logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
[email protected]
+1234567890
 

Cyber Security

Protect Your Business against Cybercrime

Mitigate any Cyber Security Risks

As an Australian Cyber Security Centre partner, we operate under the latest government guidelines and utilise the ASD Essential 8 mitigation strategies.

RM Cloud Solutions are experts in Cyber Security and can help you understand any cyber risks in your business and any industry specific vulnerabilities. We can implement strategies to minimise the risk of a cyber security attack.

Cybercrime can target businesses and organisations of all sizes. Make sure are protected to avoid financial and reputational damage.

What is the ASD Essential 8?

Organisations are recommended to implement the following eight essential mitigation strategies as a baseline.

Mitigation Strategies to Prevent Malware Delivery & Execution

Application Control

Prevent execution of unapproved/malicious programs and installers.

Patch Applications

Patch applications such as web browsers, PDF viewers and Microsoft Office within 48 hours. Always use the latest version of any application.

Configure Microsoft Office Macro Settings

Configure settings to block macros from the internet and only allow trusted macros with limited write access.

User Application Hardening

Configure web browsers to block Flash, ads and Java on the internet. Disable unneeded features in applications such as Microsoft Office, web browsers and PDF viewers.

Mitigation Strategies to Limit the Extent of Cyber Security Incidents

Restrict Administration Privileges

Always follow least privilege principals and only give administrative rights for applications and operating systems to those that need it.

Patch Operating Systems

Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Always use the latest operating system version and never use unsupported versions.

Multi-factor Authentication

Use multi-factor authentication for all web facing services, including Office 365, VPNs, RDP, SSH and other remote access methods, and for all users when they perform a privileged action or access an important data repository.

Mitigation Strategies to Recover Data and System Availability

Daily Backups

Backup all data, software and configuration settings hourly and ensure a verified, offsite copy is retained daily. Retain this data for at least one year or as required by your relevant governing body or service provider. Ensure all backup storage is encrypted and airgapped from production environments, using separate credentials to access backup platforms. Test restoration at least monthly and when IT infrastructure changes.

We are an Australian Cyber Security Centre Partner.

Chat with us today about implementing the ASD Essential Eight for your business. Don’t risk a Cyber Security threat.

Get in Touch