The Essential 8 is a set of cybersecurity practices designed by the Australian Cyber Security Centre (ACSC) to help protect businesses from common online threats. By following these steps, businesses can significantly reduce the risk of cyberattacks, making their systems safer and more secure.
Keep applications up to date by using the latest versions and patching critical vulnerabilities promptly to maintain security and reduce risk
Ensure that computers and servers are updated with the latest versions and patched regularly to address vulnerabilities and maintain system security
Prevents the execution of unauthorised and malicious programs
Harden user applications by disabling unnecessary features in web browsers, Microsoft Office, and PDF viewers to reduce the risk of exploitation and malware infections
Restrict macros to prevent attackers from using malicious documents and files to execute unauthorised code, deliver malware, or exploit vulnerabilities in your system, significantly reducing the risk of phishing attacks and ransomware
By restricting privileges to more defined roles, you ensure a more precise control over access, minimising the risk of unauthorised access and potential breaches
Harden access to enhance security by protecting user accounts and reducing the risk of unauthorised access to critical systems
Ensure that you can quickly recover from cyber incidents, data loss, or system failures. Without this strategy, you risk losing critical information and experiencing prolonged downtime, which can impact business operations and security
Maturity Level Two addresses threats from malicious actors who are slightly more sophisticated and persistent than those at Level One.
These actors invest additional effort in targeting, employing well-known tradecraft to bypass existing controls and evade detection. Their methods include effective phishing campaigns and social engineering techniques to compromise or escalate credentials, particularly targeting accounts with elevated privileges.
As a result, organisations at this level must develop more robust defences and awareness to counter these heightened threats.
Maturity Level One focuses on protecting against untargeted attacks by hackers using readily available tools and techniques.
These malicious actors are opportunistic, looking to exploit common vulnerabilities without specifically targeting any organisation.
While organisations at this level have basic protections, they may still fall victim to broader attacks using known exploits and social engineering tactics.
Maturity Level Three focuses on sophisticated malicious actors who adapt and utilise customised tools to exploit specific vulnerabilities in an organisation’s cyber security posture.
These actors are skilled at evading detection, leveraging weaknesses such as outdated software or inadequate monitoring to maintain and extend access. They employ advanced social engineering tactics, bypass stronger security measures, and aim to gain privileged credentials for deeper network access.
Organisations at this level need comprehensive security strategies and robust defences to counter these targeted and persistent threats.
Maturity Level Zero indicates critical weaknesses in an organisation's cyber security, leaving it vulnerable to breaches and system disruptions.
Without proper defences or expertise, the organisation is at significant risk of data compromise and operational failures.
Immediate action to enhance security measures is essential.