The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website that ‘it is imperative that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks.’
Specifically, it recommends businesses prioritises the following mitigation strategies:
Prompt patching of internet-facing software, operating systems and devices, and;
Use of multi-factor authentication across all remote access services
Advisory 2020-008
The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website that ‘it is imperative that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks.’
Specifically, it recommends businesses prioritises the following mitigation strategies:
Read the ACSC advisory statement here: https://www.cyber.gov.au/threats/advisory-2020-008-copy-paste-compromises-tactics-techniques-and-procedures-used-target-multiple-australian-networks
Related Posts:
Know your legal obligations
Do you know your legal and ethical obligations if your business experiences a cyber attack? A cyber attack can be
10 Ways to ensure your business is protected from the Log4j vulnerability
10 ways to ensure your business is protected from the Log4j vulnerability In December 2021, a vulnerability was discovered in
Australian Cyber Security Centre Warning
Australian Cyber Security Centre warning Australia may end up in cyber warfare “crossfire” according to a warning from the Australian
Cyber Security Policies and Procedures
#Cybersecurity is not just about software, tools, and systems. Having clear policies and procedures in place for your business can greatly
Recent Posts
Archives
Categories