Essential 8 Maturity Model
ACSC cyber security mitigation strategies. The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency for cybe...
Leave us a message and our Macquarie Government consultants will soon be in touch.
ACSC cyber security mitigation strategies. The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency for cybe...
Major General (Ret'd) Dr Marcus Thompson and Macquarie’s Shannon Campbell, discuss the experience and insights each have applied from thei...
The Australian Cyber Security Centre (ACSC) recently released a Gateway Security Guidance Package. The Guidance was developed with input fro...
The Australian Government has strong standards in place for cyber security; and we’re proud to ensure this is firmly incorporated into all the work we do with agencies. What we bring is more than just compliance, however. We allow agencies to adopt digital transformation and deliver services to citizens efficiently and safely. We also allow agencies to leverage our cyber security services when moving to cloud infrastructure.
The Government established the Australian Cyber Security Centre (ACSC) to lead the governments efforts to improve cyber security. The ACSC works with government agencies, businesses and the academic community. Both Commonwealth and State government continue to invest in programs to improve cybersecurity capabilities across both public and private organisations.
Government agencies use organisations like Macquarie Government to provide secure internet and cloud, as well as cybersecurity services like Security Operations and Security Information and Event Management.
The Essential 8 (or Essential Eight) are recommendations from the Australian Signals Directorate for Australian Government agencies to mitigate over 85% of known cyber-security threats. It comprises the Top 4, which are mandatory for federal government agencies and consist of application whitelisting and patching operating system (OS) patching, and the restriction of administration privileges based on user duties.
This complements the Top 4 with additional recommendations – appropriately configuring Microsoft Office macro settings, user application hardening, implementing multi-factor authentication, and daily backups of key data, software and settings data.