The Essential Eight - Technicalities

The Essential Eight


While it may sound a little boring, and it may never be required, the ‘Essential Eight’ is something that needs to be on every business’ radar.

In today’s fast-paced and interconnected world, cyber threats are becoming increasingly sophisticated and frequent. Organizations are at constant risk of losing critical data or being disrupted by cyber attacks. To mitigate these risks, the Australian Cyber Security Centre (ACSC) has developed a framework called the Essential Eight. This framework provides a set of mitigation strategies that organizations can implement to improve their cyber resilience and protect themselves from cyber attacks.

The Essential Eight is a comprehensive set of cybersecurity controls that the ACSC has identified as essential for protecting against a range of cyber threats. The framework is designed to be flexible and scalable, allowing organizations of all sizes and types to adopt it. The eight strategies are as follows:

  1. Application whitelisting: This strategy involves creating a list of approved applications that are allowed to run on an organization’s systems. It prevents unauthorized or malicious software from running on the network.
  2. Patching applications: This strategy involves ensuring that all software applications are up to date with the latest security patches. It reduces the risk of cyber attacks exploiting known vulnerabilities in outdated software.
  3. Configuring Microsoft Office macros: This strategy involves disabling or limiting the use of Microsoft Office macros. Macros are a common tool used by cybercriminals to deliver malware, so disabling them can reduce the risk of infection.
  4. User application hardening: This strategy involves configuring web browsers and other user applications to limit their capabilities and reduce their attack surface.
  5. Restricting administrative privileges: This strategy involves limiting the number of users who have administrative privileges on an organization’s systems. It reduces the risk of a cyber attack being able to compromise critical systems or steal sensitive data.
  6. Patching operating systems: This strategy involves ensuring that all operating systems are up to date with the latest security patches. It reduces the risk of cyber attacks exploiting known vulnerabilities in outdated operating systems.
  7. Multi-factor authentication: This strategy involves requiring users to provide additional authentication factors, such as a code sent to their mobile device, in addition to their username and password. It reduces the risk of unauthorized access to critical systems.
  8. Daily backups: This strategy involves regularly backing up critical data to ensure that it can be restored in the event of a cyber attack or data loss. It reduces the risk of data loss and disruption to business operations.

By implementing the Essential Eight, organisations can significantly improve their cyber resilience and reduce the risk of cyber attacks. The framework provides a set of practical and effective strategies that can be tailored to meet the specific needs of each organization.

In addition to the Essential Eight, the ACSC also provides guidance on how to implement each strategy, as well as advice on how to monitor and maintain the effectiveness of the controls. The ACSC recommends that organisations regularly review their cybersecurity posture and make adjustments as needed to ensure that they remain protected against the latest cyber threats.

The Essential Eight is a vital framework for organizations looking to improve their cybersecurity resilience. By implementing these eight strategies, organizations can significantly reduce their risk of cyber attacks and protect themselves against a range of threats. The ACSC provides comprehensive guidance on how to implement the strategies, making it a practical and effective framework for organizations of all sizes and types.

At Technicalities, we are very familiar with the Essential Eight and the tools that can be put in place to best manage any number or all of these recommendations.

Don’t hesitate to get in touch for a chat, or an audit to determine the best course of action.

Other news & articles

Why choose Technicalities as your MSP?

Why choose Technicalities as your MSP? Technicalities is a Managed Service Provider (MSP) that provides a range of IT services to organisations of all sizes. With years of experience in the industry, Technicalities has established itself as a market leader, and reliable MSP. Technicalities is a great MSP for many reasons. We have technical expertise,…

Protect Yourself Online – A recommendation for safer browsing

Protect Yourself Online – A recommendation for safer browsing In today’s digital age, we are more connected than ever. The internet is an invaluable tool for staying in touch with loved ones, learning, socialising, playing games or life management such as banking. However it also exposes us to online threats such as identity theft, scams…

Cyber Security Review: Microsoft 365

Cyber Security Review: Microsoft 365 Cyber Security is a rapidly evolving space. What works today could be exploited tomorrow. On a daily basis we at Technicalities are researching the latest scams, viruses and vulnerabilities within both software and hardware. Many of our customers live in the Microsoft 365 world due to its ease of communication…

Microsoft 365 Backups

Microsoft 365 Backups By default, Microsoft does not offer backup. If an email or file is deleted, it will likely sit in the ‘Deleted Items’ folder or Recycle Bin for a limited amount of time, often 30 days. Technicalities offers a backup solution that covers all Microsoft 365 emails, and files from OneDrive and SharePoint.…

Why choose Technicalities as your MSP?

Why choose Technicalities as your MSP? Technicalities is a Managed Service Provider (MSP) that provides a range of IT services to organisations of all sizes. With years of experience in the industry, Technicalities has established itself as a market leader, and reliable MSP. Technicalities is a great MSP for many reasons. We have technical expertise,…

Protect Yourself Online – A recommendation for safer browsing

Protect Yourself Online – A recommendation for safer browsing In today’s digital age, we are more connected than ever. The internet is an invaluable tool for staying in touch with loved ones, learning, socialising, playing games or life management such as banking. However it also exposes us to online threats such as identity theft, scams…

Cyber Security Review: Microsoft 365

Cyber Security Review: Microsoft 365 Cyber Security is a rapidly evolving space. What works today could be exploited tomorrow. On a daily basis we at Technicalities are researching the latest scams, viruses and vulnerabilities within both software and hardware. Many of our customers live in the Microsoft 365 world due to its ease of communication…

Microsoft 365 Backups

Microsoft 365 Backups By default, Microsoft does not offer backup. If an email or file is deleted, it will likely sit in the ‘Deleted Items’ folder or Recycle Bin for a limited amount of time, often 30 days. Technicalities offers a backup solution that covers all Microsoft 365 emails, and files from OneDrive and SharePoint.…

The Need for a Good Firewall

The Need for a Good Firewall Almost all organisations employ a firewall as a security tool that monitors and filters internet access in and out of their network. However even the best firewalls, if not properly configured and implemented, may not provide much protection at all. We so often see organisations compromised by attackers exploiting…

SIEM as a Service

SIEM as a Service Technicalities now offers (Security Information & Event Management) as a hosted service. Networks that sit behind a firewall appear to be safe, however the firewall (in its basic form) is meant to block incoming and outgoing connections. However, there must be some openings in order to allow in certain traffic such…

Callback Phishing Avoids Filters

Callback Phishing Avoids Filters A new form of phishing is appearing and it has the ability to avoid email filtering programs. Phishing is the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to entice individuals to reveal personal information, such as passwords and credit card numbers. Unlike…

Application Whitelisting

Application Whitelisting In today’s digital age, Application Whitelisting has become an increasingly popular security measure. So much so that it is the Number 1 recommendation on the Australian Government’s ‘Essential Eight’ list of recommendations.. The concept behind application whitelisting is simple: Rather than trying to block every potential threat, you simply allow only authorised applications…

The Importance of Endpoint Detection and Response (EDR)

The Importance of Endpoint Detection and Response (EDR) Endpoint detection and response (EDR) is a crucial element in the modern cybersecurity landscape. As organisations are moving more of their business online and relying on digital data storage and communication, the risk of cyberattacks has increased significantly. Endpoint Detection and Response provides the necessary tools to…

Cybercriminals double down on Ransomware boom

Cybercriminals double down on Ransomware boom Ransomware is one of the biggest forms of cybercrime that businesses of any size face today, so how can we protect against it? Cyberattacks, in particular Ransomware, are on the increase in Australia. The average remediation cost of a ransomware attack in Australia is $1.12 million The Essential 8,…