The Essential 8 Cybersecurity Model

The Essential 8 Cybersecurity Model

4 simple changes in your IT strategy can mitigate 85% of security risks.

They are the “Top 4 Strategies to Mitigate Targeted Cyber Intrusions” as initially recommended by the Australian Government’s Australian Signals Directorate (ASD).

  • Whitelist applications
  • Patch applications
  • Patch Operating systems
  • Minimise administrative privileges

As soon as we bring computers under management, we quickly, easily and transparently implement 3 of these recommendations. Application whitelisting requires a bit more consultation and planning but for most businesses it’s not too complicated.

Since the publication of the ‘4 mitigations’ above, the ASD expanded the list to “The Essential 8”.

To the 4 recommendations above they added:

  • Configure Microsoft Office macro settings
  • User application hardening
  • Multi-factor authentication (MFA)
  • Daily data backup

No business should be without a reliable, monitored, regularly tested backup strategy, which suits their recovery point and recovery time constraints.

The use of multi-factor authentication blocks a large proportion of attack vectors and is now an absolute must.

Every organisation’s usability requirements are different but the majority of the Essential Eight can be implemented without significant disruption or cost. Working with the organisation’s individual requirements, we take planned steps towards implementing all the recommendations.

Baw Baw IT has standardised implementation of the Essential 8. Combined with enterprise-grade endpoint antivirus, perimeter security and suitable user awareness training, we virtually eliminate the risk of a costly cybersecurity incident.

See https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model for more info about the Essential 8.

Help Others