Latest publications 28 Oct 2024 Essential Eight Maturity Model FAQ This publication provides answers to frequency asked questions on how to implement the Essential Eight. 25 Oct 2024 Safe software deployment: how software manufacturers can ensure reliability for customers It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements. 03 Oct 2024 Mitigation strategies for edge devices: executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 16 Dec 2022 Small Business Cloud Security Guides: Technical Example - Application Control Application control restricts the ability of an application to run or install on a device. Application control makes it harder for users to intentionally or unintentionally install unwanted or malicious software. 16 Dec 2022 Small Business Cloud Security Guides: Technical Example - Configure Macro Settings Configuring macro settings protects an organisation’s systems from malicious macros. Macros are powerful tools. They were introduced to improve productivity however their functionality can also be used by cyber criminals to compromise a user’s system. 16 Dec 2022 Small Business Cloud Security Guides: Technical Example - Multi-Factor Authentication Multi-factor authentication (MFA) makes it harder for adversaries to use compromised user credentials to access an organisation’s systems. It is one of the most important cyber security measures an organisation can implement. 16 Dec 2022 Small Business Cloud Security Guides: Technical Example - Patch Operating Systems Patching operating systems is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to their devices and sensitive information. Patches improve the security of operating systems by fixing known vulnerabilities. 16 Dec 2022 Small Business Cloud Security Guides: Technical Example - Regular Backups Implementing regular backups will assist your organisation to recover and maintain its operations in the event of a cyber incident, for example, a ransomware attack. 16 Dec 2022 Small Business Cloud Security Guides: Technical Example - Restrict Administrative Privileges Privileged account credentials are prized by cybercriminals because they provide extensive access to high value assets within a network. Restricting privileged access to only users with a demonstrated business need is essential to protecting your environment. Pagination Previous page ‹‹ Page 10 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats