+61 0402111226 info@securekonnect.com

ASD Essential 8

ASD Essential Eight is a series of best practice baseline cyber security controls recommended by the Australian Federal Government. The Essential Eight ASD controls are based on intelligence on the most effective measures to help organisations mitigate cybersecurity incidents by addressing the most common and impactful cyber threats

5.0
Based on 34 Reviews
google
peter jones
9 January 2024
google
Siegfried Grant
9 January 2024
google
Tracey fuller
8 January 2024
google
Matt Curnow
7 January 2024
google
Chloe Bishop
7 January 2024
google
Ilan Finberg
6 January 2024
google
Helen Shaw
6 January 2024
google
John Fitzgerald
6 January 2024
google
Ritchie Journeaux
6 January 2024
google
Steve Johnson
6 January 2024
google
Phillip Van Rooyen
6 January 2024
google
google
Morgan Joyce
5 January 2024
google
Emma Bayne
3 August 2023
google
James Lawson
3 August 2023
google
Erin Nixon
22 July 2023
google
riley lucas
18 July 2023
google
M Loughman
18 July 2023
google
google
Dave Platter
23 May 2023
google
Anne Lu
20 May 2023
google
chandika ramdoss
20 May 2023
google
Erin Gannon
20 May 2023
google
Carly Le Busque
19 May 2023
google
Joanna Nealon
19 May 2023
google
Sarah Bowkker
19 May 2023
google
google
Ryan Bloodworth
19 May 2023
google
Guy Waddilove
19 May 2023
google
google
Chloe Beth
18 May 2023
google
Lisa Wagstaff
18 May 2023
google
sean worth
18 May 2023
google
Grace Cook
18 May 2023
software 15 1
software 23

Why Essential 8?

8 Controls to Protect your Business

The Essential Eight was designed by the Australian Government originally to protect Government Departments. The Essential Eight has been modified as a set of evidence based tools you can put in place in your business to significantly decrease your chance of suffering a cyber incident

 

Certified Cyber Security Experts

Why Use Secure Konnect Cyber Security?

Secure Konnect’s team have been providing Essential Eight Maturity Assessments and uplift since the framework was published in 2017. We have worked with government departments and many small businesses. Our staff have built trusted relationships based on our experience and nuanced understanding of what works best for different types of businesses.

 

 

Understanding the ASD Essential 8 Controls

software 25

Application Whitelisting

Application Whitelisting means we set up your devices so that only those applications with permission can run on your devices. This restricts the execution of potentially harmful applications and makes it much harder for hackers to introduce malicious software

software 24

Patch Applications

Regularly updating software with security updates is crucial. Vulnerabilities in outdated software can be exploited by adversaries, leading to potential breaches.

software 28

Configure MS Office

MS Office is one of the most used programs globally. Configuring its macro settings and other tools helps ensure malicious attacks can not take advantage of vulnerabilities

software 29

User Application Hardening

We secure your web browsers and other user applications to prevent cyber threats. Web browsers should be configured not to process Java from the internet or display web advertisements, which can be potential vectors for malware.

software 30

Restrict Admin Privileges

Restricting admin privileges means ensuring that admin privileges that give users the ability to make any changes they want to your devices, are restricted to those who need them

software 26

Patch Operating Systems

In the same way as we need to patch applications we also need to ensure that operating systems are kept up to date with the latest patches to prevent hackers taking advantage of vulnerabilities

software 31

Multi Factor Authentication

Multi Factor Authentication provides a secondary means of verification to access your user accounts. We are up to date on the latest best practices and set up the MFA that is most secure, with some methods now being routinely circumvented by hackers

software 27

Regular Backups

Setting up regular backups of your systems is a primary tool in incident planning. If you do experience a breach your backups means you can hopefully resume business as usual with minimal disruption

"Thanks Ed and Chris - never thought we would be enthusiastic about Cyber"

Thanks Ed and Chris – never thought we would be enthusiastic about Cyber! I’m relieved to have put in place some basic measures as the breach really worired us. We will be moving to Level 3 next year with Secure Konect help.

Tony, gym owner 

"... .highly professional team who made sure Essential 8 made sense"

Thanks to the team at Secure Konnect. We wanted to get up to date with cyber security now as the regulators look like mandating it soon. Secure Konnect were a A highly professional team who made sure Essential Eight made sense

Francis, Solar Energy Industry 

portrait square 04 jpg

“I boosted my security in a day!”

The essential eight has really made our small business feel more secure. Appreciate your hard work and taking the time to talk to us over coffee before we went ahead.

portrait square 11 jpg

“We’re really happy with the work….”

We’re really happy with the work Secure Konnect did implementing the Basic essential eight packages. Ed threw in some extra cyber awareness training as I said we would use them again. Pretty impressed with the work!

Publications

Featured In

Linke
HR Leader - secure konnect cyber security
lawyers weekly - secure konnect
Education Review 1

Get Secure Today with Essential Eight

Start you journey to cyber security today with the Essential Eight ASD controls. Over 60 per cent of Australian small businesses are vulnerable to a cyber incident in 2022/23 – don’t be one of them in 2024!

Assistant

Assistant

Typically replies live within 5 minutes

I will be back soon

Assistant
Hey there 👋
How can I assist? You'll be straight through to one of our team - not an AI bot!
Whatsapp Live chat