
Acceptable Usage of IT Systems and Data Policy
This Acceptable Usage of IT Systems and Data Policy template is based upon the ASD Essential 8, NIST CSF 2.0 (2024) and ISO 27001:2022 – Information Security Management Systems (ISMS).

This Acceptable Usage of IT Systems and Data Policy template is based upon the ASD Essential 8, NIST CSF 2.0 (2024) and ISO 27001:2022 – Information Security Management Systems (ISMS).

Developing comprehensive security policies can be difficult. Use the IBRS service to quickly generate a tailored policy template, ready for customisation.

MDM solutions enhance security and compliance while streamlining device management and improving productivity.

Accenture has announced an agreement to acquire Australian cyber security leader CyberCX in a landmark deal reportedly valued at over $1 billion.

Enhancing cyber resilience hinges on evolving cyber security awareness programs to actively measure and influence human behaviour and organisational culture, fostering a shared responsibility beyond the IT department through visible metrics and incentivisation

The Australian Signals Directorate’s (ASD) Foundations for Modern Defensible Architecture[1] provides a strategic framework that bridges tactical security controls with comprehensive guidance, providing Australian organisations with the architectural principles needed to build inherently resilient systems in an era where cyber breaches are inevitable.

Microsoft’s new AI security tools, like Entra Agent ID, aim to embed security into AI agent development, tackling risks like prompt injection and data poisoning head-on.

Trump 2.0’s cyber policy changes diverge from Australia’s, challenging harmonisation and cooperation but potentially boosting Australia’s regional leadership.

Australia’s new Cyber Security Act, effective May 30, 2025, mandates 72-hour incident and ransomware payment reporting for many organisations, shifting cyber security from operational to compliance.