
Blogs
Cytrack.io AI-enabled Productivity Solutions from Crayon
Explore how Cytrack.io solutions meet emerging SMB demand for AI-enabled, unified communications platforms.
The Australian Cyber Security Centre (ACSC) continues to release an alarming series of alerts about escalating cyber threats. The ACSC recommends Australian organisations should: “urgently adopt an enhanced cyber security posture. Organisations should act now and follow ACSC’s advice to improve their cyber security resilience in light of the heightened threat environment.”
The ACSC encourages organisations to implement ACSC’s flagship security framework – called the Essential Eight. It urges organisations to: “review the Essential Eight and prioritise remediating any identified gaps in Essential Eight maturity.”
For SMBs at the start of their cyber security journey, it can seem like a long, complex and costly road. For many SMBs, it can be difficult to know where to start, and also to know how much cyber security is enough.
That’s where the Essential Eight comes in. It removes a lot of the concern and complexity for customers, because ACSC cyber security experts have done most of the thinking and planning for you. They’ve identified the major threats and listed actions to mitigate them. For cost-conscious SMBs, the good news is the Essential Eight is free expert consultancy.
For partners, the Essential Eight provides an easy-to-follow plan that helps you to identify where your services can quickly and cost-effectively implement baseline security mitigation. Each of the Essential Eight mitigations is a building block on the road to beefing up security.
The Essential Eight mitigation strategies are grouped under 3 major themes:
The three major themes and eight mitigation strategies of the Essential Eight are summarised in the table below.
Theme | Mitigation strategy |
Prevent Attacks | Application Control
Patch Applications Configure Microsoft Office Macros User Application Hardening |
Limit Extent of Attacks | Restrict Administrative Privileges
Patch Operating Systems Multi-factor Authentication |
Recover Data & System Availability | Regular Backups |
The beauty of the Essential Eight is it breaks up all the potential security threats and related mitigations into eight digestible chunks and describes in detail what organisations need to do to strengthen their defences against the threats.
SMBs are given a list of actions and metrics for each of the eight mitigations to reduce their risk from cybercrime. When SMBs implement the recommended security standards for each of the eight mitigation strategies, they start to build a joined-up security strategy.
This can then be used as the SMB’s cyber security roadmap. It serves as an action plan and a security policy document that can be understood and communicated to all staff in the business. And importantly, it can serve as a transparent checklist that business leaders can review to ensure their SMB is taking the right steps to keep cybercrime at arm’s length. The Essential Eight security checklist can also be audited as part of compliance processes.
The Essential Eight is the outcome of some serious thinking by highly talented ACSC cyber security experts and provides a practical and realistic starting point for many SMBs.
For partners, Crayon has a service offering that can help you get your customers on the right track. Our Essential Eight maturity assessment offering is ideal whether you have an existing cybersecurity practice or need new ways to respond to increased concern from your SMB customers.
Learn More about how we can help.
Blogs
Explore how Cytrack.io solutions meet emerging SMB demand for AI-enabled, unified communications platforms.
Insights
Explore data trends from the Future of Operations and learn how to turn insights into action in the Productivity domain.
Business
Find out why Veeam Immutable Backup is a solution fit for responding to increased demand for optimised security in backup and recovery data.
Insights
SMB operations in the Asia Pacific region are shifting from traditional backup and disaster recovery toward something more transformative.
Insights
The latest in our Future of Operations insights series looks at why SMBs are pursuing hybrid cloud and multi-cloud strategies to achieve their business objectives.
Training
Explore how Azure can help partners respond to dominant trends within SMB customer cloud strategies.
Business
CSP price and margin matter, but Microsoft's program updates mean partners must weigh up short-term discounts over strategic alignment.
Insights
Rhonda Robati, Executive Vice President of Crayon APAC assesses the factors driving Microsoft's channel strategy and the evolution needed to be a Partner of the Future.
Blogs
Warren Nolan believes Microsoft has invited partners to join them on a new journey to value, and the role of Cloud Distribution providers has never been more critical.
Blogs
After decades of experience navigating seismic shifts in vendor strategy, Warren Nolan knows the importance of being pragmatic and proactive in the face of disruption to the Microsoft CSP Program.
Blogs
In the first of a three-part series, Warren Nolan, SVP Strategy and Channel explores the recently announced updates to the Microsoft CSP program and the opportunities it presents.
Vendor Announcements
Microsoft's new CSP requirements mean Direct Bill partners should take proactive steps to re-evaluate current models. Crayon can help.
Guides and eBooks
The Microsoft Fabric Partner Guide curates our recent articles, videos and resources to accelerate Crayon partner learning.
Blogs
Explore how Crayon gets partners and their customers on the road to data-led innovation and growth.
Guides and eBooks
eBook: The world's greatest detective is on his toughest case yet. Find out how human ingenuity combined with unified data analytics unravels a series of wicked riddles!
Training
Join in-house experts and Solentive for an exploration of how Microsoft Fabric supports the journey to data-driven business for your customers.
Blogs
With Windows 10 nearing end-of-life, it's time for partners to prepare customers for the transition to Windows 11.
Insights
SMBs across the APAC are not just increasing their technology investments—they are making strategic, forward-thinking moves to position themselves for long-term growth.
Insights
Small to medium-sized businesses in the APAC region are gearing up tech investments to drive outcomes for customer experience, revenue, business adaptability and innovation. How will SMBs leverage emerging technologies to achieve their strategic objectives?
Insights
What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!
Case Studies
Working with Crayon, AfterDark scaled its ability to build longer-term cybersecurity engagements with customers.
Vendor Announcements
Microsoft changes to its licensing programs means some customers will not be able to renew EAs. Find out how to transition them to CSP in hours, with no disruption or upfront cost, only with Crayon.
Blogs
An explosion in ransomware attacks has fueled a nationwide review of the issue, as concern rises that secret payoffs add increased fuel to the cybercrime fire.
Press Release
Podcast
Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.
Company Announcements
Press Release
Empowering Partners, MSPs and ISVs with best-in-class protective DNS security solutions
Blogs
Crayon cloud security assessments help partners lock down M365 and Azure environments and build profitable cybersecurity practices. Learn how.
If you want to learn more about emerging ERP opportunities, download Crayon’s eBook
What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!
Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.