abstract pattern representing essential eight

The Essential Eight Cyber Security Guidelines

Discover key cyber security recommendations

The Essential Eight cyber security guidelines for business

Malicious cyber activity is increasing in frequency, scale, and sophistication throughout Australia. In their July 2019 to June 2020 Annual Cyber Threat Report, The Australian Cyber Security Centre (ACSC) reported they received an average of 164 cybercrime reports per day, or one report every 10 minutes.

The ACSC recommends that organisations implement their Essential Eight security guidelines as a baseline to mitigate cyber security breaches. In our Essential Eight series we deep dive into the evolving Australian threat landscape, what the Essential Eight is, how it works in practice as well as some tips and recommendations on how to get started.

Explore the Essential Eight series


Patching of Operating Systems & Applications

icon of security

On-demand webinar

The Essential Eight for Security in Practice, Patching of Operating Systems & Applications

In this webinar you’ll discover how to effectively manage patching in your end user computing environment using Microsoft Modern Management and Windows Update for Business. We explore how to manage patching across your data centre whether on-premises, in the cloud or a combination of both. We’ll also look at managing threats and vulnerabilities more effectively through Microsoft’s TVM capabilities.

Watch Now
Icon representing a computer being secured

Blog

The Essential Eight for Security in Practice, Patching of Operating Systems & Applications

In this blog we discuss Microsoft patching solutions to strengthen and protect your IT against cyber threats.



Read now

Multifactor Authentication & Restrict Admin Privileges

On-demand webinar

The Essential Eight for Security in Practice, Multifactor Authentication & Restrict Admin Privileges

A webinar that explores how you can leverage Identity and Authentication features in Azure AD at Levels 1, 2 and 3 of the Essential Eight maturity model. You’ll also discover how Azure AD Conditional Access brings all these features together to help you accelerate your zero-trust journey.

We discuss how the Essential Eight template in the Microsoft 365 Compliance Manager tool helps you accelerate your Essential Eight maturity.

Watch now

Blog

The Essential Eight for Security in Practice, Multifactor Authentication & Restrict Admin Privileges

What should you focus on for your organisation’s cybersecurity? Learn how multifactor authentication and restrictive privileges can reinforce cyber protection.



Read now

Application Controls

On-demand webinar

The Essential Eight for Security in Practice, Application Controls

Attend this webinar to understand how you can leverage key Microsoft Security capabilities to harden the security posture of your digital estate.

We’ll also look at how you can implement effective application control to prevent the execution of unapproved and/or malicious programs across your digital estate.

Watch now
A graphic of a internet browser outline with a tick within it, linked to another graphic image of a laptop

Blog

The Essential Eight for Security in Practice, Application Controls

What should you focus on for your organisation’s cybersecurity? In this blog we discuss key Microsoft features to improve your application security posture.



Read now

User Application Hardening & Office Macros

On-demand webinar

The Essential Eight for Security - User Application Hardening & Office Macros

A webinar that delivers Application Hardening guidance and insights across the ASD Essential 8 maturity levels. We describe the Security Baselines available to expedite Application Hardening across Windows, Office and Edge.

In the webinar we summarise the options available to control web application access through web content filtering and shadow IT management. Finally, we provide you with Office Macro configuration guidance and insights across the ASD Essential Eight maturity levels.

Watch now

Blog

The Essential Eight for Security - User Application Hardening & Office Macros

What should you focus on for your organisation’s cybersecurity? In this blog we offer guidance and insights to ensure you can meet cyber security challenges.



Read now

Daily Backups

On-demand webinar

The Essential Eight for Security in Practice, Daily Backups

In this webinar we discuss mitigation strategies to recover data and system availability, including restoring system state through Windows autopilot.

We also explore backup and availability in Office 365 as well as how to leverage the Azure backup service to safeguard your on-premises and Azure resources. 

Watch now

Blog

The Essential Eight for Security in Practice, Daily Backups

What should you focus on for your organisation’s cybersecurity? In this blog you’ll hear about cloud solutions for daily backup and why data backup is critical.



Read now
abstract pattern

Reimagine Security

Discover locally run security training, product information and best practices that can help your business manage security, threat detection and response, data security, privacy and other IT security services.

Discover Additional Security Resources

Stay current with the latest security trends and tips for secure remote work Sign up for our email series on Security

Get started with Microsoft Security

Microsoft security provides a comprehensive suite of leading solutions that is unified across people, devices, apps, and data.

Explore Microsoft Security Products
icon representing built in experiences

Built-in experiences across platforms

icon representing best in class security protection

Integrated, best in class threat protection

icon representing secure user experiences

Seamless and secure user experiences

Fill out a form to request a call for more information about Microsoft 365 or Microsoft Azure

Request A Call About Microsoft 365 Request A Call About Microsoft Azure