Insights
SPLA Compliance: why it matters more than ever
Microsoft has announced price increases for the SPLA licensing program. Find out which products are affected and how Crayon can help you adapt before new prices take effect in January, 2025.
For SMBs at the start of their cyber security journey, it can seem like a long, complex and costly road. For many SMBs, it can be difficult to know where to start, and also to know how much cyber security is enough.
That’s where the Essential Eight comes in. It removes a lot of the concern and complexity for customers, because ACSC cyber security experts have done most of the thinking and planning for you. They’ve identified the major threats and listed actions to mitigate them. For cost-conscious SMBs, the good news is the Essential Eight is free expert consultancy.
For partners, the Essential Eight provides an easy-to-follow plan that helps you to identify where your services can quickly and cost-effectively implement baseline security mitigation. Each of the Essential Eight mitigations is a building block on the road to beefing up security.
The Essential Eight mitigation strategies are grouped under 3 major themes:
The three major themes and eight mitigation strategies of the Essential Eight are summarised in the table below.
Theme | Mitigation strategy |
Prevent Attacks | Application Control
Patch Applications Configure Microsoft Office Macros User Application Hardening |
Limit Extent of Attacks | Restrict Administrative Privileges
Patch Operating Systems Multi-factor Authentication |
Recover Data & System Availability | Regular Backups |
The beauty of the Essential Eight is it breaks up all the potential security threats and related mitigations into eight digestible chunks and describes in detail what organisations need to do to strengthen their defences against the threats.
SMBs are given a list of actions and metrics for each of the eight mitigations to reduce their risk from cybercrime. When SMBs implement the recommended security standards for each of the eight mitigation strategies, they start to build a joined-up security strategy.
This can then be used as the SMB’s cyber security roadmap. It serves as an action plan and a security policy document that can be understood and communicated to all staff in the business. And importantly, it can serve as a transparent checklist that business leaders can review to ensure their SMB is taking the right steps to keep cybercrime at arm’s length. The Essential Eight security checklist can also be audited as part of compliance processes.
The Essential Eight is the outcome of some serious thinking by highly talented ACSC cyber security experts and provides a practical and realistic starting point for many SMBs.
For partners, Crayon has a service offering that can help you get your customers on the right track. Our Essential Eight maturity assessment offering is ideal whether you have an existing cybersecurity practice or need new ways to respond to increased concern from your SMB customers.
Learn More about how we can help.
Insights
Microsoft has announced price increases for the SPLA licensing program. Find out which products are affected and how Crayon can help you adapt before new prices take effect in January, 2025.
Vendor Announcements
Microsoft has announced price increases for the SPLA licensing program. Find out which products are affected and how Crayon can help you adapt before new prices take effect in January, 2025.
Webinars Series
Walk through the features of VMware Cloud Foundation and why it is a key tool for Crayon’s cloud partners.
Webinars Series
Tune into our latest CSP Updates session for important changes to pricing, promotion and discount offers and a focus on Secure Productivity with MDR ContraForce.
Training
Find out how our in-house Azure expertise helps you to leverage the full potential of the Azure Migrate and Modernise program.
Training
Which Wasabi consumption model is the right fit for various scenarios? We explore the options.
Case Studies
Cytrack Intelligence Systems founder, Nick Milan talks through why the Crayon ISV Innovation Hub program is the right fit for his business objectives.
Guides and eBooks
Dive into the detail of planned cloud adoptions for SMBs across the APAC region and where they need help from their tech service partners.
Podcast
Dr. Joe and his guests discuss how high-performance culture helps partners to position on value, earn trust and build stronger customer relationships.
Sales and Marketing
Pricing models, service definitions and competitive accelerators. Our latest webinar breaks down how to build a successful MSSP business.
Engage
Running builds, support and pre-sales for Microsoft? The CSP Masters Program is for you! get the details for the Sydney enablement workshop in October.
Blogs
From scrappy start-up to part of a global cloud powerhouse, disruption is in our DNA.
Blogs
An explosion in ransomware attacks has fueled a nationwide review of the issue, as concern rises that secret payoffs add increased fuel to the cybercrime fire.
Press Release
Podcast
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Company Announcements
Press Release
Empowering Partners, MSPs and ISVs with best-in-class protective DNS security solutions
Top 5 most common problems low-code solves for SMBs, what the low-code revenue growth potential for MSPs is, and why now is the time for MSPs to enter the low-code market.
Our latest Cloud Horizons eBook looks at a robust review of cloud tech's past, present, and future, value generation insights, and pathways to cloud profit for MSP’s.
Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.