ASD Essential 8
ASD Essential Eight is a series of best practice baseline cyber security controls recommended by the Australian Federal Government. The Essential Eight ASD controls are based on intelligence on the most effective measures to help organisations mitigate cybersecurity incidents by addressing the most common and impactful cyber threats
Essential 8 Basics
Great Starting Point- Application Whitelisting
- Patch Applications & Operating System
- Configure MS Office Settings
- User Application Hardening
- Restrict Admin Priviledges
- Multifactor Authentication
- Restrict Admin Priviledges
- Regular Backups
Essential 8 Plus
Most Popular- Basic included
- Essential 8 Maturity Assessment
- Roadmap to Maturity Level 2
- Cyber Security Awareness Training
- Asset Register
Essential 8 Pro
Recommended- Includes Plus
- Roadmap to Maturity Level 3
- End Point Protection & Management
- Establish a Standard & Security Policies
- Maturity progression reports to assure customers and regulators
- Monitoring of Unlimited Devices
Why Essential 8?
8 Controls to Protect your Business
The Essential Eight was designed by the Australian Government originally to protect Government Departments. The Essential Eight has been modified as a set of evidence based tools you can put in place in your business to significantly decrease your chance of suffering a cyber incident
Certified Cyber Security Experts
Why Use Secure Konnect Cyber Security?
Secure Konnect’s team have been providing Essential Eight Maturity Assessments and uplift since the framework was published in 2017. We have worked with government departments and many small businesses. Our staff have built trusted relationships based on our experience and nuanced understanding of what works best for different types of businesses.
Understanding the ASD Essential 8 Controls
Application Whitelisting
Application Whitelisting means we set up your devices so that only those applications with permission can run on your devices. This restricts the execution of potentially harmful applications and makes it much harder for hackers to introduce malicious software
Patch Applications
Regularly updating software with security updates is crucial. Vulnerabilities in outdated software can be exploited by adversaries, leading to potential breaches.
Configure MS Office
MS Office is one of the most used programs globally. Configuring its macro settings and other tools helps ensure malicious attacks can not take advantage of vulnerabilities
User Application Hardening
We secure your web browsers and other user applications to prevent cyber threats. Web browsers should be configured not to process Java from the internet or display web advertisements, which can be potential vectors for malware.
Restrict Admin Privileges
Restricting admin privileges means ensuring that admin privileges that give users the ability to make any changes they want to your devices, are restricted to those who need them
Patch Operating Systems
In the same way as we need to patch applications we also need to ensure that operating systems are kept up to date with the latest patches to prevent hackers taking advantage of vulnerabilities
Multi Factor Authentication
Multi Factor Authentication provides a secondary means of verification to access your user accounts. We are up to date on the latest best practices and set up the MFA that is most secure, with some methods now being routinely circumvented by hackers
Regular Backups
Setting up regular backups of your systems is a primary tool in incident planning. If you do experience a breach your backups means you can hopefully resume business as usual with minimal disruption
“I boosted my security in a day!”
The essential eight has really made our small business feel more secure. Appreciate your hard work and taking the time to talk to us over coffee before we went ahead.
“We’re really happy with the work….”
We’re really happy with the work Secure Konnect did implementing the Basic essential eight packages. Ed threw in some extra cyber awareness training as I said we would use them again. Pretty impressed with the work!
Publications
Featured In
Get Secure Today with Essential Eight
Start you journey to cyber security today with the Essential Eight ASD controls. Over 60 per cent of Australian small businesses are vulnerable to a cyber incident in 2022/23 – don’t be one of them in 2024!