Regularly backing up your systems is cybersecurity 101. It is vital but still too many businesses fail to back up at least important information on a
The Essential Eight – #7 Multifactor authentication is crucial
Passwords alone are not enough to mitigate the risks to your online security. Multifactor authentication of a user’s identity is a crucial layer of
The Essential Eight – #6 Patch operating systems for better security
Are you patching your operating systems? If the answer is yes, how long does it take for you to get around to it? The longer it takes you, the more
The Essential Eight – #5 Restrict administrative privileges to those who need them
It is important not to overlook the Essential Eight strategy for restricting administrative privileges. Not everyone in your organisation has a need
The Essential Eight – #4 Do your user’s applications need hardening?
All too often we hit next, next, next without any thought about what we are doing when installing applications. The result is downloading apps in
The Essential Eight – #3 Configure Microsoft Office macro settings for better security
Do you use macros in your business? You probably do without even knowing. Many documents have macros embedded in them. Files types such as pptm, docm
The Essential Eight – #2 Patch Up Application Vulnerabilities
Allowing vulnerabilities into your network degrades cyber security effectiveness. These expose you to malicious code worming its way in which can
The Essential Eight – #1 Implementing Application Control is essential
Organisations rely heavily on different applications to do business. This puts them at high risk of security breaches when using web, cloud and
What is the Essential Eight Maturity Model?
The Essential Eight Maturity Model is a set of strategies devised by the Australian Cyber Security Centre (ACSC). Its purpose is to help businesses