

What is the Essential 8?
The Essential 8 is a risk management framework, developed by the Australian Cyber Security Centre (ACSC) designed to help businesses tackle key security concerns. The Essential 8 is made up of eight crucial mitigation strategies.
Prevent Attacks

Application Whitelisting
Only allow approved applications to run on systems to prevent the execution of malicious or unauthorised software.

Patch Applications
Keep software applications up to date with the latest security patches to minimise vulnerabilities that could be exploited by attackers.

Configure Microsoft Office Macro Settings
Disable or restrict the use of Microsoft Office macros, which are commonly abused by attackers to deliver malware.

User Application Hardening
Configure web browsers and email clients to block or warn against potentially malicious websites, attachments, and scripts.
Recovers Data & System Availability

Restrict Administrative Privileges
Limit administrative privileges to only authorised users who need them, reducing the potential impact of compromised accounts.

Patch Operating Systems
Regularly apply security patches and updates to operating systems to address known vulnerabilities.

Multi-Factor Authentication (MFA)
Require the use of MFA for accessing sensitive systems and information to add an extra layer of security beyond passwords.
Limits Extent of Attacks

Daily Backups
Regularly back up important data and verify the integrity of backups to ensure critical information can be restored in the event of data loss or ransomware attacks
Essential Eight Maturity Level
The different maturity levels can also be used to provide a high-level indication of an organisation’s cyber security maturity.
Not aligned with the mitigation strategy (no compliance)
Partly aligned with the mitigation strategy (low compliance)
Mostly aligned with the mitigation strategy (medium compliance)
Fully aligned (highly protected) (high compliance)
Contact us
Level 7, 115 King William Street, Adelaide SA 5000