Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Protect

desk people

Cyber security best-practice in mergers, acquisitions and MoG changes

Jul 26, 2019 - The ACSC has developed tailored advice to help organisations manage the increased cyber security risks, including when data is being migrated from one system to another. Businesses undergoing major organisational change, whether it be through a merger, acquisition or Machinery of Government changes, are an attractive target for cyber criminals because of significant upheaval and disruption to the normal flow of business.
Essential Eight

Essential Eight to ISM Mapping

Jul 4, 2019 - This document provides a mapping between Maturity Level 3 of the Essential Eight Maturity Model and the security controls within the Australian Government Information Security Manual (ISM). This mapping represents the minimum security controls organisations must implement to meet the intent of the Essential Eight.
Essential Eight

Updates to the Essential Eight Maturity Model

Jul 2, 2019 - Cyber criminal activity is constantly evolving so the advice of the ACSC constantly evolves, too. As the lead agency on cyber security, the ACSC assists organisations by adopting a risk management approach and providing expert advice that best meets their specific needs. It’s never one-size-fits-all. Our expert advice helps government protect their networks, staff and customers.
Essential Eight

Essential Eight Maturity Model

Jul 2, 2019 - The Essential Eight Maturity Model provides advice on how to implement the Essential Eight in a phased approach. It also assists organisations in self-assessing the maturity of their implementation.

Minimising the Threat from Java-based Intrusions

Apr 30, 2019 - Java applications are widely deployed by organisations. As such, exploiting security vulnerabilities in the Java platform is particularly attractive to adversaries seeking unauthorised access to organisations’ networks.
Windows event viewer icon

Windows Event Logging and Forwarding

Apr 30, 2019 - This publication provides guidance on the configuration of Windows Event Logging and Forwarding functionality to support the detection and remediation of cyber security incidents.
Feature - mobile security

What Executives Should Know About Cyber Security

Apr 30, 2019 - This publication discusses high-level topics that executives should know about cyber security within their organisations.

Using Virtual Private Networks

Apr 30, 2019 - This publication provides guidance on how to securely configure the use of Virtual Private Networks between geographically-separated office buildings (site-to-site VPNs) and in support of remote workers (remote access VPNs).

Using Remote Desktop Clients

Apr 30, 2019 - This publication provides guidance on how to secure the use of remote desktop clients for individuals working remotely or from home.

Using Consumer-Grade Email Services

Apr 30, 2019 - This publication provides guidance on how to minimise the risk of using consumer-grade email services for business purposes.