows device using OneDrive or an external hard drive.
Back Up and Restore - Apple iOS
How to back up and restore files on your Apple iOS device using iCloud or a computer.
Back Up and Restore - Apple macOS
How to back up and restore files on your Mac using an external hard drive or the cloud.
01 Feb 2022
A kid's guide to using the internet securely
Cat memes, fail videos, face filters – the internet is awesome! Unfortunately, not all internet users are as great. Some go online just to cause trouble and steal from others.
18 Jan 2022
Securing Whatsapp
This step-by-step guide shows you how to secure WhatsApp on your phone with the use of multi-factor authentication and security codes.
Securing Signal
This step-by-step guide shows you how to secure Signal on your phone with the use of multi-factor authentication and safety numbers.
14 Oct 2021
Changing your passphrase for Microsoft Windows 10
This step-by-step guide shows you how to set and change your passphrase for Windows 10.
13 Oct 2021
Changing your passphrase for macOS and Apple ID
This step-by-step guide shows you how to set and change your passphrase for macOS and Apple ID.
01 Oct 2021
How to Use the Internet Securely: A Guide for Seniors
Going online lets you keep in touch with friends and family, learn about topics and even play games. Just like fastening your seatbelt before driving, you should take steps before using the internet to be more secure. We want to make sure everyone is secure when they’re online. Here are some basic cyber security practices that you can use to protect yourself when accessing the internet.
Personal Cyber Security: Advanced Steps Guide
The Personal Cyber Security: Advanced Steps guide is the third in a series of three guides designed to help everyday Australians understand the basics of cyber security, and how you can take action to protect yourself from ever-evolving cyber threats.
Personal Cyber Security: Next Steps Guide
The Personal Cyber Security: Next Steps guide is the second in a series of three guides designed to help everyday Australians understand the basics of cyber security, and how you can take action to protect yourself from ever-evolving cyber threats.
Personal Cyber Security: First Steps Guide
The Personal Cyber Security: First Steps guide is the first in a series of three guides designed to help everyday Australians understand the basics of cyber security, and how you can take action to protect yourself from common cyber threats.
24 Sep 2021
How to check your email account security - Outlook, Outlook.com, Microsoft 365, Live, Hotmail, and MSN
This step-by-step guide will explain how to check the security of your email account for Outlook.com, Microsoft 365, Live, Hotmail, and MSN on your desktop.
How to check your email account security - Gmail
This step-by-step guide will explain how to check the security of your email account for Gmail on your desktop.
24 Jun 2021
Managing user accounts for Microsoft Windows 10
Administrator accounts are the ‘keys to the kingdom’, as they give a user full control of the computer. Cybercriminals will target administrator accounts in order to take full control of a user’s computer. By not using an administrator account for everyday use you will help limit what a virus or exploit can access if your computer becomes infected.
04 Mar 2021
Turning on Two-Factor Authentication – Microsoft Accounts
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Microsoft accounts.
10 Dec 2020
Turn on real-time protection in Windows 10
Real-time protection is a security feature that helps stop malware from being installed on your device. This feature is built into Microsoft Defender, a comprehensive virus and threat detection program that is part of the Windows 10 security system.
25 Nov 2020
Terminate ransomware programs with Task Manager (Microsoft Windows 10)
If you are experiencing a ransomware attack, follow these three steps to identify and stop a potential ransomware program running on your Windows 10 computer.
Managing user accounts for macOS
Administrator accounts are the ‘keys to the kingdom’, as they give a user full control of the computer. Cybercriminals will target administrator accounts in order to take full control of a user’s computer. Not using an administrator account for everyday use will help limit what a virus or exploit can access if your computer becomes infected.
Connecting and disconnecting from a network
A network is a group of two or more devices that communicate with each other via a connection. Consider how your devices are connected.
Performing a malware scan using Microsoft Defender Antivirus for Windows 10
Malware is a blanket term for malicious software including viruses, spyware, trojans and worms.
14 Oct 2020
Top 10 questions parents have about online security
Answers to questions often asked by parents about how to keep your family safe.
02 Sep 2020
Setting up an IoT device
Keep in mind a few simple questions while setting up your device, to help you keep your network and data more secure.
Maintaining an IoT device
There are some important things to remember once your IoT device is set up and in use.
Disposing of an IoT device
Disposing of a device (by discarding or selling it) may give other people easy access to your personal information or data.
Before purchasing an IoT device
It is important to research devices before making a purchase, as manufacturers provide varying levels of security. Before purchasing a device, compare similar devices sold by different manufacturers.
27 Aug 2020
Turning on Two-Factor Authentication – Facebook Messenger
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your mobile devices for Facebook Messenger.
Turning on Two-Factor Authentication – Instagram
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Instagram.
14 Aug 2020
Tax scam stories
In the related content below you will find some stories about common online scams the ATO advises Australians to look out for this year. These are based on real cases reported to the ATO but names and details have been changed.
09 Jul 2020
Turning on Two-Factor Authentication – Gmail
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Gmail.
Turning on Two-Factor Authentication – Yahoo!
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Yahoo
Turning on Two-Factor Authentication – Twitter
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Twitter.
Turning on Two-Factor Authentication – LinkedIn
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for LinkedIn.
Turning on Two-Factor Authentication – Facebook
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Facebook.
Turning on Two-Factor Authentication – Apple ID
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Apple ID.
01 Jul 2020
Turning on Automatic Updates – For Microsoft Windows 10
How to turn on automatic updates can differ depending on your operating system and your programs. This guide steps you through turning on automatic updates on a desktop computer for the Microsoft Windows 10 operating system.
26 Jun 2020
Be mindful of where and how you use your mobile or tablet
Being mindful of where and how you use your device can help protect your data and your device.
24 Jun 2020
Choosing anti-virus software
Anti-virus solutions differ in effectiveness and the range of malware types they cover. Before choosing an anti-virus product, consider reviews on reputable and trustworthy websites or magazines.
23 Jun 2020
Be in control of what you share
You can control what information others see about you, to help reduce risk when you’re socialising online.
Know your sellers
Stick to well-known trusted brands and cross-check information on their website to make sure you’re dealing with the official seller and not a scammer trying to impersonate the brand.
Be a good online citizen
Think before you post. Once information is online it is almost impossible to remove.
Step 2: Do some further screening of the profile
The reverse image check might still have missed the scammer profile. Take your time and look for the following
Sending and receiving files via email
Simple actions can help protect you when sending and receiving emails.
How to protect yourself when using email
Cybercriminals use email to carry out a range of threats. To some degree these threats all work the same way and rely on exploiting the same human weaknesses.
Update software regularly
Installing software updates as soon as they become available limits the amount of time cybercriminals have to find and use these weaknesses.
How to protect yourself with webcams
While many people opt for a piece of tape over the camera, chances are if your webcam is hacked, then your entire system is in the hands of a hacker.
Pay securely
Use secure payment methods like PayPal, Bpay or your credit card and never pay by direct bank deposits, money transfers or other unusual methods (such as Bitcoin), as you're unlikely to get your money back if you've paid a scammer.
Secure your account to keep others out
When socialising online, ensure your accounts have enough protection to keep you and your personal information safe.
Online apps - do your own research first
You should closely review each app before downloading it for indications it may be fake. Some fake apps may be identified by poor grammar or spelling, or by the use of names very similar to those of recognised brands.