The Essential Eight can mitigate up to 85% of data breaches
Implementing systems that minimise the impact of cyber incidents is crucial, but how do you know where your Microsoft 365 vulnerabilities lie, and what to prioritise? The Australian Cyber Security Centre (ACSC) recommends eight essential strategies to prevent malware delivery, limit the impact of attacks and improve recovery.
Are you struggling with:
- Understanding your Microsoft 365 security posture?
- Identifying vulnerabilities and optimising your environment for the best defence?
- Building a cybersecurity strategy?
- Ensuring your organisation is compliant with government and industry standards?
What is an Essential Eight Adoption Roadmap?
The Essential Eight Adoption Roadmap is a 2 weeks engagement. The audit will help you understand your current overall and Microsoft 365 security maturity and defensive posture, in alignment with the ACSC Essential Eight.
The engagement will begin with a discovery session to understand your business, technology environment and key objectives. Technical workshops will follow, focusing on application whitelisting, patching applications, patching operating systems, multi-factor authentication, managing administrator rights, daily backups, managing Microsoft Office macros and application hardening.
The audit will gather data and analyse each of the above factors.
Findings will be compiled into a report providing evidence of your current security state, as well as expert recommendations for optimisation of Microsoft 365. A high-level roadmap will be shared outlining the projects to be undertaken, indicative costs, timelines and the recommended software, hardware and services required. The report will be shared with you for review, followed by a presentation lead by the assessor to discuss your result in-depth.