ASD Essential 8
ASD Essential Eight is a series of best practice baseline cyber security controls recommended by the Australian Federal Government. The Essential Eight ASD controls are based on intelligence on the most effective measures to help organisations mitigate cybersecurity incidents by addressing the most common and impactful cyber threats
Thanks to Chris and the Secure Konnect team for guiding us through our first NIST maturity assessment. Looking forward to doing the phishing training in April.
Ed at Secure Konnect helped me understand my business' cyber security risk. His knowledge helped me find a solution that fit within my budget. Ed is always able to impart knowledge and implement things I know will help my business stay safe into the future.
Absolutely brilliant and gives me so much reassurance!
Wonderful service, would recommend.
Great service and attention to detail. Thanks Ed!
Ed was great, didn’t muck around, straight to the point, put us in good shape and his rates were very reasonable
Professional service, highly recommend!
Ed was great and very professional. Would recommend A+
Simply the best, there is no comparison. I highly recommend Secure Konnect to anyone in need.
Great business, very professional 👍🏻
Streamlined, professional and efficient service with a solid working knowledge of our different systems across multiple platforms. Highly reccomended.
100 percent recommend Ed from Secure Konnect Cyber Security in Cairns. He’s really friendly and Professional and made it all make sense.
Excellent service, highly recommended
Edward and Chris were really friendly and helpful. They made the awareness training a lot of fun! We did a NIST assessment which was so thorough and now my team have a really clear road map of what we will be doing to improve with Secure Konnect's help.
Great guy and great service highly recommend
I didn’t think much about my on line security until my details were stolen from the Medibank and Optus hacks.. After some great advice from Ed @ secure konnect I’ve changed the way I personally operate, as well as how I operate my business on line. Great advice and knowledge. I feel a lot safer after implementing Ed’s protocols. Highly recommend his services.
Highly professional to work with
Secure Konnect is the best cyber security outfit I've worked with. They know the industry inside and out, are across all the ISO standards, and can help any business protect itself. I highly recommend them.
Very satisfied with their service! Can highly recommend them 😊
Thank you for being so helpful in your advice and information in keeping safe and secure online. I really appreciate your help!
Amazing service. Did a Great job. Exactly what I wanted. Fast and professional. Highly recommend.
Excellent service. Ed made everything easy to understand. Good value, excellent service.
Ed and Chris were great. I used them to guide me through my first small business cyber security review. Everything they did made sense and I am looking forward to going to the next level in 2024.
Konnect Cyber Security is the best in the business. After a significant breach of security, a virus entered my system deleting all my Business records and freezing my computers. I called Konnect. They were able to remove the virus, retrieve, clean and restore all my files. Konnect then set up what has proven to be the most effective, reliable, and foolproof security system I have ever used. A disaster averted. I now have peace of mind thanks to Konnect. DOGSLIFE - DOG WALKING AND DAY STAYS.
Highly recommend.
Using the full platinum cyber security package and very happy with it so far. Great team and service support. Would definitely recommend.
great service!
Essential 8 Basics
Great Starting Point- Application Whitelisting
- Patch Applications & Operating System
- Configure MS Office Settings
- User Application Hardening
- Restrict Admin Priviledges
- Multifactor Authentication
- Restrict Admin Priviledges
- Regular Backups
Essential 8 Plus
Most Popular- Basic included
- Essential 8 Maturity Assessment
- Roadmap to Maturity Level 2
- Cyber Security Awareness Training
- Asset Register
Essential 8 Pro
Recommended- Includes Plus
- Roadmap to Maturity Level 3
- End Point Protection & Management
- Establish a Standard & Security Policies
- Maturity progression reports to assure customers and regulators
- Monitoring of Unlimited Devices
Why Essential 8?
8 Controls to Protect your Business
The Essential Eight was designed by the Australian Government originally to protect Government Departments. The Essential Eight has been modified as a set of evidence based tools you can put in place in your business to significantly decrease your chance of suffering a cyber incident
Certified Cyber Security Experts
Why Use Secure Konnect Cyber Security?
Secure Konnect’s team have been providing Essential Eight Maturity Assessments and uplift since the framework was published in 2017. We have worked with government departments and many small businesses. Our staff have built trusted relationships based on our experience and nuanced understanding of what works best for different types of businesses.
Understanding the ASD Essential 8 Controls
Application Whitelisting
Application Whitelisting means we set up your devices so that only those applications with permission can run on your devices. This restricts the execution of potentially harmful applications and makes it much harder for hackers to introduce malicious software
Patch Applications
Regularly updating software with security updates is crucial. Vulnerabilities in outdated software can be exploited by adversaries, leading to potential breaches.
Configure MS Office
MS Office is one of the most used programs globally. Configuring its macro settings and other tools helps ensure malicious attacks can not take advantage of vulnerabilities
User Application Hardening
We secure your web browsers and other user applications to prevent cyber threats. Web browsers should be configured not to process Java from the internet or display web advertisements, which can be potential vectors for malware.
Restrict Admin Privileges
Restricting admin privileges means ensuring that admin privileges that give users the ability to make any changes they want to your devices, are restricted to those who need them
Patch Operating Systems
In the same way as we need to patch applications we also need to ensure that operating systems are kept up to date with the latest patches to prevent hackers taking advantage of vulnerabilities
Multi Factor Authentication
Multi Factor Authentication provides a secondary means of verification to access your user accounts. We are up to date on the latest best practices and set up the MFA that is most secure, with some methods now being routinely circumvented by hackers
Regular Backups
Setting up regular backups of your systems is a primary tool in incident planning. If you do experience a breach your backups means you can hopefully resume business as usual with minimal disruption
“I boosted my security in a day!”
The essential eight has really made our small business feel more secure. Appreciate your hard work and taking the time to talk to us over coffee before we went ahead.
“We’re really happy with the work….”
We’re really happy with the work Secure Konnect did implementing the Basic essential eight packages. Ed threw in some extra cyber awareness training as I said we would use them again. Pretty impressed with the work!
Publications
Featured In
Get Secure Today with Essential Eight
Start you journey to cyber security today with the Essential Eight ASD controls. Over 60 per cent of Australian small businesses are vulnerable to a cyber incident in 2022/23 – don’t be one of them in 2024!