Apr 6, 2020 - This guide has been developed to help small and micro businesses adapt to working during the COVID-19 pandemic. This document will help businesses with simple and actionable advice in order to both identify common and emerging cyber threats and develop resilient business practices to protect themselves.
Apr 29, 2019 - The Australian Cyber Security Centre (ACSC) has developed an Easy Steps Guide to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. Our Easy Steps Guide shows how you can better protect yourself from these threats and secure your accounts and devices, by stepping you through a six-day plan.
Oct 31, 2018 - The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices and other premises. As their name implies, the cameras offer users the ability to stream vision to internet-connected devices, including computers, smartphones and tablets, to and from anyone, anywhere in the world. However, unless they are protected with a password, the cameras can also be hacked by cyber criminals…
Aug 13, 2018 - Staff will always be an organisation's greatest asset and greatest risk---especially when it comes to cyber security. One wrong click by a staff member, whether intentional or not, can destroy networks. Improving staff awareness of cyber security issues and threats, including the risk environment for your organisaiton, needs to be a priority for all businesses, and there are some easy and effective ways to do it.
Aug 13, 2018 - Being fully prepared is your best defence.
Jul 1, 2018 - MSPs have a responsibility to their customers to protect their data and notify them of breaches and compromises. MSPs should implement best practice cyber security and be transparent when a compromise occurs, including by sharing what steps they are taking to remediate and mitigate the risk of a compromise reoccurring. MSPs may also have legal obligations under the Notifiable Data Breaches Scheme if personally identifiable information has been breached.
Jul 1, 2018 - Industrial control systems are essential to our daily life. They control the water we drink, the electricity we rely on and the transport that moves us all. It is critical that cyber threats to industrial control systems are understood and mitigated appropriately to ensure essential services continue to provide for everyone. Providing cyber security for control systems present several unique challenges.
Jul 1, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. The messages often contain a link to a bogus website where victims are coaxed to enter personal details. Phishing emails appear to be from a known and trusted source and can be extremely convincing, but the links and attached files are designed to bypass security and access a network. Spear phishing is a dangerous class of phishing, where criminals use social engineering to target specific companies and individuals using very realistic bait or messages, often resembling…
Jul 1, 2018 - Software patches are released by device and software manufacturers to fix flaws in previous versions of software, including cyber security vulnerabilities. Timely patching is one of the most important steps you can take to protect your computer systems from cyber criminals.
Jul 1, 2018 - Cloud computing is the practice of using servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. Cloud computing can bring many economic and efficiency benefits for organisations. It also brings cyber security benefits and cyber security issues. Different types Cloud computing is a very broad term. It can refer to lots of different ways of organising computers on the internet to do work. Three broad service types for cloud computing are:
Jan 15, 2014 - This video provides an overview of some simple and effective strategies to mitigate cyber intrusions.