Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Essential Eight

Essential Eight in Linux Environments

Apr 30, 2019 - This publication provides an overview of the eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents and their applicability in Linux environments. Essential Eight in Linux Environments (April 2019) First published March 2018; Latest version April 2019.

Essential Eight Explained

Apr 30, 2019 - Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience activities can be an overwhelming task. To address this issue, we have compiled a list of mitigation strategies that organisations can use as starting points to improve…

Implementing Application Whitelisting

Apr 30, 2019 - This publication provides guidance on the implementation of application whitelisting. Application whitelisting is one of the eight essential mitigation strategies from theStrategies to Mitigate Cyber Security Incidents. Implementing Application Whitelisting (April 2019) First published 2012; Latest version April 2019 . Introduction Application whitelisting is one of the most effective…

Implementing Multi-Factor Authentication

Apr 30, 2019 - This publication provides guidance on the implementation of multi-factor authentication for high risk activities such as remote access to systems, performing privileged actions on systems and accessing important data repositories. The use of multi-factor authentication is one of the eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents. Implementing Multi-Factor Authentication…
Software update

Keeping up with the updates

Mar 26, 2019 - The Australian Cyber Security Centre (ACSC) advises users of Drupal and Firefox to implement the latest fixes for vulnerabilities. Cyber criminals will use any weakness in software and apps to access your phone or device. You can protect yourself by installing the updates that are regularly distributed by the company and are designed to fix these weaknesses. These updates can introduce new features as well as fix newly…
Data breach

Get serious about protecting commercial secrets

Feb 7, 2019 - The Australian Cyber Security Centre (ACSC) urges organisations to step up efforts to protect themselves from cyber criminals, after the December quarter Notifiable Data Breaches Quarterly Statistics Report revealed an increase in reported malicious or criminal activity. The Office of the Australian Information Commissioner (OAIC) report found that malicious or criminal activity was the leading cause of data breaches in…
Safer Internet Day

ACSC celebrates Safer Internet Day

Feb 5, 2019 - Today marks Safer Internet Day (SID), and the Australian Cyber Security Centre (ACSC) is a proud partner in supporting this year's theme -- 'Together for a better internet'. SID is an annual, worldwide event led by the Office of the eSafety Commissioner. This year they are encouraging individuals to create a better internet by developing four critical skills known as the 4Rs: Respect, Responsibility, Reasoning and…
Feature - Password security

Get smarter with passwords

Jan 23, 2019 - Whether you’re an individual or part of an organisation, the data dump of billions of stolen passwords and email addresses is a reminder to take action to protect yourself and your information. The Australian Cyber Security Centre (ACSC) is aware that the so-called Collection #1data dump of stolen credentials has now been followed by the release on the dark web of Collections #2, #3, #4 and #5. All 5 collections add up…
Hacking data

773M accounts affected by 'Collection #1' breach

Jan 18, 2019 - The Australian Cyber Security Centre (ACSC) is aware of a significant data breach affecting 773 million email addresses and usernames. Titled 'Collection #1', the data breach was made public by Australian cyber security expert Troy Hunt, who identified that a large number of credential lists had been distributed on a known hacking forum. . What we are doing The ACSC overnight issued a…
SOC

Implementing the Essential Eight for MSPs

Jan 11, 2019 - Following the global compromise of managed service providers or MSPs, the Australian Cyber Security Centre (ACSC) is calling on Australian businesses and individuals to be proactive in implementing better cyber security practices. While no single mitigation strategy is guaranteed to prevent cyber security incidents, organisations are recommended to implement eight essential mitigation strategies as a baseline. This…