Posts tagged Cybersecurity
Essential Eight Series Part 4: Restricting Administrative Privileges – Limiting the Blast Radius

Restricting administrative privileges is a core control within the Essential Eight because privilege escalation is a common step in many attacks. Once attackers gain access to a single system, elevated privileges allow them to move laterally, access sensitive data and disable security controls. This article explores how controlling administrative access reduces the impact of compromise.

Read More
Essential Eight Series Part 2: Application Control in the Real World

Application control is widely regarded as the most powerful control in the Essential Eight, but many organisations hesitate to implement it. Concerns about disruption are understandable, yet modern approaches make it far more manageable than assumed. Preventing unapproved code from executing significantly reduces breach likelihood.

Read More
Essential Eight Series Part 1: Vulnerability Management Without the Noise

The Essential Eight is clear about patching timeframes and reducing exposure to known vulnerabilities. In practice, many organisations are either struggling to identify their true exposure or are overwhelmed by the volume once they do. Vulnerability management is not a reporting exercise. It is a discipline that directly reduces breach likelihood.

Read More