ASD Essential Eight

Implement a baseline security model with proven strategies to reduce cyber risks

The Essential Eight is a baseline risk mitigation strategy recommended by the Department of Defence’s intelligence agency known as the Australian Signals Directorate (ASD). Implemented successfully, Essential Eight can mitigate cybersecurity risks for your organisation. 

Essential Eight Risk Mitigation Strategies

The cost of being complacent with your security strategy is far more than the cost of preparing for an incident in advance. Brand reputation, revenue loss and customer retention are just some of the things that are at stake, which is why Essential Eight should be part of every organisation’s security strategy.

Essential Eight mitigates common cybersecurity risks and limits the extent of incidents when they happen. It takes you through these baseline risk mitigation strategies which Professional Advantage can help you put in place:

Application Whitelisting

1. Application Whitelisting

Allow only trusted and approved applications to run on your network. This prevents execution of malicious programs from automatically running by having a set of pre-approved apps.

Application Patching

2. Application Patching

Determine patching procedures and levels for popular web browsers, Microsoft Office, Oracle Java and PDF viewers. This would help mitigate vulnerabilities on apps that need patching.

Operating System Patching

3. Operating System Patching

Determine existing patching systems, patching schedules and server/workstation patching compliance. This should allow you to mitigate vulnerabilities on operating systems that need patching.

Restrictions of Administrative Privileges

4. Restrictions of Administrative Privileges

Review admin privileges on specific IT systems and provide necessary permissions only for those who need them. 

Configuration of Office Macros

5. Configuration of Office Macros

Review office macros and current policies to prevent untrusted macros with malware from automatically running.

User Application Hardening

6. User Application Hardening

Ensure that unauthorised applications will not be utilised such as Adobe Flash Player or Java applets in browsers that have been known to deliver malware.

Multi-factor Authentication

7. Multi-factor Authentication

Use a second factor such as a physical token or mobile device to make it more difficult for cybercriminals to access your systems even when the password has been breached.

Review Backups

8. Review Backups

Ensure regular backups of data so you can get it back in case you suffer a cyber-attack. Determine RTO/RPO, retention period, online/offline backups, offsite storage location and test restoration schedule.

Assess your security readiness

Contact Professional Advantage

General Enquiries
Call us today 1800 126 499
Customer Support
Talk to a Security Expert

Thanks for filling out our form!

If you'd like to fill it out again, click here.







Your information will never be shared or sold to a 3rd party, please read our privacy policy.
Recaptcha is not verified.

Download this ebook

Thanks for filling out our form!

If you'd like to fill it out again, click here.




Your information will never be shared or sold to a 3rd party, please read our privacy policy.
Recaptcha is not verified.
ASD Essential Eight

Download this ebook

ASD Essential Eight is a must-have when it comes to having a baseline security strategy for your organisation. Download this ebook to find out why it should be part of your cybersecurity strategy.