Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Information Security

desk people

Cyber security best-practice in mergers, acquisitions and MoG changes

Jul 26, 2019 - The ACSC has developed tailored advice to help organisations manage the increased cyber security risks, including when data is being migrated from one system to another. Businesses undergoing major organisational change, whether it be through a merger, acquisition or Machinery of Government changes, are an attractive target for cyber criminals because of significant upheaval and disruption to the normal flow of business.
Essential Eight

Updates to the Essential Eight Maturity Model

Jul 2, 2019 - Cyber criminal activity is constantly evolving so the advice of the ACSC constantly evolves, too. As the lead agency on cyber security, the ACSC assists organisations by adopting a risk management approach and providing expert advice that best meets their specific needs. It’s never one-size-fits-all. Our expert advice helps government protect their networks, staff and customers.
Essential Eight

Essential Eight Maturity Model

Jul 2, 2019 - The Essential Eight Maturity Model provides advice on how to implement the Essential Eight in a phased approach. It also assists organisations in self-assessing the maturity of their implementation.
Software update

You need to patch to protect your business online

May 17, 2019 - Malicious actors are compromising Australian business Remote Desktop Protocol (RDP) services, also known as Windows Terminal Services or Windows Remote Desktop. In 2018 and 2019, the ACSC knows of more than 48,000 Australian RDP services that were accessible on the Internet, exposing more than 2,000 Australian businesses.
Feature - mobile security

What Executives Should Know About Cyber Security

Apr 30, 2019 - This publication discusses high-level topics that executives should know about cyber security within their organisations.

Joint report on publicly available hacking tools

Oct 12, 2018 - This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the UK and USA. It highlights the use of five publicly available tools, observed in recent cyber incidents around the world. To aid the work of network defenders and system administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network.