In a 2020 Cyber Security for Small Business Report by the Australian Cyber Security Centre, its key findings revealed:

62%

Of the respondents experienced a cyber security incident.

80%

rated cyber security as 'important to very important', but spent less that $500 on cyber security per year.

Vulnerable cohort

SMBs that outsourced IT security believe they are better protected that they really are.

A complacent cyber security strategy is costly.

Many small to mid-size organisations underestimate the risks and impacts of a cyber security incident. Brand reputation, financial loss, data loss, and customer retention are just some of the things that are at stake, which is why a foundational cyber security strategy should be part of every organisation’s IT plan.

Mitigate your risks with Essential Eight.

Essential Eight is a cost-effective, cyber security, risk mitigation strategy recommended by the Australian Signals Directorate (ASD). It mitigates common cybersecurity risks such as phishing or malware and limits the extent of incidents when they happen. Essential Eight covers:

Application Whitelisting

Allow only trusted and approved applications to run on your network. This prevents execution of malicious programs from automatically running by having a set of pre-approved apps.

Application Patching

Determine patching procedures and levels for popular web browsers, Microsoft Office, Oracle Java, and PDF viewers. This helps mitigate vulnerabilities on apps that need patching.

Operating System Patching

Determine existing patching systems, patching schedules, and server/workstation patching compliance. This should allow you to mitigate vulnerabilities on operating systems that need patching.

Restrictions of Administrative Privileges

Review admin privileges on specific IT systems and provide necessary permissions only for those who need them.

Configuration of Office Macros

Review office macros and current policies to prevent untrusted macros with malware from automatically running.

User Application Hardening

Ensure that unauthorised applications such as Adobe Flash Player or Java applets will not be utilised in browsers that have been known to deliver malware.

Multi-factor Authentication

Use a second factor such as a physical token or mobile device to make it more difficult for cybercriminals to access your systems, even when the password has been breached.

Review Backups

Ensure regular backups of data so you can get it back in case you suffer a cyber-attack. Determine RTO/RPO, retention period, online/offline backups, offsite storage location, and test restoration schedule.

Do you know your weakest links?



Essential Eight

It’s quite common for organisations not to know where to begin when assessing their IT environment for security risks.

Using Essential Eight, Professional Advantage can help you to identify your vulnerabilities, and prioritise the more pressing gaps to address.

Our risk assessment based on Essential Eight will help you to:

• Gain a clear understanding of your vulnerabilities and risks.
• Discover and address the security gaps and overlaps, if any.
• Improve your security posture using industry best practices.
• Get better use of your existing Microsoft software investments.

Assess your cyber security risks.

Complete the form below, or contact us on 1800 126 499 to speak to one of our experts today.

Adopt Essential Eight using Microsoft’s technologies.

Essential Eight already provides you with the framework and practices to help you keep your digital workplace secure. However, you also need the tools to help you put these practices into action, and the knowledge to utilise the tools you may already have with your existing Microsoft software investments. Download this eBook to learn how you can leverage Microsoft’s technologies to help you adopt the strategies recommended in Essential Eight.

Download eBook

Explore more of our security services.

Secure Remote Workshop

Enable your people to work from anywhere, securely. Understand the Microsoft 365 technologies that enable simplified identity and access management, threat protection, and cloud security.

Learn more >
Microsoft 365 Baseline Security

Protect your Microsoft 365 environment with its foundational security tools combined with practices recommended by the Australian Signals Directorate (ASD).

Learn more >
Managed Security Services

Proactive, remote monitoring and security management of your IT systems, overseen by our dedicated team of support engineers using best in class monitoring software and tools.

Learn more >

Recommended resources for you.

INFOGRAPHIC

Top 10 Security Deployment Actions with Microsoft 365.

Download now >
BLOG

Application Whitelisting: Why is it essential for every business?

Read now >
INFOGRAPHIC

Tips to stay cyber safe.

Download now >
BLOG

4 Cybersecurity threats you need to watch out for.

Read now >

Related content that you might be interested in.

Secure Remote Work Workshop

Learn more >
Essential 8 Risk Assessment

Learn more >
Information Security Review

Learn more >
Microsoft 365

Learn more >

What’s your Secure Remote Work Maturity Level blog?

Read now >
5 ways your employees put your business at risk infographic

Download now >
How to spot a phishing email blog

Read now >
SharePoint security mistakes to avoid and how to lock it down

Read now >