Do you measure up in your cybersecurity practices?
The Australian Cyber Security Center provides an updated “Essential Eight Maturity Model” to help you determine your maturity level in mitigating cybersecurity issues in eight key areas
A recent statement from U.S. Department of Homeland Security’s Cyber+Infrastructure’s (CISA) National Cyber Awareness System noted that the Australian Cyber Security Centre (ACSC) has updated its “Essential Eight Maturity Model.” Though all this sounds like alphabet soup or bureaucratic gobble-de-gook, the Maturity Model consists of eight important mitigation strategies you should be employing to protect your computing systems. The Model then provides methods to gauge the level of maturity you’ve taken in each area.
In brief, the essential eight strategies are: whitelisting applications, patching applications, configuring Microsoft Office macro settings, hardening user applications, restricting administrative privileges, patching operating systems, using multi-factor authentication and performing daily backups.