Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Catch Patch Match educational video

This video provides an overview of some simple and effective strategies to mitigate cyber intrusions.

 

Catch, Patch, Match video transcript

The Information Age has changed the way you work, the way you play.It touches almost every aspect of daily life and you're able to take advantage of all that it offers.

But there are others who want to take advantage as well Of the way you work, the way you access information and the way you share it.

They want to know about you, your information, your organisation.

They're part of a rapidly growing challenge to Australia's national security, its economic prosperity, and social well-being.

The cyber threat has now reached an unprecedented level.

Government and industry are being threatened on a daily basis, and the effects can be catastrophic.

[A screen shows a series of headlines with statics buzzing in between: "Lives at risk as Ambulance system crashes", "Embarrassment as Government department hacked", "Company forced into bankruptcy after hack" ]  

So who's after your information?

There's the hackers who work alone, seeing what they can get away with. Then there are hacktivists, their activities are usually a form of protest. Criminal syndicates want to steal information, they're looking to make money, serious money.

Spies and state-based hackers pose the greatest threat to your information,  they are the most sophisticated and capable. They want information about Australia, its policies, its industries, its intellectual property, and its defences. And they want to know what you're working on.

So how are they getting in?

A lot of the time you're showing hackers in through the front door. When you sacrifice security for speed.When you ignore policy - just to get the job done. It can be a USB stick used as a quick workaround, or the random email opened without thinking.

You may not be aware of it, but your behaviour can make life easier for intruders.

So how do you stop them getting in?

The first step is to realise the value of your information, and the consequences of it falling into the wrong hands. You can help make your organisation more resilient.That's where we come in - the Australian Signals Directorate.

We're the Commonwealth authority on cyber security, here to help you keep your information safe.

We've developed strategies to mitigate cyber intrusions. Like all good strategies, the best ones are simple and effective.Your organisation needs to Catch, Patch and Match.

Put it into practice.

Catch malicious software with a white-list.

This ensures only the software that's been approved can run. Everything else is blocked.

Patch all your applications with updates - your operating system too.

Ask your IT team. Do it now, intruders can take advantage of vulnerabilities in software.

Match the right people with the right access.

Only a few people need administration privileges. These privileges, in an intruder's hands, can spell disaster.

If you Catch, Patch and Match, you can prevent at least 85% of the intrusion techniques ASD responds to.

The threat is very real but there is something we can do.

You can be part of the protection.

Everyone has a part to play.

Catch. Patch. Match.

URL: www.asd.gov.au

End transcript 

Note: Defence Signals Directorate (DSD) was renamed the Australian Signals Directorate (ASD) in 2013 to reflect its whole-of-government information security role. This transcript has been updated to reflect those changes 

Date
January 15th, 2014