Regular Backups Hi everyone, and welcome to the final episode of eight weeks of the essential eight! In this episode we’ll be discussing regular backups, why they’re considered essential, and how you can achieve maturity level one. Let’s begin! The ACSC defines this strategy as: Regular backups of important new/changed data, software, and configuration settings, stored disconnected, […]
Read MoreHi everyone and welcome to episode 7 of eight weeks of the essential eight. In this episode we’re going to discuss multi-factor authentication (AKA MFA), why it’s considered essential, and the maturity level one requirements. The ACSC defines this strategy as: Multi-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users […]
Read MoreHi everyone, and welcome to this week’s episode of eight weeks of the essential eight. In this episode we’re going to discuss the essential eight mitigation strategy ‘configure Microsoft Office macros’, why it’s considered essential, and how to implement maturity level one requirements. Let’s begin! The ACSC defines this strategy as: Configure Microsoft Office macro […]
Read MorePatch Applications & Operating Systems Essential 8 Mitigation Strategies 2 & 3: (Patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services should be applied within two weeks of release, or within 48 hours if an exploit exists.) Let’s delve into what this means. What are patches? Patches are fixes in software […]
Read MoreUser Application Hardening Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. This week we’re going to explore the essential eight strategy User Application Hardening, and how you can achieve maturity level one. The ACSC defines this strategy as: Essential 8 Mitigation Strategy 5: User application hardening to configure […]
Read MoreHi everyone, and welcome to episode three of eight weeks of the essential eight. In this episode we’re going to explore Application control. We’re going to learn what it is, why it’s considered essential, and how to implement application control in a way that achieves maturity level one. Let’s begin! What is application control? Application […]
Read MoreHi everyone, and welcome to this week’s episode of Eight Weeks of the Essential Eight. In this episode we’ll be exploring administrative privileges and why restricting these privileges is vital in protecting your business against cyber-attacks. The ACSC defines this strategy as: restrict administrative privileges to operating systems and applications based on user duties. […]
Read MoreHello and welcome to the first episode of Eight Weeks of the Essential Eight. Topic Areas: What is the Essential Eight? Do I need to implement the essential eight? Why the essential eight? The Essential 8 Maturity Model Targeting a Maturity Level History of the Essential Eight: So lets start with a brief history […]
Read More