Strategies to Mitigate Cyber Security Incidents – Mitigation Details
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to help cyber security professionals in all organisations mitigate cyber security incidents caused by various cyber threats. This guidance addresses targeted cyber intrusions (i.e. those executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious insiders, ‘business email compromise’, and industrial control systems.
Cyber Supply Chain Risk Management Practitioner Guide
This guidance informs cyber security practitioners, procurement officers, and supply chain decision makers with a more detailed discussion of the key cyber SCRM elements.
Risk Management of Enterprise Mobility Including Bring Your Own Device
This document has been developed to provide senior business representatives with a list of enterprise mobility considerations. These include business cases, regulatory obligations and legislation, available budget and personnel resources, and risk tolerance. Additionally, risk management controls are provided for cyber security practitioners.
An Examination of the Redaction Functionality of Adobe Acrobat Pro DC 2017
This document provides guidance on the efficacy of redaction facilities within Adobe Acrobat Pro DC 2017 and is intended for information technology and information security professionals within organisations looking to redact sensitive or personal information from PDF documents before releasing them into the public domain or to other third parties.
Anatomy of a Cloud Assessment and Authorisation
The Anatomy of a Cloud Assessment and Authorisation is co-designed with industry to support the secure adoption of cloud services across government and industry.
Hardening Microsoft Windows 8.1 Workstations
Workstations are often targeted by an adversary using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This document provides recommendations on hardening workstations using Enterprise editions of Microsoft Windows 8.1. Before implementing recommendations in this document, thorough testing should be undertaken to ensure the potential for unintended negative impacts on business processes is reduced as much as possible.
Implementing Multi-Factor Authentication
Multi-factor authentication is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device or network and accessing sensitive information
Multi-factor authentication is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device or network and accessing sensitive information. When implemented correctly, multi-factor authentication can make it significantly more difficult for an adversary to steal legitimate credentials to facilitate further malicious activities on a network. Due to its effectiveness, multi-factor authentication is one of the Essential Eight from the Strategies to Mitigate Cyber Security Incidents.
How to Combat Fake Emails
Organisations can reduce the likelihood of their domains being used to support fake emails by implementing Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting and Conformance (DMARC) records in their Domain Name System (DNS) configuration. Using DMARC with DomainKeys Identified Mail (DKIM) to sign emails provides further safety against fake emails. Likewise, organisations can better protect their users against fake emails by ensuring their email systems use and apply SPF, DKIM and DMARC policies on inbound email.
Turning on Automatic Updates – For iMac, MacBook, iPhone & iPad
How to turn on automatic updates can differ depending on your operating system and your software applications (“apps”). This guide steps you through turning on automatic updates on an iMac, MacBook, iPhone & iPad.
Hardening Microsoft Windows 10 version 1909 Workstations
Workstations are often targeted by an adversary using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This document provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 version 1909. Before implementing recommendations in this document, thorough testing should be undertaken to ensure the potential for unintended negative impacts on business processes is reduced as much as possible.
Terminate ransomware programs with Task Manager (Microsoft Windows 10)
If you are experiencing a ransomware attack, follow these three steps to identify and stop a potential ransomware program running on your Windows 10 computer.
Data Spill Management Guide
A data spill is the accidental or deliberate exposure of information into an uncontrolled or unauthorised environment, or to persons without a need-to-know. A data spill is sometimes referred to as information disclosure or a data leak. Data spills are considered cyber security incidents and should be reported to the Australian Cyber Security Centre (ACSC).
Turning on Automatic Updates – For Microsoft Windows 10
How to turn on automatic updates can differ depending on your operating system and your programs. This guide steps you through turning on automatic updates on a desktop computer for the Microsoft Windows 10 operating system.
Backing Up and Restoring Your Files – For Mac (Using an External Storage Device)
How to back up and restore files on your Mac using an external hard drive.
Securing PowerShell in the Enterprise
This document describes a maturity framework for PowerShell in a way that balances the security and business requirements of organisations. This maturity framework will enable organisations to take incremental steps towards securing PowerShell across their environment.
Privileged access allows administrators to perform their duties such as establishing and making changes to key servers, networking devices, user workstations and user accounts. Privileged access or credentials are often seen as the ‘keys to the kingdom’ as they allow the bearers to have access and control over many different assets within a network. This publication provides guidance on how to implement secure administration techniques.
Glossary of cyber security terms
This section of the ISM provides a glossary of cyber security terms.
Advisory 2020-004: Remote code execution vulnerability being actively exploited in vulnerable versions of Telerik UI by sophisticated actors
This advisory is focused around the targeting of CVE-2019-18935 but has significant overlap to the previously released ACSC 2019-126 advisory.
Announcing the ACSC Small Business Survey Report
Today ASD’s ACSC has published the ACSC Small Business Survey Report: How Australian Small Businesses Understand Cyber Security.
Quick Response Codes in a COVID-19 Environment
Quick Response (QR) codes have increased in popularity in the COVID-19 environment, aiding contact tracing and business check-in efforts. This guide provides information for individuals and businesses to help protect against cyber threats when using QR codes.
One in four Australians hit by cybercrime - reversing the threat
Cybercrime and cyber-enabled crime is harming more and more Australians every day, and it’s time to reverse the threat.
Strategies to Mitigate Cyber Security Incidents
Turning on Two-Factor Authentication – Twitter
This step-by-step guide shows you how to turn on two-factor authentication (2FA) on your computer and mobile devices for Twitter.
COVID-19 Protecting Your Small Business
This guide has been developed to help small and micro businesses adapt to working during the COVID-19 pandemic. It will help businesses with simple and actionable advice in order to both identify common and emerging cyber threats and develop resilient business practices to protect themselves.
Step 1: Screen every profile image using a reverse online image search
Scammers steal photographs of real people to create realistic profiles. Reverse image searches of profile pictures can help you spot the difference between a genuine and a fake profile – it can also confirm if the image has been used before in a scam.
Tips to stay secure online at tax time
Tax time is a prime time for cybercriminals trying to get their hands on your money and personal details! Whether you’re a business owner, tax professional or individual, there are some simple things you can do to apply good cyber security practices and avoid tax time scams.
Step 2: Do some further screening of the profile
The reverse image check might still have missed the scammer profile. Take your time and look for the following
2019-126: Vulnerable version of Telerik UI being actively exploited by APT actor
The Australian Cyber Security Centre (ACSC) has become aware that Advanced Persistent Threat (APT) actors have been scanning for and attempting exploitation against unpatched versions of Telerik UI for ASP.NET AJAX using publicly available exploits. Successful exploitation could allow an attacker to upload files to the vulnerable server to facilitate further compromise.
Australian Cyber Security Hotline
1300 CYBER1(1300 292 371)