Category Guidance Document Organisation Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) Type Standard Access Open Status Active Created Feb-10 Updated Feb-17 This document replaces the previous Strategies to Mitigate Targeted Cyber Intrusions – Mitigation Details publication and directly complements the Strategies to Mitigate Cyber Security Incidents publication.This information helps organisations mitigate cyber security incidents caused by targeted cyber intrusions, ransomware, malicious insiders, business email compromise and threats to industrial control systems.Main sections:· Threat overview· Relevance of mitigation strategies to additional threats· Overarching considerations when implementing mitigation strategies· Mitigation strategies to prevent malware delivery and execution· Mitigation strategies to limit the extent of cyber security incidents· Mitigation strategies to detect cyber security incidents and respond· Mitigation strategies to recover data and system availability· Mitigation strategy specific to preventing malicious insiders· Further information