Menu
Contact Us

Essential Eight

Essential Eight

Securing and protecting your company often sounds vague and overwhelming, so many times it lands in the "too hard" basket. Australia realised this, so the Australian Cyber Security Centre (ACSC) broke it down, prioritised, and filtered cyber security into manageable chunks. The result was a list to get your security started - the Essential Eight. 

These are not all the important things a company should do. These are the Essentials. 

Multi-Factor Authentication (MFA)

Use a password and something else. Passwords are predictable and published online -  needing something else is what really stops attackers.

Application Control

Malware is just an app that harms you. Protect yourself by having a lists of apps you use and blocking everything else.

Restrict Admin Privileges (RAP)

Administrators controls everything, so attackers targets them. Restricting them and you restrict a potential attacker.

User Application Hardening

Secure applications can be misused by attackers, so they need protections or "hardening".

Configuring Microsoft Office Macro Settings

Macros in excel and Word are a key way attackers break in and stay in your company network.

Regular Backups

Backups are like insurance without a premium; even if the worst happens, you don't fall far.

Patch Operating Systems

An operating system is just another application. To keep it secure, it needs regular updating.

Patching Applications

Malware is just an app that harms you. Protect yourself by having a list of apps you use and blocking everything else. 

Are you ready?

Reach out to us today.


Here's how we do it

Security Centric has been implementing these controls for clients since their inception. We untangle cyber security by taking you through the whole process, start to finish, no matter what you have already.  

Requirement assessment

In this step, we assess what level of security is appropriate for your company on each E8 control.

Gap assessment

Get a sense of where the company currently is, so we have a list of things to do

Configuration

Where we click buttons and check boxes till no items on the list remain.

Rollout

Begin introducing the changes incrementally to real users. The pace is up to you.

Closeout

You get a summary of everything we've done, including where you were, where you are now, and how to maintain the security posture we bring you.

Implementing Essential 8: Lessons, Tips & Tricks

Watch our Implementing Essential 8 – Lessons, Trips & Tricks videos where we offer real-world examples and expert advice based on our extensive experience implementing the ACSC framework.

Get in touch with an expert

If you're ready for an Essential 8 uplift or want to discuss your requirements with a qualified expert, get in touch today.