Apr 30, 2019 - This publication provides guidance on securing the use of Microsoft Office macros. Securing the use of Microsoft Office macros is one of the eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents. First published 2012; Latest version April 2019
Apr 30, 2019 - This publication provides an overview of the eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents and their applicability in Linux environments.
Apr 30, 2019 - Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience activities can be an overwhelming task.
Apr 30, 2019 - This publication provides guidance on the implementation of application whitelisting. Application whitelisting is one of the eight essential mitigation strategies from theStrategies to Mitigate Cyber Security Incidents.
Apr 30, 2019 - This publication provides guidance on the implementation of multi-factor authentication for high risk activities such as remote access to systems, performing privileged actions on systems and accessing important data repositories. The use of multi-factor authentication is one of the eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents.
Mar 26, 2019 - The Australian Cyber Security Centre (ACSC) advises users of Drupal and Firefox to implement the latest fixes for vulnerabilities. Cyber criminals will use any weakness in software and apps to access your phone or device. You can protect yourself by installing the updates that are regularly distributed by the company and are designed to fix these weaknesses. These updates can introduce new features as well as fix newly discovered vulnerabilities. To stay one step ahead of updates, and cyber criminals, we recommend that you set your phone and device/s to auto update.
Feb 7, 2019 - The Australian Cyber Security Centre (ACSC) urges organisations to step up efforts to protect themselves from cyber criminals, after the December quarter Notifiable Data Breaches Quarterly Statistics Report revealed an increase in reported malicious or criminal activity. The Office of the Australian Information Commissioner (OAIC) report found that malicious or criminal activity was the leading cause of data breaches in the quarter at 64 per cent of notifications, an increase from the previous quarter's 57 per cent.
Feb 5, 2019 - Today marks Safer Internet Day (SID), and the Australian Cyber Security Centre (ACSC) is a proud partner in supporting this year's theme -- 'Together for a better internet'. SID is an annual, worldwide event led by the Office of the eSafety Commissioner. This year they are encouraging individuals to create a better internet by developing four critical skills known as the 4Rs: Respect, Responsibility, Reasoning and Resilience.
Jan 23, 2019 - Whether you’re an individual or part of an organisation, the data dump of billions of stolen passwords and email addresses is a reminder to take action to protect yourself and your information. The Australian Cyber Security Centre (ACSC) is aware that the so-called Collection #1data dump of stolen credentials has now been followed by the release on the dark web of Collections #2, #3, #4 and #5. All 5 collections add up to 1 terabyte in size with 100 billion records in total.
Jan 18, 2019 - The Australian Cyber Security Centre (ACSC) is aware of a significant data breach affecting 773 million email addresses and usernames. Titled 'Collection #1', the data breach was made public by Australian cyber security expert Troy Hunt, who identified that a large number of credential lists had been distributed on a known hacking forum.