It's our 79th birthday! 🎂 Since our establishment as Defence Signals Bureau in 1947, ASD continues to adapt and innovate. We are committed to serving the nation and protecting its interests in an ever-changing world. Learn more about our history 👉 https://lnkd.in/gh6MBd8e
Australian Signals Directorate
Computer and Network Security
Reveal their secrets. Protect our own.
About us
The Australian Signals Directorate is an Australian Government intelligence agency responsible for foreign signals intelligence and cyber security, in support of the Australian Government and Australian Defence Force. For more information, visit asd.gov.au ASD’s Australian Cyber Security Centre (ACSC) is the Australian Government’s technical expert and voice of authority on cyber security. For cyber security advice and guidance, or to report a cybercrime, visit cyber.gov.au
- Website
-
https://www.cyber.gov.au
External link for Australian Signals Directorate
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Canberra
- Type
- Government Agency
Locations
-
Primary
Get directions
Canberra, AU
Employees at Australian Signals Directorate
Updates
-
❗ UPDATED ALERT ❗ We are aware of increased targeting of online code repositories. This alert is relevant to all Australians and organisations, including organisation leaders, that maintain online code repositories, publish public software packages, or use third party packages or software sourced from online repositories. In particular, the compromise of trusted software packages presents a significant and ongoing risk for organisations. These packages are often widely used and embedded as dependencies within other software, increasing the potential impact when vulnerabilities are identified. To manage this risk effectively, organisations must be able to rapidly identify which software packages - and which versions - are installed across their environments. This information should be accurately collected, maintained, and readily accessible. Read the updated alert 👉 https://lnkd.in/gv-ugJJ8
-
-
It’s World Backup Day! Here are our top tips to avoid losing important files. 👉 Back up your data, applications and settings at a frequency that works best for you or your business continuity. 👉 Store backups in a secure location, separate from your primary systems. 👉 Test backups as part of disaster recovery exercises.
-
-
Before purchasing any IoT device, security should be part of the decision, not an afterthought. Key considerations to reduce cyber risk: • Secure by design: Does the device support strong authentication, enforce changing default passwords, allow use of strong passwords and receive regular software updates? • Data transparency: Understand what data the device collects, how the data is stored, and who it’s shared with? • Longevity and support: Does the vendor commit to long term security updates and maintenance of its apps/cloud services? • Interconnected risk: Remember one insecure device can expose your entire home or workplace network. Taking a moment to assess these factors is an important step to ensuring your device doesn’t have or cause unmanageable vulnerabilities. Download our guide on securing your IoT devices 👉 https://lnkd.in/gaPkjrB5
-
-
Are you finishing school, studying at TAFE, currently at uni or interested in a career change? Applications for our 2027 Cadetship and Apprenticeship Programs are now open! Want to see how our Cadets and Apprentices make an impact from day one? Read on to discover how they’re part of something bigger at ASD. Start a career doing meaningful work that has real-world impact at ASD. Apply now: https://lnkd.in/gijAkSNG
-
-
How old is your IT? Continuing to rely on legacy technology can significantly increase the financial and operational impact of a cyber security incident. ➤ Malicious actors may not only compromise your legacy tech, but also use it to gain access to more modern systems that your organisation relies on. Keeping legacy tech therefore increases the risk of a cyber incident. It can also make any incident that does occur much more impactful. ➤ There are significant business risks associated with legacy tech. For example, it can increase the likelihood that your organisation will have systems taken offline, service delivery disrupted, data destroyed or leaked, and public confidence lost. ➤ Remediating a cyber incident involving legacy tech, and managing its consequences, may have high financial costs. It is always less costly to mitigate the risks of legacy tech before a major cyber incident occurs. ➤ Legacy tech becomes more difficult and expensive to replace over time, as it becomes further embedded in the organisation and the skills needed to manage it become rarer. Replacing legacy tech may be even harder when staff with the technical skills to support it leave your organisation. Take action now. Learn how to manage the risks at our website 👉 https://lnkd.in/gZ2Ggb2s
-
-
We’ve released new guidance to help secure Low Earth Orbit (LEO) satellite communication (SATCOM) services. LEO SATCOM services are expanding quickly, delivering fast connectivity across Australia. This growth brings new cyber security risks. Alongside the Australian Space Agency, Communications Security Establishment Canada | Centre de la sécurité des télécommunications Canada, the National Security Agency and the National Cyber Security Centre, we have developed guidance to help organisations understand these risks and make informed decisions when procuring or using LEO SATCOM services. The guidance outlines risks and mitigations across space, ground and user segments. It also highlights broader risks relating to communication links, supply chains and data management. Organisations can also use the set of key questions when engaging with LEO SATCOM providers to help assess their security measures and resiliency. If your organisation relies on LEO SATCOMs for operations, remote connectivity or critical services, now is the time to uplift your cyber security 👉 https://lnkd.in/gzSqRvFc
-
-
Happy #NationalPuppyDay from #CyberPups 🐶 Since starting their internships, Patch and Cookie have both come a long way. From setting secure passphrases to learning REDSPICE is not food. They are still working on not chasing their tails in the middle of meetings … progress not paw-fection.
-