What is The Essential Eight and Why Should You Care?

The Australian Cyber Security Centre (ACSC) have published their recommendations that businesses should implement a prioritised list of strategies to mitigate cyber security incidents.

The Essential Eight is the ACSC’s recommended list of strategies.

The first step is to prevent malware delivery and execution, which can be done by implementing anti-spam and anti-virus software, as well as email filtering. Businesses should also limit the extent of cyber incidents by using firewalls and intrusion detection/prevention systems. The final step is the recovery of data and system availability, which can be done with backup and disaster recovery plans.

The ‘Essential Eight’ are:

  • Application Control
  • Patch Applications
  • Configure Microsoft Office Macro Settings
  • User Application Hardening
  • Restrict Administrative Privileges
  • Patch Operating Systems
  • Multi-factor Authentication
  • Regular Backups

Maintaining an effective cyber security posture requires ongoing effort and vigilance. The following are some of the key tasks that need to be undertaken on a regular basis:

Patch Management:

Operating systems, applications, and firmware should be kept up to date with the latest patches. This can be done through automated tools, or by having a dedicated resource responsible for patch management.

Anti-Spam and Anti-Virus:

These measures should be deployed and kept up to date to prevent malicious emails and files from being delivered to end-users.

Security Awareness Training:

All employees should be provided with security awareness training, which should include topics such as how to identify phishing emails, what to do if they suspect a cyber incident, and how to protect their personal information.

Penetration Testing:

Periodic penetration testing can help identify vulnerabilities in the organisation’s defences and recommend corrective actions.

One of the best ways to stay protected from cyber-attacks is to implement security best practices. One of the best resources for guidance is the Australian Government’s Essential Eight.

Unsure of where to start?

Dynamic Business Technologies can help your business review these best practices and work with you to implement them so your data is better protected from malicious actors.

For more information on Cyber Security Solutions and the Essential Eight, contact us today.

Related Posts