Sorry, you need to enable JavaScript to visit this website.
Skip to main content


Virtual Private Networks

Using Virtual Private Networks

Apr 30, 2019 - This publication provides guidance on how to securely configure the use of Virtual Private Networks between geographically-separated office buildings (site-to-site VPNs) and in support of remote workers (remote access VPNs).
Mitigating security incidents

How to mitigate cyber security incidents

Jul 1, 2018 - Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience activities can be an overwhelming task. To address this issue, we have compiled a list of mitigation strategies that organisations can use as starting points to improve their cyber resilience and technical details of these strategies. While no single mitigation strategy is guaranteed to prevent cyber security incidents, we haveā€¦
VPN Filter Attack

Protect your devices against VPNFilter malware

May 25, 2018 - Australian users need to be aware of VPNFilter malware, which is known to affect networking equipment including Linksys, MikroTik, Netgear and TP-Link, as well as QNAP network-attached storage (NAS) devices. Once a malicious actor compromises a device using VPNFilter malware, they are able to collect network traffic (including website credentials) traversing the device. Importantly, the malware can also be used to disable the device.

Wi-Fi protocol vulnerabilities

Oct 17, 2017 - Researchers have identified security vulnerabilities in the Wi-Fi WPA2 protocol which may make all Wi-Fi enabled devices, such as mobiles, computers and internet routers, vulnerable to malicious actors stealing sensitive information such as credit card numbers, passwords and emails. Malicious actors within range of an affected Wi-Fi device may be able to exploit this vulnerability. At this stage there are no reports of this vulnerability being exploited in Australia.