Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Remote access

Two Factor Password

Never let a stranger remotely access your devices

May 23, 2019 - The ACSC regularly receives reports from businesses and members of the public about remote access scams. Most of these reports are from people whose devices have been remotely accessed by scammers pretending to be from IT companies, telecommunications companies, banks or even from the ACSC, who attempt to access people’s bank accounts, email, and social media channels, usually changing the passwords and locking users out of their accounts.

Using Remote Desktop Clients

Apr 30, 2019 - Remote access solutions are increasingly being used to access organisations’ systems. One common method of enabling remote access is to use a remote desktop client. This document provides guidance on security risks associated with the use of remote desktop clients.

ICS Remote Access Protocol

Nov 28, 2017 - External parties may need to connect remotely to critical infrastructure control networks. This is to allow manufacturers of equipment the ability to maintain the equipment when a fault is experienced that cannot be fixed in the required timeframe. Such access to external parties will only occur in extraordinary circumstances, and will only be given at critical times where access is required to maintain the quality of everyday life in Australia.