ACSC Essential Eight

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these strategies are the Essential Eight.

The Essential Eight strategies cover the following:

  1. 1. Application control
  2. 2. Application patching
  3. 3. Configure Microsoft Office macro settings
  4. 4. User application hardening
  5. 5. Restrict administrative privileges
  6. 6. Patch operating systems
  7. 7. Multi-factor authentication
  8. 8. Regular backups

The Essential Eight uses a scoring system from 0-3, to help you identify your organisation's current security posture and take the steps you need to take to improve it.

Starknex is a network partner of the Australian Cyber Security Centre (ACSC) and can help you assess and implement the Essential Eight strategies to improve your organisation's security posture.

Contact us today to get started with your Essential Eight gap analysis and implementation.

Our Services

Cyber security services designed for your business: See how we can assist you.

Cyber Security Consulting

Providing expert guidance and support.
With our experience and expertise, we can help you implement effective security measures to safeguard your organisation from adversaries and cyber attacks.

Cyber Security Assessments & Red-Teaming

Test your organisation's defences.
Simulating attacks and finding vulnerabilities to test your defences and providing recommendations for improving security; protecting your organisation against cyber attacks.

Cloud Security Posture

Understand risk in your cloud infrastructure.
Assessing your cloud security posture against compliance frameworks (such as PCI and ISO 27001) and providing recommendations to improve your cloud security posture.

Essential Eight Compliance

Making it harder for adversaries to compromise your systems.
Assessing and implementing the Essential Eight maturity model and strategies to improve your organisation's security posture.


Futureproofing your organisation by implementing solutions & strategies.
Including: Microsoft 365 & Google Workspace, Privilege & identity access management (includes Single Sign-On and Multi-Factor Authentication), DevOps , Information classification, Device & Application Management, Update & Patching management.

Managed Security Services

Providing comprehensive IT management with a strong emphasis on cyber security.
Services include: regular software updates and patch management, monitoring for suspicious activity, and incident response planning to minimise the impact of a security breach as well as general IT support such as troubleshooting, hardware and software management, and network management.

Supported by

University of South Australia - Innovation & Collaboration Centre AustCyber

Partners & Professional Memberships

How can we help?

Book free consultation with our cyber security experts.