Facilitation FOCUS

Page 2

2

Cybersecurity Measures to Protect Against Potential Critical Threats Every organization in Australia is a possible target and is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past few years, cyber incidents have impacted many companies and many government departments, non-profits, charities  and other organizations, large and small, across multiple sectors of the economy. Most recently, public and private entities in Australia, USA, Great  Britain and elsewhere, have suffered a series of malicious cyber incidents, including website defacement and private sector  reports of potentially destructive malware on their systems that could result in severe harm to critical functions.

administrative access requires multi-factor authentication. Ensure that software is up to date, prioritizing updates that address known exploited vulnerabilities identified by the Australian Cyber Security Centre (ACSC). Confirm that the organization’s IT personnel have disabled all ports and protocols that are not essential for business purposes. If the organization is using cloud services, ensure that IT personnel have reviewed and implemented strong controls outlined in ACSC's guidance.

Take steps to quickly detect a The identification of destructive potential intrusion malware is particularly alarming given that similar malware has  Ensure that cybersecurity/IT personnel are focused on been deployed in the past to cause identifying and quickly assessing significant, widespread damage to any unexpected or unusual critical infrastructure. network behavior. Enable logging in order to better This article is intended to ensure investigate issues or events. that every organization, in every small business in Australia is  Confirm that the organization's entire network is protected by aware of critical cyber risks and antivirus/antimalware software take urgent steps to reduce the and that signatures in these tools likelihood and impact of a are updated. potentially damaging compromise.  If your firm is working with international organizations, take All organizations, regardless of extra care to monitor, inspect, sector or size, should immediately and isolate traffic from those implement the steps outlined organizations; closely review below. access controls for that traffic. Reduce the likelihood of a Ensure that the organization is damaging cyber intrusion prepared to respond if an  Validate that all remote access intrusion occurs to the organization’s network and privileged or  Designate a crisis-response team Ph: +61 0410 082 201

Email: info@aibef.org.au

with main points of contact for a suspected cybersecurity incident and roles/ responsibilities within the organization, including technology, communications, legal and business continuity. Assure availability of key personnel; identify means to provide surge support for responding to an incident. Conduct a tabletop exercise to ensure that all participants understand their roles during an incident.

Maximize the organization's resilience to a destructive cyber incident  Test backup procedures to ensure that critical data can be rapidly restored if the organization is impacted by ransomware or a destructive cyberattack; ensure that backups are isolated from network connections.  If using industrial control systems or operational technology, conduct a test of manual controls to ensure that critical functions remain operable if the organization’s network is unavailable or untrusted. By implementing the steps above, all organizations can make nearterm progress toward improving cybersecurity and resilience. In addition the ACSC provides a comprehensive step-by-step guide detailing basic cyber security instructions for specific software, applications and devices. 

Web: www.aibef.org.au


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.