Back to blogCybersecurity

Essential Eight in 2026: What Australian Businesses Need to Know

4 min read

If you run a business in Australia, you have probably heard the term "Essential Eight" from your IT provider, your insurance broker, or a government tender document. But most business owners still do not know what it actually means or why it matters.

Here is the short version: the Essential Eight is a set of eight cyber security strategies created by the Australian Signals Directorate (ASD). They are the minimum steps every Australian business should take to protect itself from the most common cyber attacks.

Let us break them down.

Why the Essential Eight exists

Australia saw a 23% increase in reported cyber incidents in the last financial year. Ransomware attacks on small and mid-sized businesses are growing faster than attacks on large enterprises. The reason is simple: smaller businesses have fewer defences.

The ASD created the Essential Eight to give every organisation a clear, practical starting point. These are not theoretical recommendations. They are the eight strategies that stop the most attacks, based on real incident data.

The eight strategies explained

1. Application control

Only allow approved software to run on your systems. This stops malware from executing even if someone downloads it. Think of it as a guest list for your computers.

2. Patch applications

Keep your software up to date. When vendors release security patches, apply them quickly. Attackers target known vulnerabilities, so an unpatched app is an open door.

3. Configure Microsoft Office macros

Restrict or disable macros in Office documents. Macros are a favourite delivery method for malware. Most businesses do not need them enabled.

4. User application hardening

Turn off unnecessary features in web browsers and Office apps. Disable Flash, Java applets, and ads in browsers. Fewer features means fewer ways in.

5. Restrict administrative privileges

Not everyone needs admin access. Limit admin accounts to people who genuinely need them, and use standard accounts for day-to-day work. If an attacker compromises a standard account, the damage is contained.

6. Patch operating systems

Keep Windows, macOS, and Linux up to date. Operating system patches fix security holes that attackers actively exploit. Set up automatic updates where possible.

7. Multi-factor authentication (MFA)

Require a second form of verification when logging in. A password alone is not enough. MFA stops over 99% of account takeover attacks. This is the single highest-impact change most businesses can make.

8. Regular backups

Back up your data regularly and test your restores. If ransomware encrypts your files, a recent backup means you can recover without paying. Store backups offline or in a separate cloud account.

What maturity level should you target?

The ASD defines three maturity levels for each strategy:

  • Maturity Level One: Basic implementation. Covers the most common attack vectors.
  • Maturity Level Two: Stronger controls. Recommended for most businesses.
  • Maturity Level Three: Full implementation. Required for high-value targets and government agencies.

For most Australian businesses with 10 to 200 staff, Maturity Level Two is the right target. It provides strong protection without requiring enterprise-level complexity.

If you are responding to government tenders or working with sensitive data, you may need Level Three for specific strategies.

Where to start

You do not need to tackle all eight at once. Here is a practical order based on impact and effort:

This week (high impact, low effort):

  1. Turn on MFA for all accounts, starting with email and cloud apps
  2. Check that automatic updates are enabled on all devices
  3. Review who has admin access and remove any that are not needed

This month (medium effort): 4. Set up a proper backup system with offline or immutable copies 5. Configure macro settings in Microsoft 365 6. Harden browser settings across the business

This quarter (requires planning): 7. Implement application control on critical systems 8. Build a patch management process with defined timeframes

Getting help

The Essential Eight is straightforward in concept but can be complex to implement properly. The gap between "we turned on MFA" and "MFA is correctly configured across all services with appropriate fallbacks" is where most businesses get stuck.

Not sure where your business stands? Our free IT health check includes an Essential Eight gap assessment. We will show you exactly where you are, what needs to change, and how to get there. No obligation.

Learn more about our cybersecurity services

Need help with cybersecurity?

Our free IT health check will show you exactly where your business stands and what to prioritise. No obligation.

Book your free health check

Get IT insights in your inbox

Practical tips for Australian businesses. No spam. Unsubscribe anytime.