Implementing the essential eight

0

The Australian Cyber Security Centre (ACSC) most cited security guidance is, “Strategies to Mitigate Cyber Security Incidents,” or more commonly called the Essential Eight. Let’s look at these eight security controls and see why ACSC recommends that all organisations should adopt them to bolster their cyber defences.

Get the Basics Right

Three of these controls are basic system management procedures that organisations should already be doing. Timely installation of patches (for applications and operating systems), along with backups, are the best place to start. If patches are applied as soon as vendors release them, a significant volume of malware can be rendered inert. Attackers require vulnerabilities for malware to attack: without vulnerabilities, they cannot operate. Modern operating systems and applications automatically install patches, so there’s no excuse to be anything but up-to-date.

System backups are fundamental management activities that all organisations should be doing. Backups provide the most reliable way to recover from a virus attack and can be used to recover lost or damaged data. The most prevalent cyber threats affecting today’s organisations are Ransomware; data is encrypted and the only way to recover it is to pay the ransom in the hope the criminal will provide the decryption key. However, a properly backed up system allow quick recovery to a point, prior to infection…Click here to read full article.

Share.