Australian Signals Directorate

Australian Signals Directorate

Computer and Network Security

Reveal their secrets. Protect our own.

About us

The Australian Cyber Security Centre (ACSC) is based within the Australian Signals Directorate (ASD). We provide advice and information about how to protect you, your family and your business online. We moderate our page to remove inappropriate posts. For more information about how we engage on social media, visit https://www.cyber.gov.au/social-terms This page is monitored during Australian business hours Monday to Friday between 9.00am and 5.00pm AEST. To report a crime or for general advice about local security and safety issues in your community, call your local police on 131444 or Crime Stoppers on 1800 333 000. For police, fire or ambulance response to a life threatening emergency or if a crime is in progress, call triple zero (000). If you wish to report suspicious activity, call the National Security Hotline on 1800 123 400.

Website
http://www.cyber.gov.au
Industry
Computer and Network Security
Company size
201-500 employees
Headquarters
Canberra
Type
Government Agency

Locations

Employees at Australian Signals Directorate

Updates

  • 🎵 On the 5th day of Cyber, my inbox gave to me… 🎵 5 golden tips for securing email accounts! Stop cybercriminals from committing identity theft or fraud with these protective measures: • Turn on multi-factor authentication. • Protect your domain names. • Set up email authentication measures. • Implement policies and procedures for staff to recognise suspicious emails. • Remain vigilant and informed. Protect yourself, your staff and your business from an email security incident before it's too late. For full guidance visit 👉 https://lnkd.in/gKzqTmEV #12DaysOfCyber

  • We have updated our advice on choosing secure and verifiable technologies to include additional insights about the threats posed to supply chains. The publication will help empower people working within IT and operational technology to demand technology manufacturers provide secure and verifiable technologies when procuring digital products and services. We have also developed supporting executive guidance for senior leaders to help them: • make better informed ICT procurement assessments and decisions • understand how secure-by-design can reduce risk in their organisation • implement and follow secure-by-design principles. This advice builds on our ‘Secure-by-Design Foundations’, which aims to help technology manufacturers and technology consumers adopt secure-by-design principles. Read the full publications 👉 https://lnkd.in/gSkRnZYD Both publications have been developed in collaboration with our international partners: • Cybersecurity and Infrastructure Security AgencyCommunications Security Establishment Canada | Centre de la sécurité des télécommunications CanadaNational Cyber Security Centre (NCSC-UK) • National Cyber Security Centre (NCSC-NZ) • Republic of Korea’s National Intelligence Service (NIS) + NIS’ National Cyber Security Center (NCSC) #SecureByDesign

    • No alternative text description for this image
  • Cyber resilience is about preventing and quickly recovering from cyber incidents. The latest #ASDCyberThreatReport covers the key elements of building a resilient network, including ICT supply chain management. Cyber supply chain related incidents comprised 9 per cent of all incidents responded to by ASD’s Australian Cyber Security Centre in FY2023-24. This included incidents from almost all sectors of the Australian economy. An organisation’s cyber security posture is only as strong as its weakest link. Organisations must assess and monitor all software and services they use and consider the cyber security of their providers. As we move into a more challenging threat environment, it is critical to create and choose products that are #SecureByDesign and secure-by-default. Products that are secure “out-of-the-box” are a powerful way to improve cyber security and build resilience. Learn more about cyber resilience in our 2023-24 Cyber Threat Report 👉 https://lnkd.in/gQ57uxZT

    • No alternative text description for this image
  • Sleigh all the way with MFA 🛷 (MFA) multi-factor authentication is an extra layer of protection for your accounts, like adding an extra deadbolt to your door. Even if someone has one key, they can’t get in without the second key. This can be a physical token, biometrics (such as fingerprints), an authenticator app, or verification code. Learn more 👉 https://lnkd.in/gPr_cXGw #12DaysOfCyber

    • No alternative text description for this image
  • Today we have released new guidance to provide telecommunications providers and network defenders of communications infrastructure with best practices to enhance their visibility and harden devices against PRC-affiliated and other malicious cyber actors. These actors are compromising networks of major global telecommunications providers, focusing on large US internet backbone routers. The compromises and malicious activity exploit exposed and vulnerable services, unpatched devices, and under-secured environments. Visibility is critical for network defenders, particularly when identifying and responding to incidents. We encourage telecommunications providers to have ‘high visibility’ networks – meaning network defenders have detailed insight into network traffic, user activity, and data flow. This allows network defenders to quickly identify threats, anomalous behavior, and vulnerabilities. Telecommunications providers should also harden devices as a preventative ‘defence-in-depth’ strategy. Reducing vulnerabilities and adopting secure configuration practices will limit potential entry points for cyber threat actors. Read more about what you can do 👉 https://lnkd.in/ggieMS-V Released with international partners: Cybersecurity and Infrastructure Security Agency Federal Bureau of Investigation (FBI) National Security Agency

    • No alternative text description for this image
  • Today on International Day of People with Disability, we celebrate our diverse and inclusive workplace. This year’s theme is “Amplifying the leadership of persons with disabilities for an inclusive and sustainable future.” We are committed to providing a diverse and inclusive workplace, mirroring the communities we serve. We believe accessibility and workplace flexibility enables our people of all abilities to do their best work. Individual difference is fundamental to our success. Learn more about Diversity & Inclusion at ASD 👉 https://lnkd.in/gneS5q9n

    • No alternative text description for this image
  • The latest #ASDCyberThreatReport reveals that business email compromise (BEC) continues to be one of the top cybercrimes reported by Australian businesses, with an average loss of $55,000. BEC is where cybercriminals use email to impersonate business representatives. The goal of these attacks is usually to trick victims into sending funds to a bank account operated by the scammer. The best defence against email attacks is training and awareness for your employees: • Ensure email accounts are protected with multi-factor authentication. • Be cautious of emails asking to change bank details or transfer funds, especially if urgent or overdue. • Confirm that emails are legitimate. When you receive emails like this, the most effective mitigation is to call the sender to check. The contact details sent could be fraudulent, so call on a number known to be correct. Learn more in the full 2023-24 report 👉 https://lnkd.in/gxrgQwWj

    • No alternative text description for this image
  • There's no gift quite like a passphrase 🎁 Strong passphrases act as a barrier between cybercriminals and your valuable information. A passphrase is easy to remember but hard to crack. 🍀 Use 4 or more words – the longer the better. 💫 Choose a random mix of unrelated words. ✨ Create a unique passphrase for every important account. Finish the year with improved cyber security. Learn more 👉 https://lnkd.in/gRyxS8A5 #12DaysOfCyber

    • No alternative text description for this image

Similar pages

Browse jobs