In general, we recommend:

  • patching applications & operating systems

  • limiting the number of users with administrative privileges

  • using multifactor authentication for critical systems

  • using strong passwords/passphrases.

In addition, we advise businesses to use the top 35 strategies for mitigating cyber intrusions released by the Australian Signals Directorate. While the first four strategies have the potential to mitigate up to 85% of targeted threats, this information does have to be tailored to suit the needs and operating environment of each business.



For detailed and time sensitive information on action that can be taken in regard to vulnerabilities and/or mitigation strategies – eg a security flaw or vulnerability in a particular product, please see advisories.



For advice on how to better protect information and/or systems, please see guidance.