The Essential Eight
The Essential Eight is made up of mitigation strategies designed to make it harder for adversaries to compromise systems.
The Essential Eight guidelines are maintained by the Australian Cyber Security Centre (ACSC) which forms part of the Australian Signals Directorate (ASD). The strategies are based on ISM controls dervied from the Australian Government
Information Security Manual - a cyber security framework.
Australian businesses and government entitites are increasingly expected to meet at least Maturity Level 1 of the Essential Eight.
This might be in order for you to submit a tender, a requirement of an insurance policy (for example cyber insurance or business continuity insurance) or simply to maintain a robust cyber security posture.
At IML Design we sit down with you to design an Essential Eight strategy using the Microsoft 365 ecosystem with its toolset of Azure AD, Intune, 365 Defender, EndPoint Manager & Windows Defender Application Control (WDAC) to name but a few to suit your risk appeptite based on the type of work you engage in.
From small business to larger consulting firms to Defence Industry Security Project (DISP) members we look forward to helping you on your Essential Eight path.
A bit more info and background on the Essential Eight