Essential Eight

The Essential Eight is a set of baseline cybersecurity mitigation strategies developed by the Australian Cyber Security Centre (ACSC). It’s designed to help organisations strengthen their security posture against common cyber threats. Originally intended for government and critical infrastructure, it is now widely recommended for all Australian businesses—particularly those handling sensitive or regulated data.

The Eight Strategies

Blocks unapproved or potentially harmful applications from running on your network. This reduces the chance of malware being executed and limits exposure to harmful software that could compromise business operations.

Ensures all business software (such as web browsers, CRM systems, accounting platforms) is regularly updated. Patches fix security flaws that cybercriminals often exploit, so timely updates are essential for security.

Macros are small programs embedded in Office documents. This strategy restricts or disables them unless absolutely necessary—since they’re a common vehicle for phishing and malware attacks.

Disables unnecessary features in commonly used applications (like Flash, Java, or ads in browsers) to reduce potential entry points for attackers. This makes it harder for hackers to exploit vulnerabilities via users’ everyday tools.

Ensures only trusted, qualified users have elevated access to systems. This limits damage if an account is compromised and prevents unnecessary changes to critical settings

Just like application patching, this step involves applying timely updates to Windows, MacOS, and Linux systems. These patches often address major vulnerabilities that could allow remote access or ransomware.

Adds an extra layer of login protection by requiring a secondary verification step (like a text message code or authentication app), significantly reducing the risk of unauthorised access.

Protects critical business data by ensuring secure and routine backups are available. This enables recovery from cyber incidents like ransomware, system failures, or accidental deletions.

What happens once you’ve submitted a cyber Health Check?

Once you complete the health check, you will receive a comprehensive report on the status of your Microsoft 365 account. With visualisations of key information, you will be able to quickly and easily make decisions on any remediation actions needed.

Why Compliance Matters

Failure to implement these controls can result in:

  • Increased likelihood of data breaches and ransomware attacks
  • Operational downtime and loss of client trust
  • Regulatory action under the Privacy Act 1988 and the Notifiable Data Breaches
    scheme


Organisations can face financial penalties of up to $2.5 million per incident under
the Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022.

Red IT helps organisations align with the Essential Eight through tailored assessments, gap
analysis, and implementation support.

Ready to Future-Proof Your Business

Contact us today for a free consultation or demo.