Essential Eight
Maturity Model

We can help your business review and implement
the Essential Eight Maturity Model.


Creating a whitelist is a matter of looking through your software applications and deciding which can run on your company's computers

  • Identify which systems and applications are supported
  • Review each departments software requirements
  • Create IT policies around those applications that are Whitelisted

Learn more about


Fixing weak spots in security is critical to cybersecurity. Fixing exploits and vulnerabilities should be high on your must-do lists.

  • Reviewing current applications on your network versions
  • Remove applications that are no longer supported or upgrade.
  • Consider implmenting vulnerability management software.

Learn more about

Restrict Administrative

Do your IT staff log in with network accounts that give them administrative privileges?

  • Review who has Administrative Privilges
  • Consider using seperate accounts
  • Make sure Administrative Accounts use 2FA and passwords change regularly

Learn more about

Patching Operating

Patching your operating systems helps to fix security vulnerabilities.

  • Scan your network to check current patch levels of devices
  • Obtain and apply necessary patches
  • Consider using non-Windows operating systems
  • Enforce the idea of patching with your staff
  • Consider using applications to keep your devices up to date.

Learn more about

Disable Untrusted
Microsoft Office Macros

Whilst macros are great time savers, they also open opportunities for exploits and executing code.

  • Keep safe macros digitially signed
  • Delete all macros not signed
  • Consider other macros from non-Office applications

Learn more about

Use Application

Using application hardening helps to work towards restricting access to well-known attack vectors.

  • Disable insecure and unused services
  • Limit privileged access to applications.
  • Close network ports not required.
  • Change default usernames and passwords

Learn more about

Employ Multi-factor

Using Multi-factor Authentication (MFA) is advisable and helps to reduce attacks

  • Enable MFA where possible
  • Encourage staff to use MFA
  • Use MFA on most secured items such as banking

Learn more about

Run Daily

When it comes to backing up your system, you have serveral choices and no excuses.

  • Magnetic Media
  • Optical Media
  • Cloud-based storage
  • One Drive
  • Disaster Recovery (RD) Sites.

Learn more about