Here’s an easy guide to self-assessing your organisation to Essential Eight Maturity Level One.
How to conduct your own Essential Eight Maturity Level One Assessment.

Here’s an easy guide to self-assessing your organisation to Essential Eight Maturity Level One.
The Optus data breach counts among the worst cyber attacks in Australia. View the incident timeline and resources for affected customers.
What Are the Essential 8? The Essential 8 are a prioritised list of mitigation strategies that help organisations of all sorts to protect their systems against cyber threats. Although no standalone mitigation strategy is guaranteed to prevent cyber incidents, when implemented together the former Australian Signals Directorate estimated that 85% of cyberattacks could have been
American security company Symantec boasts one of the most comprehensive repositories of cybersecurity threat intelligence in the world. The company has released their annual report that highlights trends in the cybercrime threat landscape. We have summarised three of the most relevant findings from the perspective of medium and large businesses. You can download the report
While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose.