Jul 26, 2019 - The ACSC has developed tailored advice to help organisations manage the increased cyber security risks, including when data is being migrated from one system to another. Businesses undergoing major organisational change, whether it be through a merger, acquisition or Machinery of Government changes, are an attractive target for cyber criminals because of significant upheaval and disruption to the normal flow of business.
Jul 4, 2019 - This document provides a mapping between Maturity Level 3 of the Essential Eight Maturity Model and the security controls within the Australian Government Information Security Manual (ISM). This mapping represents the minimum security controls organisations must implement to meet the intent of the Essential Eight.
Jul 2, 2019 - Cyber criminal activity is constantly evolving so the advice of the ACSC constantly evolves, too. As the lead agency on cyber security, the ACSC assists organisations by adopting a risk management approach and providing expert advice that best meets their specific needs. It’s never one-size-fits-all. Our expert advice helps government protect their networks, staff and customers.
Jul 2, 2019 - The Essential Eight Maturity Model provides advice on how to implement the Essential Eight in a phased approach. It also assists organisations in self-assessing the maturity of their implementation.
Apr 30, 2019 - Java applications are widely deployed by organisations. As such, exploiting security vulnerabilities in the Java platform is particularly attractive to adversaries seeking unauthorised access to organisations’ networks.
Apr 30, 2019 - This publication provides guidance on the configuration of Windows Event Logging and Forwarding functionality to support the detection and remediation of cyber security incidents.
Apr 30, 2019 - This publication discusses high-level topics that executives should know about cyber security within their organisations.
Apr 30, 2019 - This publication provides guidance on how to securely configure the use of Virtual Private Networks between geographically-separated office buildings (site-to-site VPNs) and in support of remote workers (remote access VPNs).
Apr 30, 2019 - This publication provides guidance on how to secure the use of remote desktop clients for individuals working remotely or from home.
Apr 30, 2019 - This publication provides guidance on how to minimise the risk of using consumer-grade email services for business purposes.