ESSENTIAL 8

SECURING YOU, YOUR ORGANISATION AND AUSTRALIA

CYBER SECURITY FIRST!

Key Statistics:

  • An increase to over $98 million in financial losses due to BEC, an average loss of $64,000 per report.
  • A rise in the average cost per cybercrime report to over $39,000 for small business, $88,000 for medium business, and over $62,000 for large business an average increase of 14%.
  • Over 25,000 calls to the cyber security hotline, an average of 69% per day and an increase of 15% from the previous financial year.
  • Fraud, online shopping and online banking were the top reported cybercrime types. Ransomware and Business Email Compromise remains the most destructive cybercrime.

THE CONSEQUENCES OF NOT HAVING A STRONG CYBER POSTURE

HOW TO SECURE AUSTRALIAN’S GOVERNMENT AGENCIES AND DEPARTMENTS WITH ESSENTIAL 8 STRATEGIES

The ACSC and CISO Online recommend that organisations implement eight essential mitigation strategies as a baseline. This baseline, known as the ESSENTIAL EIGHT, makes it much harder for adversaries to compromise systems. With bad actors becoming increasingly smarter in their attack methods, running a cyber security uplift program and security awareness training is more crucial than ever.

What is Essential 8:

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to protect organisations against various cyber threats. While no single mitigation strategy is guaranteed to prevent cyber security incidents, the most effective of these mitigation strategies is The Essential Eight. The mitigation strategies that constitute the Essential Eight are:

Prevention

Application control

Patch applications

Configure Microsoft Office macro settings

User application hardening

Containment

Restrict administrative privileges

Patch Operating Systems

Multi Factor Authentication (MFA)

Recovery

Regular backups

Essential 8 Maturity Level:

To assist organisations with their implementation of the Essential Eight, four maturity levels have been defined (Maturity Level Zero through to Maturity Level Three). With the exception of Maturity Level Zero, the maturity levels are based on mitigating increasing levels of adversary counterintelligence. The Essential Eight Maturity Model is designed to assist organisations to implement the Essential Eight in a graduated manner based upon different levels of adversary tradecraft and targeting. The different maturity levels can also be used to provide a high-level indication of an organisation’s cyber security maturity.

Essential 8 Maturity Model:

To assist organisations with their implementation of the Essential Eight, four maturity levels have been defined (Maturity Level Zero through to Maturity Level Three). With the exception of Maturity Level Zero, the maturity levels are based on mitigating increasing levels of adversary counterintelligence. The Essential Eight Maturity Model is designed to assist organisations to implement the Essential Eight in a graduated manner based upon different levels of adversary tradecraft and targeting. The different maturity levels can also be used to provide a high-level indication of an organisation’s cyber security maturity.

  • Maturity Level Zero

    Not aligned with the intent of the mitigation strategy. This maturity level signifies that there are weaknesses in an organisation’s overall cyber security posture. When exploited, these weaknesses could facilitate the compromise of the confidentiality of their data, or the integrity or availability of their systems and data.
  • Maturity Level One (ML1)

    Partially aligned with the intent of the mitigation strategy. This maturity level signifies basic protections in place in an organisation’s overall cyber security posture. That help prevent cyber criminals and other threat actors, using common tools and methods, to break into systems.


  • Maturity Level Two (ML2)

    Mostly aligned with the intent of the mitigation strategy. This maturity level signifies strategies in place to mitigate a variety of sophisticated security attack that help prevent cyber criminals and other threat actors, using advanced tools and methods.


  • Maturity Level Three (ML3)

    Fully aligned with the intent of the mitigation strategy. This maturity level signifies that the organisations implement a range of enhanced strategies to ensure anomalous activity can be quickly detected, investigated and mitigated.



What Maturity Level should you aim for?

Essential 8 Implementation:

Essential 8 updates:

DON'T LET CYCYBER CRIMINALS INVADE AUSTRALIA?