MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Understanding the Essential Eight: What It Is and Why It’s Important

Posted August 29, 2018by Elliot Seeto

Understanding the Essential Eight: What It Is and Why It’s Important

Are you aware of the Australian Cyber Security Centre (ACSC) Essential Eight? From a recent survey conducted from Australian MSPs, the answer has overwhelmingly been no. Yet the follow-up question is: why not?

In short, the Essential Eight is a guide to help organizations mitigate cyber security incidents caused by various cyber threats. Over the next two months, we’ll be exploring these essential strategies, breaking down each one to raise awareness and provide some guidance on why it’s so important to keep these in mind.

What Is the Essential Eight?

No, the Essential Eight is not the next Quentin Tarantino film about a group of Ninjas going on a rampage. But, if you’re reading this Mr. Tarantino, I have a script you’ll definitely want to read!

As explained by ACSC, the Essential Eight is a best practices guide released by the Cyber Security Arm of the Australian Signal Directorate. Its goal is to provide a minimum baseline that all businesses should be implementing to mitigate the ever-increasing risk of cyber threats. 

Why Is This Relevant to Me and My Clients’ Business?

Early in 2018, the Office of the Australian Information Commissioner (OAIC) introduced a new law called the Mandatory Notifiable Data Breach (NBD) scheme under Part IIIC of the Privacy ACT 1988. By law, companies are obliged to notify the government and any affected person(s) whose personal information may have been exposed during a data breach event.

While security should have been in the forefront of every MSP prior to the implementation of the NDB scheme, this new compliance re-enforces the need for good security practices and maintaining Australians' right to privacy.

Failing to comply can be quite costly. Not just in monetary penalties, but in the time it takes to go through the drawn-out, tedious process for notification of data breaches. And, from what I have heard from MSPs themselves, this is something you and your clients want to avoid at all costs.

I’ve Already Implemented AV and Firewalls for My Clients. Isn’t That Enough?

In short, the answer is no. The security landscape is constantly evolving and will continue to do so as hackers get smarter and look for other avenues to strike.

Let’s put this into perspective. About ten years ago, the standard practice was to have a firewall in front of the network and antivirus installed on every machine—and that was good enough. In today’s world, though, that just won’t cut it.

Almost every day we hear of a new threat or company being exposed by ransomware, phishing or brute force attack. As hackers and threats evolve, so too does the need for new technology to combat them. Today, we’re seeing solutions like SIEM and advanced endpoint security leading the way in mitigating these new threats.

How the Essential Eight Can Help

While advanced security solutions are excellent in mitigating and cleaning up unforeseen threats, most of you need a baseline to work off. Thankfully, the Australian Government has done this for you with the Essential Eight.

It’s not a mandatory action, but a Government-recommended guideline. The first challenge here is to educate or re-educate your clients on the new threat landscape, and help them understand why this is important. As you can see, the statistics are alarming and the threat is real:

  • 14 Million small businesses were attacked over past 12 months
  • 36 percent of cyber-attacks are conducted against SMBs
  • 48 percent more SMBs experienced a breach due to employee neglect in 2017 vs. 2016
  • 60 percent of small companies that suffer a cyber-attack go out of business within 6 months

While you don’t want to come across as scaremongering, these figures will not sit well with your clients, so you need to raise awareness about what they should be thinking about when it comes to protecting themselves.

What Is a Good Baseline for Security?

Unfortunately, there is no one-size-fits-all security offering that covers every single threat out there. There numerous statistics detailing the effects of cyber security breaches, but most agree that the bulk of potential threats can be buttoned up by getting the basics right.

Instead, think of security as a multi-layered approach. For example, the walls of a castle are your firewalls and antivirus, the boiling hot cauldrons and archers are your advanced protection and SIEM solutions, and the Essential Eight is the moat, the first layer of protection against any potential threat to your castle.

By creating these different layers of security, you are greatly reducing the chances of a breach and making it more difficult for potential threats to find your weaknesses in your defenses.

Click here to read part two on patching best practices.

 

Handpicked for you:

Download Cyber Security eBook

Elliot has been in the IT space for over 10 years. Having started out his career in a Support and Operational capacity, he quickly moved into Technical Sales focused roles. His ability to relate to his previous support experiences allow him a unique perspective to provide the right solutions and insight to his client base. As a Technical Account Manager with Continuum in APAC, he is focused on helping partners grow their business while promoting Continuum’s brand throughout the region.

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus