The Australian Cyber Security Centre (ACSC) has released the updated Essential Eight strategies that apply to all Australian businesses. They have been recently revised due to an increase in cyber-attacks, targeting small and big business. The updating of the Essential Eight was achieved in consultation with industry.
The Essential Eight strategies have three maturity levels which show the level of compliance with each strategy.
The Essential Eight Strategies
These strategies are baseline approaches to minimise cyber security risks for Windows-based networks, which were originally developed in 2017. These will become compulsory for all Australian businesses, the date has yet to be confirmed.
The strategies help to prevent, limit the extent, and recover data & systems quickly in the case of attacks. Attacks have become more frequent in recent years and target businesses of all sizes.
What Are The Essential Eight Maturity Levels?
The levels within the Essential Eight strategies show the compliance of your cyber security practices to the model. The three levels are:
- Maturity Level 1 – Partly aligned with the intent of the mitigation strategy
- Maturity Level 2 – Mostly aligned with the intent of the mitigation strategy
- Maturity Level 3 – Fully aligned with the intent of the mitigation strategy.
More information can be found on the ACSC website.
Why Australian Businesses Need To Take Note
The Essential Eight strategies (and maturity levels) apply to all Australian business. It’s not just about complying with them, they also aim to prevent cyber-attacks which are aimed at businesses. These attacks are becoming more frequent and can cripple a business.
Unauthorised access of confidential business information can mean loss of clients and damage to business reputation. And it can also increase insurance premiums for those businesses who are not implementing measures to prevent attacks.
Whatever your requirements, RODIN can help you and your team stay safe, compliant and connected. We have more information available on our cyber security webpage.