Content written for

Individuals & families
Small & medium business
Large organisations & infrastructure
Government

There are many threats to the security of your systems, network, and data. These can range from technical threats like unauthorised cryptomining, to individual threats like malicious insiders.  

Unauthorised cryptomining is a way that cybercriminals can profit more from cryptocurrency transactions. Whereas malicious insiders are people who use their access to a system for personal gain or harm. 

Targeted attacks of this nature can result in massive financial and data loss. But it can be hard to know where to invest your time and money to reduce the risk.  

No matter the threat, there are a few things you can do to help prevent it from occurring. Learn more and follow our advice below to protect yourself or your business. 

Links to further information

Cryptomining

Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions. The miners are then rewarded with a small amount of cybercurrency.

Malicious insiders

Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems. It does not include well-meaning staff who accidentally put your cyber security at risk or spill data.

Small Business Cyber Security Guide

This guide has been developed to help small businesses protect themselves from the most common cyber security incidents.

Essential Eight

While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents  as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems.

Strategies to Mitigate Cyber Security Incidents

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to help cyber security professionals in all organisations mitigate cyber security incidents caused by various cyber threats. This guidance addresses targeted cyber intrusions (i.e. those executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious insiders, ‘business email compromise’, and industrial control systems.

Was this information helpful?

Thanks for your feedback!

Optional

Tell us why this information was helpful and we’ll work on making more pages like it