The essential 8 expand upon the ‘Top 4’ mitigation strategies, part of the government’s Protective Security Policy Framework, which has been mandatory for federal agencies since 2014. ASD had stated that implementing the top 4 mitigation strategies will be able to prevent over 85% of unauthorised intrusions.

What’s the purpose of Essential 8?

The essential 8 mitigation strategies have been developed to protect your data, applications and users by keeping adversaries from inserting malware into your network to minimise the impact of incidents and data loss. Malware – viruses, worms, ransomware, spyware and more – can compromise or exfiltrate data, disrupt operations or propagate into connected networks. It can cause operational disruptions, loss of critical or sensitive data and unwanted publicity. And that can be expensive. According to the EMC Global Data Protection Index, data loss and downtime cost Australian businesses AUD $65.5 billion in 2014. These mitigation strategies can help you avoid malware infections and their associated costs.

Australian Signals Directorate’s (ASD) ‘Essential 8’ strategies.

The Australian Signals Directorate’s (ASD) ‘Essential 8’ strategies to mitigate cyber security incidents represent a set of cyber security best practices that, when implemented successfully, will provide your agency, with a baseline cyber security posture.

Download your copy today

Essential 8 Tips from Macquarie Government

"The eight strategies will help protect businesses from ransomware, malicious insiders, business email compromise, threats to industrial control systems and adversaries with destructive intent."

Dan Tehan
the Minister Assisting the Prime Minister for Cyber Security
Essential 8 logo

Why the essential 8?

Why another set of guidelines? There are any number of cyber security approaches that can secure networks. These essential 8 mitigation strategies have been developed specifically to provide Australian government agencies with a baseline of security operations that, if implemented and tied together, can protect
networks, users, applications and data from all but the most persistent threats. The following points illustrate why these mitigation strategies make sense.

Defence in-depth
Accessibility
Cost effective
Deployment
Automation

Get in touch.

1800 004 943

Enquiry Sent.

Thank you for contacting us. Our specialists will get in touch with you shortly.