<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2114085292224199&amp;ev=PageView&amp;noscript=1">

6 Additional Ways You Can Protect Your Organisation During a Cyber Attack

Posted by Olivia Scullard - 19 June, 2020



As you’re already aware, several entities of Australian government and some organisations across a variety of industries are currently under a state sponsored attack by a foreign government.

Although this is a large scale attack, we want to assure you that this is not an uncommon event and you have reason to remain calm. As Information Security specialists with over 20 years of experience, we remind all our clients to ensure that basic security processes are in place.

The Australian Cyber Security Centre (ACSC) has released an advisory campaign containing recommended mitigations. The ACSC recommends swift patching of all internet-facing infrastructure and operating systems, as well as the use of multi-factor authentication as prioritised measures of mitigation.

In order to take comprehensive precautions, we recommend that all organisations align their security operations with the entirety of ASD Essential 8 controls.

In addition to the ASD 8 framework, we suggest the following additional measures of protection:

  1. Ensure your firewalls rules are secure and block any untrusted connections: Make sure firewall rules are up to date and blocking all non-essential traffic. As an added layer of protection, ensure there are no legacy rules opening up access to your internal network.
  2. Ensure your email protection platform is configured in accordance with best practices and has all necessary features turned on to detect phishing emails.
  3. Ensure all your employees are aware of the attack and are vigilant when clicking links in emails they are receiving.
  4. Implement active Intrusion Prevention Systems (IPS) feature in your firewalls: If possible, deploy IPS on critical internal networks to identify any suspicious or malicious activity.
  5. Make sure you are collecting all important logs from critical systems: In the case that Incident Response is required, there should be sufficient data to analyse and contain the attack.
  6. Ensure your cloud environments are set-up securely by running cloud configuration audits.

If you need guidance regarding these processes, please do not hesitate to contact the Content Security team: https://www.contentsecurity.com.au/contact


Recent Posts

How to Achieve Strong IT Security: A Refresher on the NIST Framework

read more

What the Overhaul of Tertiary Education Fees Could Mean for the Australian Cybersecurity Industry

read more

5 Steps to Creating a Cybersecurity Policy that Supports Business Success

read more