TEST WRAPPER
Testing wrapper content
Essential Eight Cybersecurity Checklist
Strengthen your business against ransomware and cyber attacks with this simple, practical breakdown of the Australian Cyber Security Centre’s Essential Eight.
The Essential Eight is the minimum baseline every Australian business should follow to reduce cybersecurity risks. This checklist helps you assess your current maturity and identify improvement areas—all in plain English.
1. Application Control
▼
Only allow approved applications to run. This prevents malware and unknown programs from launching on user devices.
2. Patch Applications
▼
Keep software, browsers, and plugins updated to close vulnerabilities and block attackers from exploiting outdated components.
3. Configure Microsoft Office Macros
▼
Restrict or disable macros to limit the risk of malicious scripts being loaded through phishing attachments or unsafe documents.
4. User Application Hardening
▼
Turn off unnecessary features like Flash, ads, or browser plugins to reduce exposure to drive-by threats and malicious content.
5. Restrict Administrative Privileges
▼
Limit admin-level access to authorised staff only, improving control of sensitive settings and reducing the impact of compromised credentials.
6. Patch Operating Systems
▼
Regularly update and maintain OS versions to minimise weaknesses and maintain compatibility with modern security tools.
7. Multi-Factor Authentication (MFA)
▼
Add additional verification steps for account logins to prevent unauthorised access, even if passwords are stolen.
8. Regular Backups
▼
Implement scheduled backups of critical data, test recovery processes, and store copies offline to ensure business continuity after an attack.
Need Help Implementing the Essential Eight?
Tensor Security can audit your environment, secure your systems, and help you reach ACSC maturity targets.





