IronSights

Knowledge base

Security knowledge
without the jargon.

Practical guides, threat intelligence, and security frameworks written for Australian business owners and IT teams. Not security academics.

Guides & reports

Quick reference

The ACSC
Essential Eight.

The eight critical mitigation strategies recommended by the Australian Cyber Security Centre. All IronSights services align to these controls.

01

Application Control

Maintains an allowlist of approved applications and prevents everything else from executing — on workstations and servers. Stops malware from running even after a successful phishing attack.

Prevents malware execution
02

Patch Applications

Keeps browsers, Office, PDF readers, and other user-facing software current. Unpatched applications are among the most reliably exploited entry points — particularly those exposed to internet content.

Closes known vulnerabilities
03

Configure Office Macros

Disables macros by default and allows them only from trusted, digitally signed sources. Macro-enabled documents remain a primary malware delivery mechanism in business email compromise attacks.

Blocks document-based attacks
04

User Application Hardening

Removes browser and Office features that attackers commonly exploit — Flash, Java, and malicious ad content. Reduces the attack surface of the applications your staff use every day.

Reduces attack surface
05

Restrict Admin Privileges

Limits admin rights to the minimum required and reviews them regularly. Prevents attackers from moving laterally after initial access — containing damage to the system first compromised.

Limits breach blast radius
06

Patch Operating Systems

Keeps Windows and other operating systems current to close vulnerabilities actively targeted by ransomware groups and automated scanning tools. Critical patches within 48 hours at ML2.

Closes OS-level vulnerabilities
07

Multi-Factor Authentication

Requires a second factor for all internet-facing services and privileged accounts regardless of network location. The single most effective control against credential-based attacks and account takeover.

Stops credential attacks
08

Regular Backups

Maintains daily backups in a location disconnected from the primary network, protected against modification, and tested regularly. The only reliable recovery path when ransomware encrypts production systems.

Enables ransomware recovery

Not sure where to start?

We'll tell you exactly
what you need.

Book a free Essential Eight maturity assessment. We review your current controls, identify gaps against ML1 or ML2, and give you a clear remediation roadmap. No obligation.

Essential Eight assessment

Understand your maturity
in one session.

We map your current state against all eight controls, identify your highest-priority gaps, and recommend a realistic path to ML1 or ML2. No sales pitch. No pressure.

Get an Essential Eight assessment →Call 1300 004 766