The essential 8 expand upon the ‘Top 4’ mitigation strategies, part of the government’s Protective Security Policy Framework, which have been mandatory for federal agencies since 2014. ASD had stated that implementing the top 4 mitigation strategies will be able to prevent over 85% of unauthorised intrusions.

So what?

The essential 8 mitigation strategies have been developed to protect your data, applications and users by keeping adversaries from inserting malware into your network to minimise impact of incident and data loss. Malware – viruses, worms, ransomware, spyware and more – can compromise or exfiltrate data, disrupt operations or propagate into connected networks. It can cause operational disruptions, loss of critical or sensitive data and unwanted publicity. And that can be expensive. According to the EMC Global Data Protection Index, data loss and downtime cost Australian businesses AUD $65.5 billion in 2014. These mitigation strategies can help you avoid malware infections and their associated costs.

"The eight strategies will help protect businesses from ransomware, malicious insiders, business email compromise, threats to industrial control systems and adversaries with destructive intent."

Dan Tehan
the Minister Assisting the Prime Minister for Cyber Security

Why the essential 8?

Why another set of guidelines? There are any number of cyber security approaches that can secure networks. These essential 8 mitigation strategies have been developed specifically to provide Australian government agencies with a baseline of security operations that, if implemented and tied together, can protect
networks, users, applications and data from all but the most persistent threats. The following points illustrate why these mitigation strategies make sense.

Australian Signals Directorate’s (ASD) ‘Essential 8’ strategies.

The Australian Signals Directorate’s (ASD) ‘Essential 8’ strategies to mitigate cyber security incidents represent a set of cyber security best practices that, when implemented successfully, will provide your agency, with a baseline cyber security posture.

Download your copy today.

Essential 8 Tips from Macquarie Government

Get in touch.

Leave us a message and our Macquarie Government consultants will soon be in touch.