Skip to main content
Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Created
Feb 2010
Updated
Feb 2017
This document replaces the previous Strategies to Mitigate Targeted Cyber Intrusions – Mitigation Details publication and directly complements the Strategies to Mitigate Cyber Security Incidents publication.

This information helps organisations mitigate cyber security incidents caused by targeted cyber intrusions, ransomware, malicious insiders, business email compromise and threats to industrial control systems.

Main sections:

· Threat overview

· Relevance of mitigation strategies to additional threats

· Overarching considerations when implementing mitigation strategies

· Mitigation strategies to prevent malware delivery and execution

· Mitigation strategies to limit the extent of cyber security incidents

· Mitigation strategies to detect cyber security incidents and respond

· Mitigation strategies to recover data and system availability

· Mitigation strategy specific to preventing malicious insiders

· Further information
Access Strategies to Mitigate Cyber Security Incidents – Mitigation Details

By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.