Cyber Essentials Program - ML2
For businesses elevating compliance with the ACSC's Essential 8
In Australia the ACSC recommend the Essential 8 Mitigation Strategies, and in the UK the NCSC recommend their Cyber Essentials program. In the US CISA provides a Cyber Essential Toolkit to help businesses in need, as we could go around the world with other similar standards.
Whilst the delivery mechanisms may differ, the fundamentals are widely agreed.
Modelled on the “Essential 8 Framework“, our Cyber Essentials ML2 Program provides an enhanced assessment in accordance with Maturity Level 2, for businesses seeking a higher level of compliance visibility and / or a pathway to physical audit and certification.
A comprehensive framework, this Lite Program provides the means to measure & certify to ACSC’s Cyber Essentials Maturity Level 2.
Prevent execution of unapproved / malicious programs.
Prevent ‘extreme risk’ vulnerabilities within 48 hours.
Block macros from the internet.
Configure web browsers and features.
Assess, assign and monitor user privileges.
Mitigate ‘extreme risk’ vulnerabilities of computers and network devices within 48 hours.
For all users when they perform a privileged action.
Of important data, software and configuration settings.
How To Videos
Start a Program
Complete a Program
Use the Digital Library