The Australian Government has published the Essential 8 essential mitigation strategies to provide a baseline security framework for small business. While no mitigation strategies are guaranteed to protect against all cyber threats, the Essential 8 controls provide effective strategies which significantly reduce your risk of a successful cyber attack.

WHY
Checking programs against a pre-defined approved list and blocking all programs not on this list
So unapproved programs including malware are unable to start and preventing attackers from running programs which enable them to gain access or steal data
Apply security fixes/patches or mitigations (temporary workarounds) for programs within a timely manner (48 Hours for internet reachable applications). Do not use applications which are out-of-support and do not receive security fixes
Unpatched applications can be exploited by attackers and in the worst case enable an attacker to completely takeover an application, access all information contained within and use this access to access connected systems
Only allow Office macros (automated commands) where there is a business requirement and restrict the type of commands a macro can execute. Also monitor usage of Macros.
Macros can be used to run automated malicious commands that could let an attacker download and install malware
Configure key programs (web browsers, office, PDF software, etc) to apply settings that will make it more difficult for an attacker to successfully run commands to install malware
Default settings on key programs like web browsers may not be the most secure configuration. Making changes will help reduce the ability of a compromised/malicious website from successfully downloading and installing malware.
Limit how accounts with the ability to administer and alter key system and security settings can be accessed and used.
Administrator accounts are ‘the keys to the kingdom’ and so controlling their use will make it more difficult for an attacker to identify and successfully gain access to one of these accounts which would give them significant control over systems
Apply security fixes/patches or temporary workarounds/mitigations for operating systems (e.g. Windows) within a timely manner (48 Hours for internet reachable applications). Do not use versions of an Operating system which are old and/or not receiving security fixes
Unpatched operating systems can be exploited by attackers and in the worst case enable an attacker to completely takeover an application, access all information contained within and use this access to access connected systems
A method of validating the user logging in by using additional checks separate to a password such as a code from an SMS/Mobile application or fingerprint scan
Makes it significantly more difficult for adversaries to use stolen user credentials to facilitate further malicious activities
Regular backups of important new or changed data, software and configuration settings, stored disconnected and retained for at least three months. Test the restoration process when the backup capability is initially implemented, annually and whenever IT infrastructure changes.
To ensure information can be accessed following a cyber-security incident e.g. a ransomware incident).

We're passionate about empowering small business with the cyber security solutions they deserve. Let us help you protect your business and your family.
Need to reach us? Shoot us an email or give us a call today.
(03) 7036-8885