Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
The Australian Cyber Security Centre's (ACSC) Essential Eight is a risk management framework that prioritises eight mitigation strategies that helps organisations protect themselves. They are recognised as the most effective methods in strengthening cyber security defences.
Assessments against the Essential Eight are conducted using the Essential Essential Eight Maturity Model. This maturity model describes three target maturity levels Maturity Level One through to Maturity Level Three) which are based on mitigating increasing levels of tradecraft (i.e. tools, tactics, techniques and procedures) and targeting. The maturity model also includes Maturity Level Zero which exists for capturing instances in which the requirements of Maturity Level One are not met.
The Cyber Smart balanced approach is customised for SMEs
Comprises four maturity levels, designed to assess and guide the implementation of the Essential Eight. When implementing the Essential Eight, organisations should identify and plan for a target maturity level suitable for their environment. Organisations should then progressively implement each maturity level until that target is achieved.
The Essential Eight refers to the strategies labelled as "Essential" on ASD's mitigation strategy list. These eight strategies are recognised as the most essential strategies that organisations should implement. They are practical and proven to be effective in mitigating cyber security risks.
Application whitelisting is a security practice where organisations create a list of approved and trusted applications that are allowed to run on their systems. Any unauthorised or unapproved applications are blocked.
Regularly updating and patching both applications and operating systems to fix known vulnerabilities and security flaws
Configuring security settings in Microsoft Office to prevent the execution of malicious macros in documents.
Restricting web browsers and email clients to minimise their attack surface and reduce risk exploitation.
Limiting administrative access to only those users who require it for their job functions.
Like patching applications, keeping operating systems up-to-date prevents attackers from exploiting known security weaknesses.
MFA adds an extra layer of security, making it significantly more challenging for unauthorised users to gain access, even if they have the correct password.
Data backups provide a means of recovery if data is compromised or lost due to cyber attacks or other incidents.
Please reach us at Info@CyberSmartSolutions.com.au if you cannot find an answer to your question.
To decide which maturity an organisation should target, an organisation should evaluate their attractiveness to cyber attackers and the potential impact a cyber security breach may bring to them.
Generally speaking, ASD suggests that small businesses with low-risk profiles aim for Maturity Level One, medium-sized businesses with moderate risk profiles target Maturity Level Two, and larger organisations or those with high-risk profiles should strive for Maturity Level Three.
ASD encourages organisations to aim for the highest level of maturity they can achieve. In addition, regular assessments and updates are recommended to maintain or improve their maturity level, especially in response to the evolving cyber threat landscape.
We know that our clients have unique needs. Send us a message, and we will get back to you soon.
Copyright © 2025 Cyber Smart Solutions - All Rights Reserved.
90% of breaches start with a single click - don't become a victim of Cyber crime.
For less than a coffee a month, our self-paced training arms you and your team with the skills to stay safe, while our dark web scans deliver alerts if your email is compromised.
Strengthens compliance, protects your brand and slashes the risk of crippling attacks.
Act now - Lock in peace of mind today.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.