Essential Eight Series Part 6: Microsoft Office Macros: Why This Control Still Deserves Your Attention

Macro-based phishing isn't the threat it was three years ago. Microsoft changed the defaults and attackers moved on. So why does the Essential 8 still include this control? Because a vendor default and a verified configuration are not the same thing, and the gap between them is where the residual risk lives.

Read More
Essential Eight Series Part 4: Restricting Administrative Privileges – Limiting the Blast Radius

Restricting administrative privileges is a core control within the Essential Eight because privilege escalation is a common step in many attacks. Once attackers gain access to a single system, elevated privileges allow them to move laterally, access sensitive data and disable security controls. This article explores how controlling administrative access reduces the impact of compromise.

Read More