Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Our Security Stack moves our customers towards compliance with the "Essential Eight" - a list of the 8 most effective strategies to mitigate cyber security incidents as defined by the Australian Cyber Security Centre.

It is expected that by complying with these 8 things the vast majority of security events will be prevented or significantly mitigated.


The Essential Eight

Covered 6 Items Addressed by Security Stack

Application Whitelisting - prevent installation of unapproved software. Prevent execution of unapproved software in user space.

...