Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Essential Eight

Strong password artwork

Easy steps to secure your online information

Apr 29, 2019 - The Australian Cyber Security Centre (ACSC) has developed an Easy Steps Guide to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. Our Easy Steps Guide shows how you can better protect yourself from these threats and secure your accounts and…
Software update

You need to patch to protect your business online

May 17, 2019 - Malicious actors are compromising Australian business Remote Desktop Protocol (RDP) services, also known as Windows Terminal Services or Windows Remote Desktop. In 2018 and 2019, the ACSC knows of more than 48,000 Australian RDP services that were accessible on the Internet, exposing more than 2,000 Australian businesses. The ACSC believes these compromises are part of ongoing campaigns to exploit cybersecurity…
WhatsApp logo

Users advised to update WhatsApp

May 15, 2019 - The Australian Cyber Security Centre (ACSC) advises users of WhatsApp to implement the latest fix for a reported vulnerability. Cyber criminals can use any weakness in apps to access your phone or device. To stay one step ahead of remote attackers, we recommend that you set your phone and device/s to auto update your apps. .
small and medium business logo

Follow our essential steps to protect your business

May 15, 2019 - This week is national Privacy Awareness Week, an annual initiative of the Office of the Australian Information Commissioner (OAIC) that raises awareness of privacy issues and the importance of protecting personal information. Malicious or criminal attacks are deliberately crafted to exploit known vulnerabilities for financial or other gain. Many cyber incidents exploit vulnerabilities involving a human factor, such as…
Strong password artwork

Take steps to better secure yourself

May 2, 2019 - The Australian Cyber Security Centre (ACSC) has released a checklist to help Australians protect themselves from cyber criminals. Lottery and grant scams, identity theft, investment scams, hacking, phishing, dating and romance scams, online abuse and sextortion are just some of the threats people face. . Follow the Easy Steps Guide The ACSC’s Easy Steps Guide shows you how to better secure your…
Essential eight

Essential Eight to ISM Mapping

Apr 30, 2019 - This document provides a mapping between Maturity Level 3 of the Essential Eight Maturity Model and the security controls within the Australian Government Information Security Manual (ISM). This mapping represents the minimum security controls organisations must implement to meet the intent of the Essential Eight. .

Restricting Administrative Privileges

Apr 30, 2019 - This publication provides guidance on restricting the use of administrative privileges. Restricting the use of administrative privileges is one of the eight essential mitigation strategies from theStrategies to Mitigate Cyber Security Incidents. .

Assessing Security Vulnerabilities and Applying Patches

Apr 30, 2019 - Applying patches to operating systems, applications and devices is critical to ensuring the security of systems. As such, patching forms part of the Essential Eight from the Strategies to Mitigate Cyber Security Incidents. . Assessing Security Vulnerabilities and Applying Patches , Introduction Applying patches to operating systems, applications and devices is…

Microsoft Office Macro Security

Apr 30, 2019 - This publication provides guidance on securing the use of Microsoft Office macros. Securing the use of Microsoft Office macros is one of the eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents. First published 2012; Latest version April 2019.
Essential eight

Essential Eight Maturity Model

Apr 30, 2019 - To assist organisations in determining the maturity of their implementation of the Essential Eight, three maturity levels have been defined for each mitigation strategy. .