Essential Eight
Our Essential Eight videos are designed to give you a basic understanding of the Essential Eight Strategies to mitigate cyber security incidents
EWOTEE Ep 8: Regular Backups
Regular Backups Hi everyone, and welcome to the final episode of eight weeks of the essential eight! In this episode we’ll be discussing regular backups, why they’re considered essential, and how you can achieve maturity level one. Let’s begin! The ACSC defines this strategy as: Regular backups of important new/changed data, software, and configuration settings, stored disconnected, […]
EWOTEE Ep 7: Multi-factor Authentication
Hi everyone and welcome to episode 7 of eight weeks of the essential eight. In this episode we’re going to discuss multi-factor authentication (AKA MFA), why it’s considered essential, and the maturity level one requirements. The ACSC defines this strategy as: Multi-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users […]
EWOTEE Ep 6: MS Office Macros
Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. In this episode we’re going to discuss the essential eight mitigation strategy ‘configure Microsoft Office macros’, why it’s considered essential, and how to implement maturity level one requirements. Let’s begin! The ACSC defines this strategy as: Configure Microsoft Office macro […]
EWOTEE Ep 5: Patching Apps & Operating Systems
Patch Applications & Operating Systems Essential 8 Mitigation Strategies 2 & 3: (Patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services should be applied within two weeks of release, or within 48 hours if an exploit exists.) Let’s delve into what this means. What are patches? Patches are fixes in software […]
EWOTEE Ep 4: User Application Hardening
User Application Hardening Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. This week we’re going to explore the essential eight strategy User Application Hardening, and how you can achieve maturity level one. The ACSC defines this strategy as: Essential 8 Mitigation Strategy 5: User application hardening to configure […]
EWOTEE Ep 3: Application Control
Hi everyone, and welcome to episode three of eight weeks of the essential eight. In this episode we’re going to explore Application control. We’re going to learn what it is, why it’s considered essential, and how to implement application control in a way that achieves maturity level one. Let’s begin! What is application control? Application […]
EWOTEE Ep 2: Restricting Admin Privileges
Hi everyone, and welcome to this week’s episode of Eight Weeks of the Essential Eight. In this episode we’ll be exploring administrative privileges and why restricting these privileges is vital in protecting your business against cyber-attacks. The ACSC defines this strategy as: restrict administrative privileges to operating systems and applications based on user duties. […]
EWOTEE Ep 1: Essential Eight & Maturity Model Explained
Hello and welcome to the first episode of Eight Weeks of the Essential Eight. Topic Areas: What is the Essential Eight? Do I need to implement the essential eight? Why the essential eight? The Essential 8 Maturity Model Targeting a Maturity Level History of the Essential Eight: So lets start with a brief history […]