Often we talk about specific products or tools that can help protect our assets, but we rarely talk about the best strategies to implement in a mature cybersecurity environment.
The United States is often seen as the forefront of cybersecurity defense but our Australian friends have created and implemented some very good techniques and strategies for defense. The below blog details the mitigation and detection strategies.
https://www.cyber.gov.au/publications/strategies-to-mitigate-cyber-security-incidents
The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies to help technical cybersecurity professionals in all organisations mitigate cybersecurity incidents. This guidance addresses targeted cyber intrusions (e.g. executed by advanced persistent threats such as foreign intelligence services), ransomware and external adversaries with destructive intent, malicious insiders, ‘business email compromise’ and industrial control systems.
As always, please contact us with any technical questions.
Cody Jackson
Cody's engineering networking and security expertise broaden AQUILA’s ability to service organizations. Before AQUILA, Cody was a Computer and Information Security Specialist on the Los Alamos National Laboratory Security Architecture and Application Development team. He also worked as an IT Specialist at Western New Mexico University.
Cody earned a Master of Science in Information Systems & Assurance from UNM. He received an MBA and a B.S. in History and Math from Western New Mexico University.
Latest posts by Cody Jackson (see all)
- Cybersecurity Defense Tips from Australia - June 5, 2019
- Checkpoint On The WhatsApp Hack - May 15, 2019
- What Is Splunk – A Deep Dive - April 10, 2019