Essential Eight

Our Essential Eight videos are designed to give you a basic understanding of the Essential Eight Strategies to mitigate cyber security incidents

EWOTEE Ep 8: Regular Backups

By Melissa Hoarau | December 10, 2021

Regular Backups Hi everyone, and welcome to the final episode of eight weeks of the essential eight! In this episode we’ll be discussing regular backups, why they’re considered essential, and how you can achieve maturity level one. Let’s begin! The ACSC defines this strategy as: Regular backups of important new/changed data, software, and configuration settings, stored disconnected, […]

EWOTEE Ep 7: Multi-factor Authentication

By Melissa Hoarau | December 3, 2021

Hi everyone and welcome to episode 7 of eight weeks of the essential eight. In this episode we’re going to discuss multi-factor authentication (AKA MFA), why it’s considered essential, and the maturity level one requirements. The ACSC defines this strategy as: Multi-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users […]

EWOTEE Ep 6: MS Office Macros

By Melissa Hoarau | December 2, 2021

Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. In this episode we’re going to discuss the essential eight mitigation strategy ‘configure Microsoft Office macros’, why it’s considered essential, and how to implement maturity level one requirements. Let’s begin! The ACSC defines this strategy as: Configure Microsoft Office macro […]

EWOTEE Ep 5: Patching Apps & Operating Systems

By Melissa Hoarau | November 19, 2021

Patch Applications & Operating Systems Essential 8 Mitigation Strategies 2 & 3: (Patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services should be applied within two weeks of release, or within 48 hours if an exploit exists.) Let’s delve into what this means.     What are patches? Patches are fixes in software […]

EWOTEE Ep 4: User Application Hardening

By Melissa Hoarau | November 8, 2021

User Application Hardening Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. This week we’re going to explore the essential eight strategy User Application Hardening, and how you can achieve maturity level one. The ACSC defines this strategy as: Essential 8 Mitigation Strategy 5: User application hardening to configure […]

EWOTEE Ep 3: Application Control

By Melissa Hoarau | October 29, 2021

Hi everyone, and welcome to episode three of eight weeks of the essential eight. In this episode we’re going to explore Application control. We’re going to learn what it is, why it’s considered essential, and how to implement application control in a way that achieves maturity level one. Let’s begin! What is application control? Application […]

EWOTEE Ep 2: Restricting Admin Privileges

By Melissa Hoarau | October 12, 2021

  Hi everyone, and welcome to this week’s episode of Eight Weeks of the Essential Eight. In this episode we’ll be exploring administrative privileges and why restricting these privileges is vital in protecting your business against cyber-attacks. The ACSC defines this strategy as: restrict administrative privileges to operating systems and applications based on user duties. […]

EWOTEE Ep 1: Essential Eight & Maturity Model Explained

By Melissa Hoarau | October 1, 2021

  Hello and welcome to the first episode of Eight Weeks of the Essential Eight. Topic Areas: What is the Essential Eight? Do I need to implement the essential eight? Why the essential eight? The Essential 8 Maturity Model Targeting a Maturity Level History of the Essential Eight: So lets start with a brief history […]