Back up your data, or you could be a deer in the headlights this holiday season 🚘🦌 You could lose your valuable data due to hardware failure, theft or a virus. Recovering this data can be expensive and sometimes impossible. Back it up regularly before it's too late. Use a cloud backup service, an external storage device, or both. You can also set up automatic backups for peace of mind. Learn more about backups 👉 https://lnkd.in/g2BuPh5A #12DaysOfCyber
Australian Signals Directorate
Computer and Network Security
Reveal their secrets. Protect our own.
About us
The Australian Cyber Security Centre (ACSC) is based within the Australian Signals Directorate (ASD). We provide advice and information about how to protect you, your family and your business online. We moderate our page to remove inappropriate posts. For more information about how we engage on social media, visit https://www.cyber.gov.au/social-terms This page is monitored during Australian business hours Monday to Friday between 9.00am and 5.00pm AEST. To report a crime or for general advice about local security and safety issues in your community, call your local police on 131444 or Crime Stoppers on 1800 333 000. For police, fire or ambulance response to a life threatening emergency or if a crime is in progress, call triple zero (000). If you wish to report suspicious activity, call the National Security Hotline on 1800 123 400.
- Website
-
http://www.cyber.gov.au
External link for Australian Signals Directorate
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Canberra
- Type
- Government Agency
Locations
-
Primary
Canberra, AU
Employees at Australian Signals Directorate
Updates
-
♪ You better watch out, you better not cry, better install updates, I’m telling you why! ♪ Cybercriminals can exploit your out-of-date software. Waiting for an update to finish can be inconvenient, but instead of postponing, install it. Updates are one of the strongest defences in your security toolkit. #12DaysOfCyber
-
We work in the slim area between the difficult and the impossible to defend Australia from global threats. Learn more 👉 https://lnkd.in/gPMn43Zh
-
🎵 On the 5th day of Cyber, my inbox gave to me… 🎵 5 golden tips for securing email accounts! Stop cybercriminals from committing identity theft or fraud with these protective measures: • Turn on multi-factor authentication. • Protect your domain names. • Set up email authentication measures. • Implement policies and procedures for staff to recognise suspicious emails. • Remain vigilant and informed. Protect yourself, your staff and your business from an email security incident before it's too late. For full guidance visit 👉 https://lnkd.in/gKzqTmEV #12DaysOfCyber
-
We have updated our advice on choosing secure and verifiable technologies to include additional insights about the threats posed to supply chains. The publication will help empower people working within IT and operational technology to demand technology manufacturers provide secure and verifiable technologies when procuring digital products and services. We have also developed supporting executive guidance for senior leaders to help them: • make better informed ICT procurement assessments and decisions • understand how secure-by-design can reduce risk in their organisation • implement and follow secure-by-design principles. This advice builds on our ‘Secure-by-Design Foundations’, which aims to help technology manufacturers and technology consumers adopt secure-by-design principles. Read the full publications 👉 https://lnkd.in/gSkRnZYD Both publications have been developed in collaboration with our international partners: • Cybersecurity and Infrastructure Security Agency • Communications Security Establishment Canada | Centre de la sécurité des télécommunications Canada • National Cyber Security Centre (NCSC-UK) • National Cyber Security Centre (NCSC-NZ) • Republic of Korea’s National Intelligence Service (NIS) + NIS’ National Cyber Security Center (NCSC) #SecureByDesign
-
Cyber resilience is about preventing and quickly recovering from cyber incidents. The latest #ASDCyberThreatReport covers the key elements of building a resilient network, including ICT supply chain management. Cyber supply chain related incidents comprised 9 per cent of all incidents responded to by ASD’s Australian Cyber Security Centre in FY2023-24. This included incidents from almost all sectors of the Australian economy. An organisation’s cyber security posture is only as strong as its weakest link. Organisations must assess and monitor all software and services they use and consider the cyber security of their providers. As we move into a more challenging threat environment, it is critical to create and choose products that are #SecureByDesign and secure-by-default. Products that are secure “out-of-the-box” are a powerful way to improve cyber security and build resilience. Learn more about cyber resilience in our 2023-24 Cyber Threat Report 👉 https://lnkd.in/gQ57uxZT
-
Sleigh all the way with MFA 🛷 (MFA) multi-factor authentication is an extra layer of protection for your accounts, like adding an extra deadbolt to your door. Even if someone has one key, they can’t get in without the second key. This can be a physical token, biometrics (such as fingerprints), an authenticator app, or verification code. Learn more 👉 https://lnkd.in/gPr_cXGw #12DaysOfCyber
-
Today we have released new guidance to provide telecommunications providers and network defenders of communications infrastructure with best practices to enhance their visibility and harden devices against PRC-affiliated and other malicious cyber actors. These actors are compromising networks of major global telecommunications providers, focusing on large US internet backbone routers. The compromises and malicious activity exploit exposed and vulnerable services, unpatched devices, and under-secured environments. Visibility is critical for network defenders, particularly when identifying and responding to incidents. We encourage telecommunications providers to have ‘high visibility’ networks – meaning network defenders have detailed insight into network traffic, user activity, and data flow. This allows network defenders to quickly identify threats, anomalous behavior, and vulnerabilities. Telecommunications providers should also harden devices as a preventative ‘defence-in-depth’ strategy. Reducing vulnerabilities and adopting secure configuration practices will limit potential entry points for cyber threat actors. Read more about what you can do 👉 https://lnkd.in/ggieMS-V Released with international partners: Cybersecurity and Infrastructure Security Agency Federal Bureau of Investigation (FBI) National Security Agency
-
It’s a tree-mendous time of year 🎄🎁 But cybercriminals never rest. A cyber attack can feel overwhelming. Our advice can help you identify and navigate attacks like ransomware and business email compromise. Get started with our ‘have you been hacked?’ tool 👉 https://lnkd.in/gqt8AyBw #12DaysOfCyber #CyberSecurity
-
Today on International Day of People with Disability, we celebrate our diverse and inclusive workplace. This year’s theme is “Amplifying the leadership of persons with disabilities for an inclusive and sustainable future.” We are committed to providing a diverse and inclusive workplace, mirroring the communities we serve. We believe accessibility and workplace flexibility enables our people of all abilities to do their best work. Individual difference is fundamental to our success. Learn more about Diversity & Inclusion at ASD 👉 https://lnkd.in/gneS5q9n