The “Essential Eight” Cyber Threat Mitigation Strategies – Making it Harder for Bad Actors & Adversaries.
Expedict is pleased to announce that the company has successfully attained Maturity Level Three (the highest level attainable) across all eight Australian Signals Directorate’s Essential Eight Cyber Threat Mitigation Strategies.
While no set of mitigation strategies is guaranteed to protect against all cyber threats, implementing the Australian Signals Directorate's (ASD) Essential Eight Cyber Threat Mitigation Strategies helps businesses make it much harder for adversaries to compromise their systems.
What Types of Cyber Threats are Targeted by the Essential Eight?
The types of cyber threats targeted and addressed by the Essential Eight Cyber Threat Mitigation Strategies include:
- targeted cyber intrusion, such as those executed by advanced persistent threats (i.e. foreign intelligence services) and other external adversaries who steal data,
- ransomware denying access to data for monetary gain, and external adversaries with destructive intent (i.e. to destroy data and prevent computers/networks from functioning),
- malicious insiders who steal data such as customer details or intellectual property, and/or who destroy data and prevent computers/networks from functioning,
- Business Email Compromise (BEC), where an adversary uses email to trick someone into sending money or divulging confidential company information, and
- industrial control systems.
What does this mean for Clients?
The implementation of the Essential Eight Cyber Threat Mitigation Strategies, as well as the successful and ongoing attainment of both ISO:27001 (Information Security Management Systems) and ISO:9001 (Quality Systems) Certifications means that Expedict’s clients can continue to have peace of mind that their data is safe with Expedict.
For further information on the strategies and other tools Expedict implements to mitigate cyber threats, contact us on FREEPHONE 0800 910 1410.