You can search for keywords to find pages that can help you e.g. scam
Contact us
Portal login
back to main menu
Learn about who we are and what we do.
Interactive tools and advice to boost your online safety.
Advice and information about how to protect yourself online.
Common online security risks and advice on what you can do to protect yourself.
Respond to cyber threats and take steps to protect yourself from further harm.
Resources for business and government agencies on cyber security.
Displaying search results for Displaying 101 - 120 of 409 results.
Cloud shared responsibility model: Guidance for individuals and small and medium businesses Publication
Oct 20, 2025 - This publication is for individuals and small and medium businesses that use or plan to use a cloud service. It explains what the shared responsibility model (SRM) is, and how responsibility for cloud security is shared between you and the cloud service provider (CSP).
Implementing SIEM and SOAR platforms: Executive guidance Publication
May 27, 2025 - This publication is one of three in a suite of guidance on SIEM and SOAR platforms. It is primarily intended for executives but can be used by any organisation that is considering whether and how to implement a SIEM and/or SOAR.
New asset inventory guidance for operational technology (OT) owners and operators News
Aug 14, 2025 - New guidance released to help critical infrastructure organisations identify, organise and prioritise operational technology (OT) assets and better secure these assets to reduce the risk of cyber security incidents.
New zero trust guidance – seeking industry feedback News
Feb 10, 2025 - Have your say on new Foundations for modern defensible architectures, including zero trust and secure-by-design principles.
Cyber security incident response planning: Executive guidance Publication
Dec 12, 2024 - The Australian Signals Directorate (ASD) is responsible for monitoring and responding to cyber threats targeting Australian interests. Reporting cyber security incidents to ASD ensures that timely assistance can be provided, if required. This may be in the form of investigations or remediation advice.
Use our new guidance to create and maintain a definitive view of your organisation’s Operational Technology (OT) architecture News
Oct 28, 2025 - Apply the 5 key principles of this guidance to build a holistic understanding of your operational technology (OT) systems and design appropriate, effective cyber security controls.
Managing the risks of legacy IT: Executive guidance Publication
Jun 12, 2024 - This publication provides high-level and strategic guidance for an organisation’s executive seeking to manage the risks of legacy IT.
New guidance on detecting and mitigating Active Directory compromises News
Sep 26, 2024 - Does your organisation use Microsoft’s Active Directory? Read our latest guidance on Active Directory compromises now.
New Secure by Demand guidance available for operational technology owners and operators News
Jan 14, 2025 - To protect your systems from threat actors targeting your operational technology components, select products from manufacturers who are Secure-by-Design. Find out which security elements to prioritise.
New ASD’s ACSC guidance released to help Australians avoid risks related to social media and messaging applications News
Jul 14, 2022 - The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has today released updated guidance to help all Australians better understand how social media and messaging apps can pose a risk to the security and privacy of individuals and organisations.
Tok Pisin (New Guinea Pidgin) Guidance
Aug 17, 2023 - The information and resources available are intended to increase your safety online and have been translated into New Guinea Pidgin.
Ransomware Playbook Guidance
Oct 10, 2024 - This interactive guide is here to assist you with taking all of the appropriate steps to prepare for, respond to and recover from a ransomware incident.
Report and recover from business email compromise Guidance
Jul 14, 2023 - Step-by-step guidance on how to respond to and recover from email compromise and impersonation attempts.
Report and recover from ransomware Guidance
Jul 14, 2023 - Learn where to get help from a ransomware attack, and steps to protect yourself against future incidents.
Educational pack for seniors Guidance
Jun 23, 2023 - This educational pack provides engaging content to help seniors learn how to stay cyber secure. Practical steps and topics range from a basic to advanced level.
Secure your Apple macOS device Guidance
Nov 29, 2024 - Your Apple macOS device often holds your most important data. Use these simple steps to protect your device from cyber attacks.
Secure your Microsoft Windows device Guidance
Nov 29, 2024 - Your Microsoft Windows device often holds your most important data. Use these simple steps to protect your device from cyber attacks.
Secure your mobile phone Guidance
Nov 12, 2024 - The security of your mobile phone can be as crucial as your computer. Follow these steps to protect your phone or tablet from cybercriminals.
Foundations for modern defensible architecture Publication
Oct 23, 2025 - The Foundations represent the first step to help organisations adopt a ‘modern defensible architecture’ approach, which will enable them to evolve alongside the threat landscape.
The case for memory safe roadmaps Publication
Dec 7, 2023 - This guidance provides manufacturers with steps to create memory safe roadmaps and implement changes to eliminate memory safety vulnerabilities from their products.