Solutions

Essential 8 (Australian Cyber Security Centre's framework - covers multiple categories like patching, MFA, etc.)

Since 2010 the Australian government has disseminated information to improve cybersecurity and better protect our nation’s digital assets. The “Essential-8” is the latest iteration that began with the Defence Signals Directorate’s (DSD now ASD) “Top 35” mitigation strategies. Over the ensuing decade little has changed with poor patching still posing the most insidious risk to organisations. The ASD have distilled more than a decade of analysis into the Essential-8 analysis that will help organisations of every size validate their existing safeguards and prioritise their security requirements based on cold, hard data from an independent source.

Application Whitelisting
Patch Applications
Configure Microsoft Office macro settings
User Application hardening
Restrict Administrative Privileges
Multi-Factor Authentication
Patch Operating Systems
Daily Backups

Sécurité partners reduce Essential-8 risks

Sécurité and our partners can offer point-products or end-to-end solutions that will help your organisation protect against Essential-8 security risks.

Malwarebytes

Automated Patching

Thales Safenet

Multi-Factor Authentication

Airlock Digital

Application Whitelisting

Delinea

Privileged Accounts

Airlock Digital Application Whitelisting

Airlock Digital Whitelisting is built to scale with ease in Enterprise class environments or is equally at home within SMB ecosystems. The solution can be rapidly deployed, is easily integrated into existing infrastructure and helps organisations become more secure by enforcing controls across all files and applications across the organisation and digital assets. Whitelisting helps achieve compliance with PCI-DSS and HIPAA standards and is a security safeguard recommended by the ADSD and NIST.

  • Easily create and manage secure whitelists and proactively prevent malicious code from executing
  • Deploy with ease and seamlessly integrate Airlock within your existing operating systems and applications
  • Centralised visibility into the origin of files across the organisation, when it was deployed and how it was executed
  • Track network communications between the file and Domains and
  • IP addresses to forensically understand how the file behaves
  • Lightweight 7Mb agent is easily installed and offers little impact on endpoint performance

Thales SafeNet Multi-Factor Authentication

SafeNet’s Trusted Access suite offers Identity-as-a-Service (IaaS) and Single-Sign-On (SSO) to bolster identity safeguards and streamline Cloud identity management, password administration and enforcement of security policies.Flexible Cloud management lowers the complexity and cost of administration while IaaS lowers the risk of error, omission or oversight. For environments that demand rigorous compliance enforcement, IaaS provides an independent, unimpeachable audit trail and the means to glean insights into access policies.

  • Add another layer of security to protect intellectual property and sensitive corporate data
  • Simplify Cloud identity management with SSO
  • Gain visibility into access events
  • Intuitive management with single pane administration dashboard
  • Hone access policies to lock-down security controls

Thycotic Privileged Account Manager (PAM)

Thycotic’s Enterprise grade PAM enables administrators to discover, manage, assign access using RBAC to accounts from a central dashboard. The Thycotic solution is a low impact PAM that’s simple to deploy in either terrestrial on-premises environments or in the Cloud and provides an important layer of added security to lock-down employee or third-party privilege. Thycotic’s solution family includes password and service account administration to provide a comprehensive range of layered security safeguards.

  • Discover privileged accounts and vault credentials and service accounts
  • Delegate access across the Enterprise
  • Monitor and record sessions for analysis or forensic auditing
  • Enforce least privilege compliance across the Enterprise

Malwarebytes Patch Management

Software patching remains one of the most critical security challenges for organizations. Malwarebytes’ Patch Management solution helps identify, prioritize, and address vulnerabilities in both applications and operating systems. Backed by Malwarebytes’ advanced threat research, the platform provides enterprise-grade security insights by collecting data from software vendors, ensuring IT administrators stay informed and up-to-date on patching risks.

  • Leverage the capabilities of a dedicated application designed to ensure patches are applied in a timely manner
  • Limit the risk of attack and breach using published vulnerabilities as an attack vector
  • Prioritise patching based on business risk and not chronology
  • Mitigate a risk identified by Australia’s DSD as one of the most virulent and avoidable IT security threats faced by system administrators

Mitigation Strategies to Prevent Malware Delivery and Execution

Configure Microsoft Office macro settings

Configure Microsoft Office macro settings to block macros from the internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.

User Application hardening

User application hardening. Configure web browsers to block Flash (ideally uninstall it), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers

Mitigation Strategies to Limit the Extent of Cyber Security Incidents

Mitigation Strategies to Recover Data and System Availability

Daily Backups

Daily backups of important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes.

ASD Top 35 Mitigation Strategies

Contact us

Partner with Us for Comprehensive IT

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2

We do a discovery and consulting meting 

3

We prepare a proposal 

Schedule a Consultation