Powernet can help you become cyber secure by providing tailored cyber security services, focusing on your business and technical demands, regulatory requirements and industry specific vulnerabilities. We can help you understand the cyber risks for your business and implement cyber resilience strategies to minimise the impact of a cyber-attack.
Our Cyber Security Team have a diverse range of experience, including IT, operations, data privacy, and forensic technology.
We operate under the latest government guidelines and industry leading security methodologies including, the Australian government’s Essential 8 and NIST framework.
This includes:
This includes all of the Essentials bundle, plus:
This includes all of the Advanced bundle, plus:
The Australian Government released advice containing a prioritised list of mitigation strategies to help businesses in protecting their systems against a range of adversaries. The mitigation strategies can be customised based on each businesses risk profile and the adversaries they are most concerned about.
While no single mitigation strategy is guaranteed to prevent cyber security incidents, businesses are recommended to implement all of the Essential Eight mitigation strategies as a baseline. The Essential 8 baseline makes it harder for adversaries to compromise systems. Also, it can work out to be more cost effective in terms of time, money and effort than responding to a large scale cyber security incident.
(Mitigation Strategies to Prevent Malware Delivery and Execution) to prevent execution of unapproved/malicious programs including .exe, DLL, scripts (e.g. Windows Script Host, PowerShell and HTA) and installers.
Why: All non-approved applications (including malicious code) are prevented from executing.
(Mitigation Strategies to Prevent Malware Delivery and Execution) e.g. Flash, web browsers, Microsoft Office, Java and PDF viewers. Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.
Why: Security vulnerabilities in applications can be used to execute malicious code on systems.
(Mitigation Strategies to Prevent Malware Delivery and Execution) to block macros from the internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.
Why: Microsoft Office macros can be used to deliver and execute malicious code on systems.
(Mitigation Strategies to Prevent Malware Delivery and Execution) Configure web browsers to block Flash (ideally uninstall it), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers.
Why: Flash, ads and Java are popular ways to deliver and execute malicious code on systems.
(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) to operating systems and applications based on user duties. Regularly revalidate the need for privileges. Don’t use privileged accounts for reading email and web browsing.
Why: Admin accounts are the ‘keys to the kingdom’. Adversaries use these accounts to gain full access to information and systems.
(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Don't use unsupported versions.
Why: Security vulnerabilities in operating systems can be used to further the compromise of systems.
(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) including for VPNs, RDP, SSH and other remote access, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository.
Why: Stronger user authentication makes it harder for adversaries to access sensitive information and systems.
(Mitigation Strategies to Recover Data and System Availability) of important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes.
Why: To ensure information can be accessed following a cyber security incident (e.g. a ransomware incident).