May 22, 2020 - This cyber security advice is for critical infrastructure providers who are deploying business continuity plans for Operational Technology Environments (OTE)/Industrial Control Systems (ICS) during the COVID-19 pandemic.
May 12, 2020 - Agents of government services, such as taxation agents, BAS agents and taxation (financial) advisers, have authorisation to access valuable or personal information on behalf of their clients, which makes them attractive targets for cybercriminals. To protect your clients, please consider the following cyber security advice.
Apr 23, 2020 - Malicious web shells are a type of software uploaded to a compromised web server to enable remote access by an attacker. The Australian Signals Directorate and US National Security Agency have for the first time jointly published new guidance on mitigating the threat of web shell malware.
Apr 14, 2020 - The COVID-19 pandemic has resulted in many people working from home for the first time. Working from home has specific cyber security risks, including targeted cybercrime. Here are nine things you can do in your new working environment to protect your work and your household’s cyber security.
Apr 6, 2020 - This guide has been developed to help small and micro businesses adapt to working during the COVID-19 pandemic. This document will help businesses with simple and actionable advice in order to both identify common and emerging cyber threats and develop resilient business practices to protect themselves.
Apr 29, 2019 - The Australian Cyber Security Centre (ACSC) has developed an Easy Steps Guide to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. Our Easy Steps Guide shows how you can better protect yourself from these threats and secure your accounts and devices, by stepping you through a six-day plan.
Oct 31, 2018 - The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices and other premises. As their name implies, the cameras offer users the ability to stream vision to internet-connected devices, including computers, smartphones and tablets, to and from anyone, anywhere in the world. However, unless they are protected with a password, the cameras can also be hacked by cyber criminals…
Aug 13, 2018 - Staff will always be an organisation's greatest asset and greatest risk---especially when it comes to cyber security. One wrong click by a staff member, whether intentional or not, can destroy networks. Improving staff awareness of cyber security issues and threats, including the risk environment for your organisaiton, needs to be a priority for all businesses, and there are some easy and effective ways to do it.
Aug 13, 2018 - Being fully prepared is your best defence.
Jul 1, 2018 - MSPs have a responsibility to their customers to protect their data and notify them of breaches and compromises. MSPs should implement best practice cyber security and be transparent when a compromise occurs, including by sharing what steps they are taking to remediate and mitigate the risk of a compromise reoccurring. MSPs may also have legal obligations under the Notifiable Data Breaches Scheme if personally identifiable information has been breached.
Jul 1, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. The messages often contain a link to a bogus website where victims are coaxed to enter personal details. Phishing emails appear to be from a known and trusted source and can be extremely convincing, but the links and attached files are designed to bypass security and access a network. Spear phishing is a dangerous class of phishing, where criminals use social engineering to target specific companies and individuals using very realistic bait or messages, often resembling…
Jul 1, 2018 - Software patches are released by device and software manufacturers to fix flaws in previous versions of software, including cyber security vulnerabilities. Timely patching is one of the most important steps you can take to protect your computer systems from cyber criminals.
Jul 1, 2018 - Cloud computing is the practice of using servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing can bring many economic and efficiency benefits for organisations. It also brings cyber security benefits and cyber security issues. Different types Cloud computing is a very broad term. It can refer to lots of different ways of organising computers on the internet to do work. Three broad service types for cloud computing are:
Jan 15, 2014 - This video provides an overview of some simple and effective strategies to mitigate cyber intrusions.