You are here Home About the ACSC View all content Publications Publications Find the latest cyber security publications Latest publications 16 Dec 2022 Small Business Cloud Security Guides: Executive overview The ACSC’s Small Business Cloud Security Guides provide technical examples organisations can use to improve their cyber security and protect against damaging cyber incidents. This page outlines everything executives need… 27 Mar 2023 Preparing for and Responding to Denial-of-Service Attacks Although organisations cannot avoid being targeted by denial-of-service attacks, there are a number of measures that organisations can implement to prepare for and potentially reduce the impact if targeted. Preparing for… 02 Mar 2023 Essential Eight Maturity Model to ISM Mapping This publication provides a mapping between Maturity Level Two and Maturity Level Three of the Essential Eight Maturity Model and the controls within the Information Security Manual (ISM). All publications Title - Any -Individuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 6121824- All - 27 Mar 2023 Preparing for and Responding to Denial-of-Service Attacks Although organisations cannot avoid being targeted by denial-of-service attacks, there are a number of measures that organisations can implement to prepare for and potentially reduce the impact if targeted. Preparing for… 02 Mar 2023 Essential Eight Maturity Model to ISM Mapping This publication provides a mapping between Maturity Level Two and Maturity Level Three of the Essential Eight Maturity Model and the controls within the Information Security Manual (ISM). 20 Feb 2023 Essential Eight Maturity Model FAQ The Essential Eight Maturity Model provides advice on how to implement the Essential Eight to mitigate different levels of adversary tradecraft and targeting. 20 Jan 2023 End of Support for Microsoft Windows and Microsoft Windows Server Under Microsoft’s Windows lifecycle policy, support for Microsoft Windows and Microsoft Windows Server varies depending on the release (e.g. Microsoft Windows 10), edition (e.g. Enterprise) and version (e.g. 22H2) of the… 17 Jan 2023 Essential Eight Assessment Process Guide The purpose of this document is to provide supplementary guidance on the eight essential mitigation strategies from the Australian Cyber Security Centre’s Strategies to Mitigate Cyber Security Incidents (known… 16 Dec 2022 Technical Example: Patch Applications Patching applications is one of the most effective controls an organisation can implement to prevent cyber criminals from gaining access to their devices and sensitive information. Patches improve the security of… Pagination Page 1 Next page ›› Alerts and advisories Advice and guidance News and media releases Programs Publications Reports and statistics Glossary Threats Was this information helpful? Was this information helpful? Yes No Thanks for your feedback! Thanks for your feedback! Optional Tell us why this information was helpful and we’ll work on making more pages like it Leave this field blank