Businesses and other organisations have a lot on their plates. From getting their marketing mix right to maintaining employee morale, all why trying to make a profit, appropriate management can often seem overwhelming.
When you add in the ever-growing threat that comes from cyber attacks, handling all of these aspects at once seems almost impossible. Thankfully, the government has stepped in to help with the last problem, publishing the Essential 8 as a quick guide to help businesses orientate themselves appropriately in our complex and every-changing cyber landscape.
What Is the Essential 8?
The Essential 8 is a set of strategies that help organisations mitigate cyber threats, bolstering their security and improving their resilience. It was initially established in 2017 by the Australian Signals Directorate (ASD), to replace the “Top 4 Mitigation Strategies”. The Essential 8 was updated earlier this year, so its measures are still appropriate for combating the latest threats.
These strategies were developed with the understanding that business leaders already have a lot of other things to worry about, and often lack the knowledge, skills or resources to appropriately handle their cyber defences. Most people have a limited knowledge of information security, and the rapid pace of the industry makes it all but impossible for anyone but experts to keep up.
The Essential 8 gives organisations a quick and pragmatic way to reduce their cyber risks. The strategies give businesses the guidelines they need to prioritise their defences and customise their protective measures in a way that suits their unique situations.
The steps are prioritised and give businesses an outline that makes it easy to achieve an adequate security baseline, which significantly minimises the risks that they face.
Before Implementing the Essential 8
Before your organisation rushes into the essential 8, the ASD has three questions that companies should ask themselves. These can help organisations understand what threats they face, as well as how they can use the Essential 8 to mitigate them.
Which Systems Require Protection?
Your organisation should look at which of its systems are involved in dealing with sensitive or valuable information, and which need the most protection.
What Kind of Adversary Is Most Likely to Target These Systems?
If your organisation deals with incredibly sensitive or valuable information, such as government or military secrets, then it may be targeted by nation states. In other situations, the most likely threats may come from malicious insiders or cybercriminals.
What Level of Protection Do These Systems Need?
Given the threats that each system faces, determine the appropriate level of security to keep them reasonably safe.
The Essential 8 Mitigation Strategies
Once organisations have determined the risks that they face, they can begin implementing the Essential 8. The first four strategies aim to prevent malware delivery and execution, the next three aim to limit the impacts of cybersecurity incidents, while the final strategy is focused on data recovery and system availability.
Whitelisting trusted programs prevents non-approved applications from executing malware.
All applications should be using the latest versions. When security vulnerabilities are discovered, developers patch the flaws and then push them out as updates. Neglecting the latest updates leaves your organisation at risk to these vulnerabilities.
Configure Microsoft Office Macro Settings
Block macros from the internet and only allows those that have been vetted. This prevents Office macros from being used to execute malicious code on your organisation’s systems.
User Application Hardening
Java, Flash and ads are commonly used to infect systems. Blocking these and other unneeded features can help to minimise your organisation’s risks.
Limit Administration Privileges
Only grant your organisation’s users access to the systems and resources that they need to complete their tasks. Allowing wider access makes it possible for both hackers and malicious insiders to do far more damage to your systems if an attack occurs.
Patch Operating Systems
Just like your organisation’s applications, its operating systems are at risk to the latest vulnerabilities. Updating them as soon as possible plugs up these security holes.
Single factor authentication is relatively easy for attackers to breach. Adding a second factor, such as an authenticator app or security token, makes it much harder for attackers to work their way into your organisation’s systems.
Performing frequent backups to data and systems helps to protect your organisation from ransomware and other attacks, as well as system failure.
Keeping your organisation safe
While the Essential 8 gives organisations a decent foundation to build their defences on top of, it can still be difficult to navigate the ever-changing security threats that they face. If you need help managing your organisation’s risks, Gridware can analyse its needs and provide security services that evolve alongside your organisation and the latest attacks.