Displaying 1 - 10 of 44 (Page 1 of 5)
This publication helps organisations mitigate cyber security incidents caused by various cyber threats. It addresses targeted cyber intrusions, adversaries with destructive intent, malicious insiders, ‘business email compromise’ and industrial control systems.
Cybercrime and cyber-enabled crime is harming more and more Australians every day, and it’s time to reverse the threat.
This publication provides guidance on how organisations can prepare themselves for a cyber security incident. In addition, it provides guidance on the types of cyber security incidents that should be reported to the Australian Cyber Security Centre (ACSC) and how this can be done.
Latest threat adviceJuly 2018
Business email compromise (BEC) is an online scam where a cybercriminal impersonates a business representative to trick you, an employee, customer or vendor into transferring money or sensitive information to the scammer. To begin, a cybercriminal impersonates a trusted person using an email address that appears to be legitimate (this is known as "masquerading"). To do this, they may use a
Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience activities can be an overwhelming task.
The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies to help technical cyber security professionals in all organisations mitigate cyber security incidents. This guidance addresses targeted cyber intrusions (e.g. executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious
This publication discusses the risks associated with cloud computing and provides guidance on suitable mitigation strategies. This publication is specifically tailored for tenants of cloud services.
This publication discusses the risks associated with cloud computing and provides guidance on suitable mitigation strategies. This publication is specifically tailored for cloud service providers.
This publication discusses the concepts of network segmentation and segregation and provides guidance on how to effectively implement it within an organisation.
This publication provides guidance for contractors in securing Australian Government information that they have been entrusted with.