You are here Home About the ACSC View all content Publications Publications Find the latest cyber security publications Latest publications 16 Dec 2022 Small Business Cloud Security Guides: Executive overview The ACSC’s Small Business Cloud Security Guides provide technical examples organisations can use to improve their cyber security and protect against damaging cyber incidents. This page outlines everything executives need… 02 Mar 2023 Essential Eight Maturity Model to ISM Mapping This publication provides a mapping between Maturity Level Two and Maturity Level Three of the Essential Eight Maturity Model and the controls within the Information Security Manual (ISM). 20 Feb 2023 Essential Eight Maturity Model FAQ The Essential Eight Maturity Model provides advice on how to implement the Essential Eight to mitigate different levels of adversary tradecraft and targeting. All publications Title - Any -Individuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 6121824- All - 16 Dec 2022 Technical Example: Application Control Application control restricts the ability of an application to run or install on a device. Application control makes it harder for users to intentionally or unintentionally install unwanted or malicious software. 16 Dec 2022 Small Business Cloud Security Guides: Introduction Securing your business can be a complex task. Among the numerous security priorities and configuration options, it can be difficult to know where to begin. These guides adapt the ACSC’s Essential Eight mitigation… 16 Dec 2022 Technical Example: Configure Macro Settings Configuring macro settings protects an organisation’s systems from malicious macros. Macros are powerful tools. They were introduced to improve productivity however their functionality can also be used by cyber criminals… 16 Dec 2022 Technical Example: Multi-Factor Authentication Multi-factor authentication (MFA) makes it harder for adversaries to use compromised user credentials to access an organisation’s systems. It is one of the most important cyber security measures an organisation can… 16 Dec 2022 Technical Example: User Application Hardening User application hardening protects an organisation from a range of threats including malicious websites, advertisements running malicious scripts and exploitation of vulnerabilities in unsupported software. These attacks… 16 Dec 2022 Technical Example: Restrict Administrative Privileges Privileged account credentials are prized by cybercriminals because they provide extensive access to high value assets within a network. Restricting privileged access to only users with a demonstrated business need is… Pagination Previous page ‹‹ Page 2 Next page ›› Alerts and advisories Advice and guidance News and media releases Programs Publications Reports and statistics Glossary Threats Was this information helpful? Was this information helpful? Yes No Thanks for your feedback! Thanks for your feedback! Optional Tell us why this information was helpful and we’ll work on making more pages like it Leave this field blank