Information Security Advice

Security Overview – Information Security Essentials

SECURITY OVERVIEW

This guide is an overview of security measures all organisations can do to best protect themselves from threats to the security of their business and customer information and systems.  It contains a list of security mitigations that organisations can use to assist in securing their data to prevent data breaches and other events that could damage their organisation financially, operationally and reputationally.  It is in no way a complete or exhaustive list, but includes some of the most important measures documented by the Australian Signals Directorate (ASD). They are ranked in an order from the most to the least important.

None of the below recommendations is an ultimate security solution in and of itself, but should be used in conjunction with other measures to take a defence-in-depth security stance.

A lot of these may be of limited value without the appropriate information security and acceptable use policies in place.  This guide discusses the ‘what’ and ‘why’ of security measures recommended for organisations.  For information on the ‘how’, please refer to the specific guide which provides information on implementing them.

CLICK HERE TO DOWNLOAD THIS SECMON1 INFORMATION SECURITY ESSENTIALS GUIDE

 

 

Christopher McNaughton

Recent Posts

Understanding the Australian economy through the lens of underwear and lipstick sales

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear…

12 months ago

New fraud costing Australian business millions annually

  If you work in the Finance Department of your company your email account might…

4 years ago

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68%…

4 years ago

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee,…

4 years ago

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to…

4 years ago

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was…

5 years ago