The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website that ‘it is imperative that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks.’
Specifically, it recommends businesses prioritises the following mitigation strategies:
Prompt patching of internet-facing software, operating systems and devices, and;
Use of multi-factor authentication across all remote access services
Uncertainty Creates Opportunity: How Cyber Criminals Exploit Change In times of uncertainty, businesses and individuals alike seek stability. Unfortunately, cyber
Advisory 2020-008
The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website that ‘it is imperative that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks.’
Specifically, it recommends businesses prioritises the following mitigation strategies:
Read the ACSC advisory statement here: https://www.cyber.gov.au/threats/advisory-2020-008-copy-paste-compromises-tactics-techniques-and-procedures-used-target-multiple-australian-networks
Related Posts:
Uncertainty Creates Opportunity: How Cyber Criminals Exploit Change
Uncertainty Creates Opportunity: How Cyber Criminals Exploit Change In times of uncertainty, businesses and individuals alike seek stability. Unfortunately, cyber
The Cascade Effect: How Small Cyber Security Mistakes Lead to Big Business Disruptions
The Cascade Effect: How Small Cyber Security Mistakes Lead to Big Business Disruptions Cyber security often feels like something businesses
The 10 most notorious cyber crime gangs in the world
The 10 Most Notorious Cyber Crime Gangs in 2025 Over the past 24 months, some familiar names have maintained their
Top 10 Insights from the Annual Cyber Threat Report 2023–2024: A Business Perspective
Top 10 Insights from the Annual Cyber Threat Report 2023–2024: A Business Perspective For the cyber enthusiast among us, the
Recent Posts
Categories