top of page
cyber security background .jpg


Cyber Security Services
Essential 8

 


Ensuring your business is safe & secure wherever you are. 

 

If you need to know...

What maturity level am I?
What maturity level do I need? 
How can I make my business IT safe & secure enough?
Why should I implement the Essential 8?  

We have the answers, contact us now 

What is the Essential 8?

​

In February 2017, the Australian Signals Directorate's (ASD) doctrine was updated to augment the Top 4 with four additional controls, now known as the Australian Cyber Security Centre (ACSC) Essential 8. The Essential 8 is a set of security strategies which provides the fundamental guidelines required to ensure you are implementing the correct IT security habits across your business. While no mitigation strategy is guaranteed to prevent cyberattacks, the Essential 8 strategies as a minimum will make it much more difficult for attackers to compromise your systems.

cyber security 1 .jpg

What are the 8 strategies?

​

The mitigation strategies that constitute the Essential Eight are

Application Control, Patch Applications, Configure Microsoft Office Macro settings, User Application Hardening, Restrict Administrative Privileges, Patch Operating Systems, Multi-factor Authentication and Regular backups.

​

There are three main objectives of these 8 strategies: 

​

1. To prevent cyber attacks

2. To limit cyber attacks; and

3. Recover data & system availability 

cyber security background .jpg

Prevent Attacks 

Limit Attacks 

security icon .png
patch app icon .png
office 365 pic .png
user app hardening  icon .png
MFA icon .png
patch systems icon .png
restrict admin icon .png
daily backups .png

Recover Data & system Availability

maturity level 0.PNG

Level 0 

​

Level 0 maturity level indicates that you are not aligned with the intent of the mitigation strategy. This level signifies that there are weaknesses in your overall cyber security posture.

What are the Maturity Levels?

maturity lev 1 icon.PNG
maturity lev 2.PNG

Level 1 

​

Level 1 maturity level indicates that you are Partially aligned with the intent of the mitigation strategy.

​

Level 2 

​

Level 2 maturity level indicates that you are Mostly aligned with the intent of the mitigation strategy.

Level 4 

​

There is also a Level 4 for Higher risk environments. 

​

maturity lev 3 icon.PNG

Level 3 

​

Level 3 maturity level indicates that you are Fully aligned with the intent of the mitigation strategy.

Our Services
home page .jpg

Our other Services

Looking for assistance with these ? 

Cloud Solutions

cloud 2 .png

Your organisation needs flexibility to meet today’s challenges. Public cloud computing offers several options that provide you with adaptability, scalability, and cost-efficiency:

Network Security 

network security.PNG

Is your Business safe from Cyber Attacks?  For peace of mind, our team provides you with the findings, risks identified and a tailored strategy to boost your security to meet your demands.

Managed IT Services

managed services .png

Our CSG team ensures you have a reliable partner to take responsibility for defined tasks, with fixed prices and agreed service level requirements. We support you every step of the way.

Enterprise WiFi Solutions

WiFi.PNG

We have partnered with Ubiquiti Business so that we can provide you with a reliable wireless coverage for large areas at prices that small Business can afford. 

Disaster Recovery

An effective disaster recovery plan can greatly reduce the costs associated with a disaster event, meaning that if the worst does happen, you can keep on working with minimal disruption. 

disaster recovery.PNG

Essential 8 

essential 8.PNG

The Essential Eight is a series of baseline mitigation strategies to mitigate Cyber Security Incidents. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.

Ready to find out more?

puzzle piece.PNG

If you would like to know more about how we can be the missing piece of your IT puzzle, you can either Phone us or email us and we can arrange for a FREE consult/evaluation.

Some Partners:

essential 8 ASCB.PNG
microsoft.PNG
leader.PNG
dicker logo.PNG
N Able.PNG
dell.PNG
bottom of page