If you are an Australian business looking to work with the Department of Defence, you need to know about the Defence Industry Security Program (DISP). Essentially, it is the mandatory security framework that gets you in the door. It sets the standard for how you...
Australian Government Information Security Manual (ISM): What It Is and How to Align
The Australian Government Information Security Manual is the foundational cybersecurity framework for protecting Australian government systems, applications, and data. The Australian Signals Directorate (ASD) publishes and maintains the ISM. It sets the information...
Microsoft 365 Security Hardening Australia: A Guide to Securing your MS Environment
Most Australian organisations deploy Microsoft 365 with default security settings. This creates a critical problem and Microsoft 365 hardening is one of the most effective approaches to improving your security posture and cyber resilience. Research from Verizon's 2025...
Backup and Recovery Solutions Guide for Australian Organisations
Australian organisations face an escalating threat landscape. Ransomware attacks increased by 24% in 2024, with the average cost of a data breach in Australia reaching $4.26 million (IBM, 2024). Furthermore, the Office of the Australian Information Commissioner (OAIC)...
How to Perform an Essential 8 Maturity Assessment (Australia): A Step-by-Step Guide
An essential 8 assessment provides Australian organisations with a structured, evidence-based method to measure cyber security maturity and identify gaps across the ASD's eight mitigation strategies. Without a formal assessment process, organisations often...
ASD Essential 8: A Practical Guide for Australian Organisations
Table of contentsEssential Eight Maturity Levels ExplainedWhat is the ASD Essential Eight?The four Essential Eight maturity levelsMaturity Level 0Maturity Level 1Maturity Level 2Maturity Level 3The eight mitigation strategiesObjective 1: Prevent cyber attacks1....




