Skip to main content

Latest advice

critical infrastructure

COVID-19 – Remote Access to Operational Technology Environments

May 22, 2020 - This cyber security advice is for critical infrastructure providers who are deploying business continuity plans for Operational Technology Environments (OTE)/Industrial Control Systems (ICS) during the COVID-19 pandemic.
Man and woman programming

Cyber Security for Agents of Government Services

May 12, 2020 - Agents of government services, such as taxation agents, BAS agents and taxation (financial) advisers, have authorisation to access valuable or personal information on behalf of their clients, which makes them attractive targets for cybercriminals. To protect your clients, please consider the following cyber security advice.
Man touching lock icon

Detect and prevent web shell malware

Apr 23, 2020 - Malicious web shells are a type of software uploaded to a compromised web server to enable remote access by an attacker. The Australian Signals Directorate and US National Security Agency have for the first time jointly published new guidance on mitigating the threat of web shell malware.
COVID-19 advice

COVID-19: Cyber security tips when working from home

Apr 14, 2020 - The COVID-19 pandemic has resulted in many people working from home for the first time. Working from home has specific cyber security risks, including targeted cybercrime. Here are nine things you can do in your new working environment to protect your work and your household’s cyber security.
COVID-19 advice

COVID-19: Protecting Your Small Business

Apr 6, 2020 - This guide has been developed to help small and micro businesses adapt to working during the COVID-19 pandemic. This document will help businesses with simple and actionable advice in order to both identify common and emerging cyber threats and develop resilient business practices to protect themselves.
Strong password artwork

Easy steps to secure your online information

Apr 29, 2019 - The Australian Cyber Security Centre (ACSC) has developed an Easy Steps Guide to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. Our Easy Steps Guide shows how you can better protect yourself from these threats and secure your accounts and devices, by stepping you through a six-day plan.
Feature - Cameras

Securing internet enabled cameras

Oct 31, 2018 - The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices and other premises. As their name implies, the cameras offer users the ability to stream vision to internet-connected devices, including computers, smartphones and tablets, to and from anyone, anywhere in the world. However, unless they are protected with a password, the cameras can also be hacked by cyber criminals…
Staff awareness

Improving staff awareness

Aug 13, 2018 - Staff will always be an organisation's greatest asset and greatest risk---especially when it comes to cyber security. One wrong click by a staff member, whether intentional or not, can destroy networks. Improving staff awareness of cyber security issues and threats, including the risk environment for your organisaiton, needs to be a priority for all businesses, and there are some easy and effective ways to do it.
Incident response

Developing an incident response plan

Aug 13, 2018 - Being fully prepared is your best defence.  

What should an MSP do?

Jul 1, 2018 - MSPs have a responsibility to their customers to protect their data and notify them of breaches and compromises. MSPs should implement best practice cyber security and be transparent when a compromise occurs, including by sharing what steps they are taking to remediate and mitigate the risk of a compromise reoccurring. MSPs may also have legal obligations under the Notifiable Data Breaches Scheme if personally identifiable information has been breached.

Protect your organisation from phishing

Jul 1, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. The messages often contain a link to a bogus website where victims are coaxed to enter personal details. Phishing emails appear to be from a known and trusted source and can be extremely convincing, but the links and attached files are designed to bypass security and access a network. Spear phishing is a dangerous class of phishing, where criminals use social engineering to target specific companies and individuals using very realistic bait or messages, often resembling…
Software update

Patching and updating

Jul 1, 2018 - Software patches are released by device and software manufacturers to fix flaws in previous versions of software, including cyber security vulnerabilities. Timely patching is one of the most important steps you can take to protect your computer systems from cyber criminals.
Big Feature Crazy Cloud

Cloud computing security

Jul 1, 2018 - Cloud computing is the practice of using servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing can bring many economic and efficiency benefits for organisations. It also brings cyber security benefits and cyber security issues. Different types Cloud computing is a very broad term. It can refer to lots of different ways of organising computers on the internet to do work. Three broad service types for cloud computing are:

Catch Patch Match educational video

Jan 15, 2014 - This video provides an overview of some simple and effective strategies to mitigate cyber intrusions.