Essential Eight Checklist

TEST WRAPPER

Testing wrapper content

Essential Eight Cybersecurity Checklist

Strengthen your business against ransomware and cyber attacks with this simple, practical breakdown of the Australian Cyber Security Centre’s Essential Eight.

The Essential Eight is the minimum baseline every Australian business should follow to reduce cybersecurity risks. This checklist helps you assess your current maturity and identify improvement areas—all in plain English.

1. Application Control

Only allow approved applications to run. This prevents malware and unknown programs from launching on user devices.

2. Patch Applications

Keep software, browsers, and plugins updated to close vulnerabilities and block attackers from exploiting outdated components.

3. Configure Microsoft Office Macros

Restrict or disable macros to limit the risk of malicious scripts being loaded through phishing attachments or unsafe documents.

4. User Application Hardening

Turn off unnecessary features like Flash, ads, or browser plugins to reduce exposure to drive-by threats and malicious content.

5. Restrict Administrative Privileges

Limit admin-level access to authorised staff only, improving control of sensitive settings and reducing the impact of compromised credentials.

6. Patch Operating Systems

Regularly update and maintain OS versions to minimise weaknesses and maintain compatibility with modern security tools.

7. Multi-Factor Authentication (MFA)

Add additional verification steps for account logins to prevent unauthorised access, even if passwords are stolen.

8. Regular Backups

Implement scheduled backups of critical data, test recovery processes, and store copies offline to ensure business continuity after an attack.

Need Help Implementing the Essential Eight?

Tensor Security can audit your environment, secure your systems, and help you reach ACSC maturity targets.

Contact Us

Shopping Cart