Jul 1, 2018 - An Australian Government agency must request that we conduct a Cryptographic evaluation of an ICT security product, through our recommendation process.
Jul 1, 2018 - The Cryptographic evaluation process generally takes several months. This timeframe is separate to the time taken for the AISEP evaluation. The time taken depends on the level of vendor cooperation and whether any security vulnerabilities are found during the evaluation. If we do find security vulnerabilities, whether we continue the Cryptographic evaluation depends on the implementation of a suitable fix. If the recommending Australian Government agency withdraws its recommendation, we will usually halt the Cryptographic evaluation.
Jul 1, 2018 - We're so used to sharing our personal information online that we don't really think about where it's going. This window into your life not only lets your friends and family know what you're up to, it also gives cybercriminals information to steal your identity or hack into your online accounts. Be proactive in managing your privacy by checking the privacy and security settings on your online accounts and apps. Read more about safely socialising online
Jul 1, 2018 - Scammers are becoming more sophisticated so it might be hard to tell if a message is really from a trusted organisation or a scam! These deceptive messages can be sent via email, SMS, instant messaging or social media platforms. They often contain a link to a fake website and you're encouraged to enter your personal details.
Jul 1, 2018 - All products that have started evaluation under AISEP will be listed on the EPL with the current status of the evaluation and an expected completion date. If a product you are seeking does not appear on the EPL, check if it published on the CC Portal's certified product list.
Jul 1, 2018 - Getting on top of cyber security isn't as hard as it sounds. There are loads of simple things you can do to keep your information safe and secure online. A good place to start is the Stay Smart Online My Guide: Protect yourself in 8 steps.
Jul 1, 2018 - Your personal information is valuable so stop and think before sharing it with anyone. Cyber criminals use all kinds of tricks to disguise their true identity and get you to hand over your personal information or money. You should always verify the identity of the person you're dealing with through an independent source, such as a phone book or online search. Don't ever use the contact details provided by the caller or in the message they sent to you.
Jul 1, 2018 - When you're alerted to a security update for your operating system or one of your apps, don't ignore it ' install it as soon as possible. These updates aren't just about adding new features. They're also about fixing weaknesses that cybercriminals use to gain access to your device.
Jul 1, 2018 - We have so many online accounts now and it's hard to keep track of all our passwords! Many of us still use the same password for multiple accounts. The problem is that if a cybercriminal gets into one of your accounts, it can give them access to your other accounts.
Jul 1, 2018 - If you are an Australian or New Zealand government agency that wishes to use a security product that is not on the EPL, you can recommend that product for evaluation in accordance with the recommendation process