The Australian Cyber Security Centre (ACSC) has produced this 42-page guide to help organisations mitigate cybersecurity incidents caused by various cyber threats. The document has been updated since 2010 to include some of the more common types of intrusions, including ransomware, malicious insider work, business email leaks, external cyber intrusions, and threats to industrial control systems. From pp 9-30, you will find some important strategies to stop cyber incidents from happening, and to ...

BPIR Categories

10.3.1 Establish systems security strategies & levels
10.3.2 Establish quality standards and controls.
10.3.3 Data availability in emergencies
14.3.2 Implement an improvement approach/method/technique
2.5.4 Identify and manage risks
8.1.3 Develop and administer governance system

Unlock this article and 10,000+ more

To get the most out of our extensive resources, please login or become a member below.