Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Latest advice

Strong password artwork

Easy steps to secure your online information

Apr 29, 2019 - The Australian Cyber Security Centre (ACSC) has developed an Easy Steps Guide to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. Our Easy Steps Guide shows how you can better protect yourself from these threats and secure your accounts and devices, by stepping you through a six-day plan.
Feature - Cameras

Securing internet enabled cameras

Oct 31, 2018 - The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices and other premises. As their name implies, the cameras offer users the ability to stream vision to internet-connected devices, including computers, smartphones and tablets, to and from anyone, anywhere in the world. However, unless they are protected with a password, the cameras can also be hacked by cyber criminals…
Staff awareness

Improving staff awareness

Aug 13, 2018 - Staff will always be an organisation's greatest asset and greatest risk---especially when it comes to cyber security. One wrong click by a staff member, whether intentional or not, can destroy networks. Improving staff awareness of cyber security issues and threats, including the risk environment for your organisaiton, needs to be a priority for all businesses, and there are some easy and effective ways to do it.
Incident response

Developing an incident response plan

Aug 13, 2018 - Being fully prepared is your best defence.  
MSPs

What should an MSP do?

Jul 1, 2018 - MSPs have a responsibility to their customers to protect their data and notify them of breaches and compromises. MSPs should implement best practice cyber security and be transparent when a compromise occurs, including by sharing what steps they are taking to remediate and mitigate the risk of a compromise reoccurring. MSPs may also have legal obligations under the Notifiable Data Breaches Scheme if personally identifiable information has been breached.
Internet of things

Protecting control systems

Jul 1, 2018 - Industrial control systems are essential to our daily life. They control the water we drink, the electricity we rely on and the transport that moves us all. It is critical that cyber threats to industrial control systems are understood and mitigated appropriately to ensure essential services continue to provide for everyone. Providing cyber security for control systems present several unique challenges.
Phishing

Protect your organisation from phishing

Jul 1, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. The messages often contain a link to a bogus website where victims are coaxed to enter personal details. Phishing emails appear to be from a known and trusted source and can be extremely convincing, but the links and attached files are designed to bypass security and access a network. Spear phishing is a dangerous class of phishing, where criminals use social engineering to target specific companies and individuals using very realistic bait or messages, often resembling…
Software update

Patching and updating

Jul 1, 2018 - Software patches are released by device and software manufacturers to fix flaws in previous versions of software, including cyber security vulnerabilities. Timely patching is one of the most important steps you can take to protect your computer systems from cyber criminals.
Big Feature Crazy Cloud

Cloud computing security

Jul 1, 2018 - Cloud computing is the practice of using servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud computing can bring many economic and efficiency benefits for organisations. It also brings cyber security benefits and cyber security issues. Different types Cloud computing is a very broad term. It can refer to lots of different ways of organising computers on the internet to do work. Three broad service types for cloud computing are:

Catch Patch Match educational video

Jan 15, 2014 - This video provides an overview of some simple and effective strategies to mitigate cyber intrusions.