Apr 29, 2019 - The Australian Cyber Security Centre (ACSC) has developed an Easy Steps Guide to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. Our Easy Steps Guide shows how you can better protect yourself from these threats and secure your accounts and devices, by stepping you through a six-day plan.
Dec 21, 2018 - We have no evidence to suggest that individuals or the general public have been specifically targeted. The compromise appears to be primarily for stealing intellectual property from organisations. Organisations operating in Australia must take all reasonable steps to protect their clients from malicious cyber activity as part of their obligations under the Privacy Act. If you would like more information about how to stay safe online, visit our staysmartonline website.
Oct 31, 2018 - The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices and other premises. As their name implies, the cameras offer users the ability to stream vision to internet-connected devices, including computers, smartphones and tablets, to and from anyone, anywhere in the world. However, unless they are protected with a password, the cameras can also be hacked by cyber criminals…
Aug 13, 2018 - Staff will always be an organisation's greatest asset and greatest risk---especially when it comes to cyber security. One wrong click by a staff member, whether intentional or not, can destroy networks. Improving staff awareness of cyber security issues and threats, including the risk environment for your organisaiton, needs to be a priority for all businesses, and there are some easy and effective ways to do it.
Aug 13, 2018 - Being fully prepared is your best defence.
Aug 13, 2018 - Cyber criminals target small Australian businesses because they believe them to have weak cyber security. According to a 2016 report by cybersecurity firm Symantec, 43 percent of spearphising attacks in 2015 were targeted against small businesses. Here are things you can do to protect your small or medium enterprise (SME).
Jul 1, 2018 - Passwords are the first line of defence to protect yourself from cyber criminals. But if you don't choose good passwords they can easily become the weakest link in protecting your personal information online. As users, we are becoming overloaded with lots of passwords to remember. At the same time improved cracking methods mean that we need to use more complex passwords to have confidence in our security.
Jul 1, 2018 - Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience activities can be an overwhelming task. To address this issue, we have compiled a list of mitigation strategies that organisations can use as starting points to improve their cyber resilience and technical details of these strategies. While no single mitigation strategy is guaranteed to prevent cyber security incidents, we have…
Jul 1, 2018 - Industrial control systems are essential to our daily life. They control the water we drink, the electricity we rely on and the transport that moves us all. It is critical that cyber threats to industrial control systems are understood and mitigated appropriately to ensure essential services continue to provide for everyone. Providing cyber security for control systems present several unique challenges.
Jul 1, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. The messages often contain a link to a bogus website where victims are coaxed to enter personal details. Phishing emails appear to be from a known and trusted source and can be extremely convincing, but the links and attached files are designed to bypass security and access a network. Spear phishing is a dangerous class of phishing, where criminals use social engineering to target specific companies and individuals using very realistic bait or messages, often resembling…