{"id":2577,"date":"2019-02-11T11:11:59","date_gmt":"2019-02-11T11:11:59","guid":{"rendered":"https:\/\/www.empowerbpo.com\/blog\/?p=2577"},"modified":"2023-02-27T09:27:48","modified_gmt":"2023-02-27T09:27:48","slug":"mitigate-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/mitigate-cyber-threats\/","title":{"rendered":"The Essential Eight &#8211; Strategies to Mitigate Cyber Threats"},"content":{"rendered":"<p>While going through articles published on ZDnet by <a href=\"https:\/\/www.zdnet.com\/meet-the-team\/au\/stilgherrian\/\" rel=\"nofollow noopener\" target=\"_blank\">Stilgherrian<\/a>, I came across one of his old articles published in 2017 on a cyber-heist incident involving a subcontractor. The article led me to the\u00a0Australian Cyber Security Centre (ACSC) website. ACSC recommends eight cybersecurity\u00a0strategies for organizations. These strategies can help mitigate cyber threats and protect your data against cyber attacks. If you manage cyber security at an organizational level, then you should check if the following eight points are set as your priorities.<\/p>\n<h2><strong>Eight strategies to mitigate cyber threats<\/strong><\/h2>\n<p>The Australian Cyber Security Centre (ASCS) recommends the implementation of these eight strategies as a baseline. Proactive implementation of these strategies could help your organization protect its data and systems against possible cyber security incidents.<\/p>\n<p>Here are the eight strategies that you, as an organization, should consider a priority:<\/p>\n<ol>\n<li><strong>Application Whitelisting<\/strong> \u2013 to prevent &#8216;non-approved&#8217; applications from executing;<\/li>\n<li><strong>Patching Applications<\/strong> \u2013 to mitigate the risks poses by known security vulnerabilities in applications;<\/li>\n<li><strong>Configuring Microsoft Office Macro settings<\/strong> \u2013 to block untrusted macros;<\/li>\n<li><strong>User Application Hardening<\/strong> \u2013 to protect against vulnerable functionality;<\/li>\n<li><strong>Restricting Administrative Privileges<\/strong> \u2013 to prohibit malicious actors from gaining full access to information and systems;<\/li>\n<li><strong>Patching Operating Systems<\/strong> \u2013 to mitigate the risk of known operating system vulnerabilities being exploited by hackers.<\/li>\n<li><strong>Multi-Factor Authentication<\/strong> \u2013 to protect against risky activities; and<\/li>\n<li><strong>Daily Backups<\/strong> \u2013 to ensure that the information is accessible even after a cyber security incident.<\/li>\n<\/ol>\n<p>You can read more about these cyber attack mitigation strategies on the <a href=\"https:\/\/acsc.gov.au\/infosec\/mitigationstrategies.htm\" rel=\"nofollow noopener\" target=\"_blank\">ASCS website<\/a>. These strategies can do a lot to protect your system against:<\/p>\n<ol>\n<li>Advanced persistent attacks that aim at stealing data.<\/li>\n<li>External attacks, such as ransomware that aim at destroying data or immobilizing your computer networks.<\/li>\n<li>Insider attempts.<\/li>\n<\/ol>\n<p><em>P.S. If you want to understand the value of these eight strategies, we suggest that you should\u00a0visit this page on the ASCS website.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While going through articles published on ZDnet by Stilgherrian, I came across one of his old articles published in 2017 on a cyber-heist incident involving a subcontractor. The article led me to the\u00a0Australian Cyber Security Centre (ACSC) website. ACSC recommends eight cybersecurity\u00a0strategies for organizations. These strategies can help mitigate cyber threats and protect your data [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2580,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[185,222,221],"class_list":["post-2577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec","tag-cybersecurity","tag-patching","tag-whitelisting"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=2577"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2577\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media\/2580"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=2577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=2577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=2577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}