Better Networks
Cyber security code on screen

23 March 2026 · Better Networks

The Essential Eight: What Geelong Businesses Need to Know

If you run a small business in Geelong, you've probably heard the term "Essential Eight" thrown around - maybe from your IT provider, your cyber insurer, or a client who asked about your security posture. But what actually is it, and should you care?

The short answer: yes, you should care. The Essential Eight is the most practical cyber security framework available for Australian businesses, and it can dramatically reduce your risk of a breach. Here's what you need to know.

What Is the Essential Eight?

The Essential Eight is a set of eight mitigation strategies developed by the Australian Cyber Security Centre (ACSC), which is part of the Australian Signals Directorate. It was designed specifically for Australian organisations and focuses on the most effective ways to prevent cyber attacks.

The ACSC found that implementing these eight strategies can prevent the vast majority of cyber incidents - including ransomware, phishing, and business email compromise - which are the most common threats facing small businesses right now.

The Eight Strategies Explained

Let's break each one down in plain English.

1. Application Control

This means only allowing approved software to run on your computers. If an employee accidentally downloads malware, application control blocks it from executing. Think of it as a bouncer for your systems - if the software isn't on the guest list, it doesn't get in.

2. Patch Applications

Software vendors regularly release security updates (patches) to fix vulnerabilities. This strategy requires applying those patches within 48 hours for critical vulnerabilities. That includes your web browsers, Microsoft Office, PDF readers, and any other applications your team uses daily.

3. Configure Microsoft Office Macros

Macros are small programs that run inside Office documents. Attackers love them because they can embed malicious code in a Word or Excel file that runs automatically when someone opens it. This strategy involves blocking macros from untrusted sources and only allowing them where there's a genuine business need.

4. User Application Hardening

This is about disabling risky features in everyday applications. For example, blocking Flash, Java, and web advertisements in browsers, and disabling OLE (Object Linking and Embedding) in Office. These features are common attack vectors that most businesses don't actually need.

5. Restrict Administrative Privileges

Admin accounts have the keys to the kingdom. If an attacker compromises an admin account, they can install software, change settings, and access everything. This strategy means only giving admin access to people who genuinely need it, and using standard accounts for day-to-day work.

6. Patch Operating Systems

Similar to patching applications, but for your operating systems - Windows, macOS, and any servers you run. Critical patches should be applied within 48 hours. Unsupported operating systems (like Windows 10 after October 2025) should be replaced entirely.

7. Multi-Factor Authentication (MFA)

MFA requires a second form of verification when logging in - typically a code from your phone or an authenticator app. Even if an attacker steals your password, they can't get in without that second factor. This is one of the most effective single controls you can implement.

8. Regular Backups

Backups are your last line of defence. If everything else fails and ransomware encrypts your data, a good backup means you can recover without paying the ransom. Backups should be automated, tested regularly, and stored separately from your main systems so ransomware can't reach them.

The Maturity Levels

The Essential Eight uses a maturity model with four levels:

  • Maturity Level Zero - significant weaknesses in your cyber security posture
  • Maturity Level One - partly aligned. Focuses on preventing common, opportunistic attacks
  • Maturity Level Two - mostly aligned. Protects against more targeted attacks
  • Maturity Level Three - fully aligned. Resilient against sophisticated adversaries

For most small businesses, Maturity Level One is the right starting point. It addresses the most common threats without requiring enterprise-level complexity. You can work toward higher levels over time as your security posture matures.

Why It Matters for Geelong Small Businesses

You might think cyber attacks only happen to big companies, but the numbers tell a different story. The ACSC receives a cybercrime report roughly every six minutes, and small businesses are among the most frequently targeted. The average cost of a cyber incident for a small business in Australia is over $46,000 - and that doesn't include reputational damage or lost clients.

Cyber insurers are also paying attention. Many now require evidence of basic security controls before they'll issue a policy or pay a claim. The Essential Eight gives you a recognised framework to point to.

If you work with government agencies or larger organisations, you may find that Essential Eight compliance is becoming a requirement in contracts and procurement processes.

Where to Start

You don't have to tackle all eight strategies at once. Here's a practical order for most small businesses:

  1. Enable MFA everywhere - Start with Microsoft 365, banking, and any cloud services. This is the single biggest security improvement you can make.
  2. Set up automated backups- Make sure your data is backed up to a location that ransomware can't reach. Test your restores.
  3. Automate patching - Use tools to keep your operating systems and applications up to date automatically.
  4. Restrict admin access- Audit who has admin privileges and remove any that aren't necessary.
  5. Tackle the rest - Application control, macro settings, and application hardening are more technical but round out your protection.

How Better Networks Can Help

We help Geelong small businesses work toward Essential Eight compliance in a practical, affordable way. We start with a free security assessment to understand where you stand today, then build a prioritised plan to close the gaps.

For managed IT clients, Essential Eight controls are built into your service - patching, monitoring, MFA enforcement, and backup management are all handled as part of your monthly plan.

FAQ

Essential Eight FAQs

Straight answers, no fluff.

It is not legally mandatory for most private-sector small businesses. However, it is the recommended baseline from the Australian Cyber Security Centre and is increasingly referenced by insurers and clients. Some government contracts require Essential Eight compliance.

Costs vary depending on your current setup, but most small businesses can achieve Maturity Level One for a few hundred dollars per month with a managed IT provider handling the ongoing work. The cost of not implementing it - a ransomware attack or data breach - is almost always far higher.

For a typical small business, reaching Maturity Level One takes 4 to 8 weeks with professional help. Some strategies like MFA can be enabled in a day, while others like application control take longer to roll out properly.

You can make a start on some strategies yourself, like enabling MFA and running backups. But strategies like application control, macro management, and patch automation are difficult to implement and maintain without IT expertise and the right tools.

Get Started

Not Sure Where You Stand?

Book a free security assessment and we'll show you exactly where your business sits against the Essential Eight.

Book a Free Call →