Xenex Systems
  • Home
  • About Us
  • Industries
    • Automotive IT
    • Medical IT
    • Agricultural IT
  • IT Services
    • Cloud Solutions
    • Communication Systems
    • IT Audit & Reviews
    • IT Outsourcing
  • Shop
  • Insights
  • Contact

Managed IT Services and Phone Systems

Free Audit
Xenex Systems
  • Home
  • About Us
  • Industries
    • Medical IT
    • Agricultural IT
    • Automotive Dealership IT
  • IT Services
    • Cloud Solutions
      • Amazon AWS & Microsoft Azure
      • Microsoft SharePoint
      • Microsoft Office 365
    • Communication Systems
      • 3CX Phone Systems
      • Internet & NBN
      • VoIP Phone Systems
      • Session Initiation Protocol (SIP) Trunks
      • Xenex PBX Solution
    • IT Audit & Reviews
      • IT Strategy & Planning
      • Data Recovery & Business Continuity
      • Hardware & Software
    • IT Outsourcing
      • Managed IT Services
      • IT Support & Help Desk
      • Telstra Professional Services
      • Data Backup Management
  • Insights
  • Shop
  • Contact

Actual Essential Eight Strategies1 Mar 2024

Remember that excellent framework we recently delved into, Essential Eight? It’s an exceptionally comprehensive framework developed by the Australian Cyber Security Centre to help Australian SMBs protect themselves against various cyber threats.

So now you know why we think it’s so Excellent, maybe you want to learn a bit more about HOW it achieves this excellence?

As the name would suggest, it’s a selection of Eight strategies:

 

     1. Patch applications & 2. Patch operating systems

We all see the pop ups telling us that our updates are due, how many of you skip past them? This seemingly simple but sometimes tedious task is actually so important to your cyber security that it takes out the first two spots of the Essential Eight. Whether it’s for your operating system (eg Windows or Mac) or a specific application (MS office, Adobe suite etc), as soon as a flaw aka vulnerability is found and made public, those sneaky cyber criminals can make quick work of developing a malicious code to take advantage of it within as little as one or two days! The app or operating system will release a “patch” and roll it into an update to fix the issue. So next time, just click accept on the update and take the opportunity for a forced tea break.

 

     3. Multi-factor authentication

If you’re using Password123 for any accounts, we need to have a word privately. And you should probably read this article of ours on the importance of your team’s passwords. Simple passwords are just too easy to crack. But even if you’re a bit more password-savvy, you can almost guarantee that someone else in your business isn’t. And that’s where multi-factor authentication (or two factor authentication, 2FA) can help to compensate. It means using another platform (email, mobile phone, or a dedicated authenticator app) to confirm that you’re really you, any time you try to log into something. For the mild inconvenience of an extra second to log in, you’ll be one step closer to achieving cyber security excellence!

 

     4. Restrict administrative privileges

Just like you wouldn’t give your house key out willy nilly, you also shouldn’t be giving top tier access to systems to just anyone. Before granting admin access to anything, you should consider whether that person truly needs access as a part of their role, and if they do, configure their access to the absolute minimum they actually require. It’s also worth doing regular reviews to make sure people don’t retain access longer than they need to, if their responsibilities or roles change over time.

 

     5. Application control

The more applications you add to your IT ecosystem, the more opportunity for vulnerabilities to occur in your business. The best way to reduce your risk here is to identify approved applications for your business and restrict the ability for anyone to download anything outside of that list.

 

     6. Restrict Microsoft Office macros

Macros are essentially shortcuts built into your Microsoft Office files through special code to automate and speed up repetitive tasks. They are also an opportunity for malicious tasks to also be automated. Some macros may be essential for your business, so you can set a tapered restriction on these, depending on your business’ operations.

 

     7. User application hardening

On top of restricting the applications your team are able to download on their work systems (refer to #5) it’s still worth looking at the potential vulnerabilities in the applications that are approved. You can “harden” these by peeling back and restricting functionality that are most vulnerable to malicious use. An example might be web browsers blocking ads from the internet so you can’t inadvertently click on one that takes you to a website that could exploit your system. 

 

     8. Regular backups

Finally, Essential Eight reinforces that you should be doing regular backups so if you are a victim of a cyber security breach, so your business doesn’t lose too much momentum once repaired. But just backing up isn’t enough in itself, you want to be sure that your backups are as secure as possible (psst – that’s in the cloud!)

 

Reading all these measures might make implementing the framework feel like a complex task, and it might be if it wasn’t what you did day in day out.

 

Enter: Xenex Systems. We’re here to help you work smarter, not harder. Cyber security is our bread and butter, so why not give us a call today and we’ll run a free audit to see how your business stacks up.

Categories

  • 3CX
  • BitLocker
  • Case Study
  • Cloud Computing
  • Cyber Security
  • Internet
  • IT Audit
  • IT News
  • IT Outsourcing
  • Managed IT serviced
  • Office 365
  • Phone Systems
  • Uncategorized
  • Unified Communication
  • Windows 10
  • Work remotely

Archive

  • May 2025
  • January 2025
  • June 2024
  • April 2024
  • March 2024
  • January 2024
  • November 2023
  • October 2023
  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • April 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021

Newsletter

Sign up to keep up to date with the latest technologies of the services we provide.

    Main Office

    Xenex Systems

    • Sales: (08) 6245 2800
    • Support: (08) 9240 2800
    • Email Sales
    • Email Support
    • Unit 6/3 King Edward Road, Osborne Park, WA 6017

    Important Links

      • Standard Form of Agreement
      • Privacy Policy
      • About Us
      • Contact Us

    Shop Links

      • Shop
      • My account
      • Cart
      • Checkout

    Recent Posts

    • Choosing The Right Cloud Computing Solution For Your Industry

      12 May 2025
    • Why are IT Systems Audits important?

      29 Jan 2025
    • Why is cybersecurity important in healthcare?

      26 Jun 2024
    Copyright © 2025 – Xenex Systems – All rights reserved.

    Free Audit Enquiry