cyber daily logo

Breaking news and updates daily. Subscribe to our Newsletter

Breaking news and updates daily. Subscribe to our Newsletter X facebook linkedin Instagram Instagram

3 things you should know about the Australian Cyber Security Centre

With the steady rise of cyber threats and attacks, governments around the globe are taking proactive measures to safeguard their nations’ digital infrastructure.

user icon David Hollingworth
Thu, 08 Jun 2023
3 things you should know about the Australian Cyber Security Centre
expand image

Australia is no exception, and at the forefront of its efforts is the Australian Cyber Security Centre (ACSC).

Let’s take a closer look at three key things you need to know about this vital institution.

1. Role and responsibilities

The Australian Cyber Security Centre, established in 2014, serves as a hub for cyber security collaboration and information sharing. Its primary role is to protect Australian government networks, critical infrastructure, and private sector organisations from cyber threats. The ACSC operates under the umbrella of the Australian Signals Directorate (ASD) and works closely with law enforcement agencies, intelligence organisations, and international partners to counter cyber threats effectively.

The centre offers a range of services, including cyber threat intelligence, incident response, as well as advice on best practices to enhance cyber security resilience. It also provides guidance and assistance to organisations in identifying and addressing vulnerabilities, promoting cyber security awareness and education, and conducting assessments to strengthen their overall cyber security posture.

2. The Essential Eight

The ACSC follows a comprehensive approach, known as the “Essential Eight”, to strengthen Australia’s cyber defences. These eight key areas are:

  1. Application whitelisting: Only allowing approved software to run, reducing the risk of malicious programs.
  2. Patching applications: Keeping software up to date with the latest patches to address vulnerabilities.
  3. Configuring Microsoft Office macro settings: Restricting the use of macros in Microsoft Office to prevent potential malware attacks.
  4. User application hardening: Configuring web browsers and other applications to minimise potential security risks.
  5. Restricting administrative privileges: Limiting administrative access to critical systems, reducing the impact of unauthorised activities.
  6. Patching operating systems: Regularly updating operating systems with security patches to mitigate known vulnerabilities.
  7. Multifactor authentication: Implementing an additional layer of security by requiring multiple forms of verification for user authentication.
  8. Daily backups: Regularly backing up important data to minimise the impact of data loss from incidents such as ransomware attacks.

3. Collaboration and partnerships

The ACSC recognises that cyber security is a collective effort and places great importance on collaboration and partnerships. It actively works with various stakeholders, including government agencies, critical infrastructure operators, academia, and industry partners, to share information, intelligence, and expertise. This approach enables a better understanding of emerging threats, effective response planning, and the development of innovative cyber security solutions.

In addition, the ACSC maintains strong relationships with international cyber security organisations, participating in joint initiatives and information exchanges. These partnerships ensure that Australia remains well-connected to global developments and can respond effectively to threats that transcend national borders.

By understanding the role and responsibilities of the ACSC and its dedication to cyber security, organisations and individuals can actively contribute to a safer digital environment in Australia.

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

cd intro podcast

Introducing Cyber Daily, the new name for Cyber Security Connect

Click here to learn all about it
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.