Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Essential Eight

Microsoft warns of Internet Explorer vulnerability

Dec 21, 2018 - Microsoft has released a security update for Internet Explorer after receiving a report from Google about a new vulnerability that is being used in targeted attacks. Security vulnerabilities in applications can be used to execute malicious code on your systems, and using the latest version of applications is one way that you can better protect yourself, as we explain in the Essential Eight. According to Microsoft,…

New approach to support cyber security

Dec 4, 2018 - The updated Australian Government Information Security Manual (ISM) has been released by the Australian Cyber Security Centre (ACSC). The 2018 release supports a move towards a risk-based approach that gives organisations greater flexibility to manage their cyber security based on their own unique circumstances, enabling greater innovation within Government. The ISM is an important source of cyber security advice to…

Attribution of a pattern of malicious cyber activity to Russia

Oct 4, 2018 - The Australian Government has joined international partners to condemn a pattern of malicious cyber activity by Russia targeting political, business, media and sporting institutions worldwide. The Prime Minister, the Hon Scott Morrison MP and the Foreign Affairs Minister, Senator the Hon Marise Payne have made a joint statement condemning these actions. The ACSC is committed to protecting Australian interests in…

Combat DNS infrastructure hijacking

Jul 1, 2018 - The Australian Cyber Security Centre (ACSC) is aware of a global Domain Name System (DNS) infrastructure hijacking campaign and urges organisations to protect their systems. 'We encourage administrators to follow best practices, including our Essential Eight mitigation strategies, to better safeguard their systems,' said Alastair MacGibbon, Head of the ACSC. 'While no single mitigation strategy is guaranteed to prevent…
Mitigating security incidents

How to mitigate cyber security incidents

Jul 1, 2018 - Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience activities can be an overwhelming task. To address this issue, we have compiled a list of mitigation strategies that organisations can use as starting points to improve…

2018 - Launching into action

Jul 1, 2018 - Working from new purpose-built headquarters after its official launch in August, the ACSC and its network of Joint Cyber Security Centres (JCSCs) across the country are building on decades of quiet success by Australian agencies. The ACSC, part of the Australian Signals Directorate (ASD), demonstrates the Australian Government's commitment to cyber security in a world where new threats are always emerging. 'From the…
Cyber strategy

Strategies to Mitigate Cyber Security Incidents - Mitigation Details

Feb 5, 2017 - This publication helps organisations mitigate cyber security incidents caused by various cyber threats. It addresses targeted cyber intrusions, adversaries with destructive intent, malicious insiders, ‘business email compromise’ and industrial control systems..

Strategies to Mitigate Cyber Security Incidents

Feb 1, 2017 - The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies to help technical cyber security professionals in all organisations mitigate cyber security incidents. This guidance addresses targeted cyber intrusions (e.g. executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious insiders, 'business email…