Originally published in February 2010, the Australian Signals Directorate (ACSC) developed a list of strategies to mitigate targeted cyber intrusions. In 2017, four additional recommendations were added, creating the Essential Eight. This guidance promotes the adoption of sound security and operational practices for managing technology used within Australian Government agencies.

" />

How you can simplify your path to the ACSC guidance

Supplied by BT Software Australia Pty Ltd on Tuesday, 26 October, 2021


Originally published in February 2010, the Australian Signals Directorate (ACSC) developed a list of strategies to mitigate targeted cyber intrusions. In 2017, four additional recommendations were added, creating the Essential Eight. This guidance promotes the adoption of sound security and operational practices for managing technology used within Australian Government agencies.

This compliance brief provides an overview of the Essential Eight and explains how your organisation can meet seven of the Essential Eight mitigation strategies.


Related White Papers

How to share your data in a governed and secure way

Get the deepest insights possible from your data. This complimentary guide explains the...

6 steps for state-of-the-art remote working security

Learn how to deliver powerful security to proactively block threads, identify potential...

Technology for your education in 2021 and beyond

This white paper focuses on the key learnings of the pandemic in the context of technology...


  • All content Copyright © 2022 Westwick-Farrow Pty Ltd