You can search for keywords to find pages that can help you e.g. scam
Contact us
Portal login
back to main menu
Learn about who we are and what we do.
Interactive tools and advice to boost your online safety.
Advice and information about how to protect yourself online.
Common online security risks and advice on what you can do to protect yourself.
Respond to cyber threats and take steps to protect yourself from further harm.
Resources for business and government agencies on cyber security.
Displaying results for Displaying 301 - 330 of 517 results.
Protecting against business email compromise Publication
Oct 6, 2021 Business email compromise is when malicious actors use email to abuse trust in business processes to scam organisations out of money or goods. Malicious actors can impersonate business representatives using similar names, domains or fraudulent logos as a legitimate organisation or by using compromised email accounts and pretending to be a trusted co-worker.
Identifying Cyber Supply Chain Risks Publication
May 22, 2023 This guidance has been developed to assist organisations in identifying risks associated with their use of suppliers, manufacturers, distributors and retailers (i.e. businesses that constitute their cyber supply chain).
Shop online securely this holiday season News
Nov 8, 2023 The holiday season is fast approaching and more Australian’s than ever are shopping online. The Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) are reminding Australians to be cyber secure when shopping online.
Restricting Microsoft Office Macros Publication
Nov 27, 2023 This publication has been developed to discuss approaches that can be applied by organisations to secure systems against malicious Microsoft Office macros while balancing both their business and security requirements.
Security tips for social media and messaging apps Publication
Jul 14, 2022 It's a great way to stay in touch and share content online. This guide covers the risks of using social media and messaging apps and what to look out for. It also covers ways to help keep accounts safe for business and personal use.
Guidelines for Cyber Security Roles Advice
Jun 13, 2024 This chapter of the Information Security Manual (ISM) provides guidance on cyber security roles.
Cyber Supply Chain Risk Management Publication
May 22, 2023 All organisations should consider cyber supply chain risk management. If a supplier, manufacturer, distributor or retailer (i.e. businesses that constitute a cyber supply chain) are involved in products or services used by an organisation, there will be a cyber supply chain risk originating from those businesses. Likewise, an organisation will transfer any cyber supply chain risk they hold to their customers.
Iranian cyber actors’ brute force and credential access activity compromises critical infrastructure Advisory
Oct 17, 2024 The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA) are releasing this joint Cybersecurity Advisory to warn network defenders on Iranian cyber actors’ compromising, frequently using brute force attacks, organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.
Critical vulnerabilities in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) Alert
Feb 1, 2024 The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) is aware of critical vulnerabilities affecting Ivanti Connect Secure (ICS), formerly known as Pulse Connect Secure, and Ivanti Policy Secure (IPS) gateways. The vulnerabilities affect all supported versions and configurations of the products. Customers should apply the mitigations made available by Ivanti and implement patches as they become available.
Defending Against the Malicious Use of the Tor Network Publication
Oct 6, 2021 The Tor network is a system that conceals a user’s IP address. It allows anonymous – and often malicious – communication. This guidance shares advice on how to detect and prevent traffic from the Tor network.
Contact us Service
Feb 25, 2023 Contact ASD's ACSC for general enquiries and media enquiries.
Security tips for online gaming Guidance
Mar 1, 2024 The world of online gaming is a popular target for scammers and cybercriminals. Gaming accounts can provide access to game licenses and linked payment methods making them highly valuable.
Joint advisory released for Managed Service Providers and Customers to mitigate cybersecurity risks News
May 12, 2022 The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has today joined with international cyber security agency partners, to warn Managed Service Providers (MSP) of pressing cyber risks and provide guidance on suitable mitigations for them and their customers.
ABC Radio interview with Head of ACSC News
Mar 31, 2021 Abigail Bradshaw CSC, Head of Australian Cyber Security Centre, interview with Fran Kelly on ABC Radio National, 31 March 2021.
Protect yourself from ransomware Guidance
A ransomware attack could block you from accessing your device or the information on it. Take some time to consider how a ransomware attack might affect you.
U.S., U.K., and Australia Issue Joint Cybersecurity Advisory News
Jul 28, 2021 Cyber Agencies Share Top Routinely Exploited Vulnerabilities
Personal Security Guides
Oct 1, 2021 This page includes a series of guides that you can use to protect yourself and be cyber secure.
System hardening
Dec 2, 2020 This page lists publications on the hardening of applications and ICT equipment.
Recognise and report scams
Feb 1, 2023 Scams are a common way that cybercriminals compromise accounts. Being alert to scam messages is a great way to protect yourself online.
Report and recover from identity theft Guidance
Nov 14, 2024 Know where to make a report and get help if someone has stolen your personal or business identity.
Programs
Nov 3, 2022 Find relevant cyber security programs
Spotting scams Guidance
Learn how to identify phishing messages to stay safe and protect your personal information.
Security tips for remote working Guidance
Jul 29, 2024 As an employee, you may be more at risk when working away from the office. Learn how to stay secure while working from home or remotely.
Advisory 2020-016: "Zerologon" - Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) Advisory
Sep 22, 2020 The ACSC recommends organisations immediately patch affected Microsoft Windows systems with the Microsoft August 2020 Security Updates, released 11/08/2020.
Planning for Post-Quantum Cryptography Publication
Aug 25, 2023 A cryptographically relevant quantum computer (CRQC) will render most contemporary public key cryptography insecure, thus making ubiquitous secure communications based on current public key cryptography technology infeasible. As the creation of a CRQC presents new cyber security risks, organisations are encouraged to consider anticipating future requirements and dependencies of vulnerable systems during the transition to post-quantum cryptography (PQC) standards.
IoT Secure-by-Design Guidance for Manufacturers Publication
Sep 21, 2023 This guidance has been produced for manufacturers in order to help them implement thirteen secure-by-design principles.
How to back up your files and devices Guidance
Nov 12, 2024 Important data such as your photos, documents and financial records can be lost in an instant, so back it up regularly before it's too late.
Security Configuration Guide – Apple iOS 14 Devices Publication
Oct 6, 2021 ASD has developed this guide to assist Australians to understand risks when deploying iOS 14 devices and the security requirements that need to be met to allow them to handle classified data.
Cloud Computing Security for Executives Publication
Jan 18, 2024 This publication is designed to provide executives from organisations looking to utilise cloud computing services an overview of the components that make up ‘cloud’ and help understand the security risks to be considered when using cloud computing.
Principles of operational technology cyber security Publication
Oct 2, 2024 Critical infrastructure organisations provide vital services, including supplying clean water, energy, and transportation, to the public. These organisations rely on operational technology (OT) to control and manage the physical equipment and processes that provide these critical services. As such, the continuity of vital services relies on critical infrastructure organisations ensuring the cybersecurity and safety of their OT.