Essential Eight for SMBs: What You Actually Need to Do
Most Essential Eight content reads like it was written for government departments with unlimited time and a full IT team.
If you run an Australian SMB, that is not your world.
You have a business to run. Staff to support. Customers to look after.
You still need security, but you need it in the right order.
This guide is a practical way to think about the Essential Eight.
Not as a compliance trophy, but as a risk reduction plan.
First, what the Essential Eight is really about
The Essential Eight is a set of baseline controls recommended by the Australian Cyber Security Centre.
It focuses on the most common ways businesses get hit.
- Someone clicks a dodgy link
- A password gets stolen
- A system does not get patched
- Ransomware hits
- Backups do not work
If you handle customer data, rely on systems to deliver work, or just want to avoid a week from hell, this matters.
The biggest mistake SMBs make
The biggest mistake is trying to do everything at once.
You end up doing a little bit of everything and none of it sticks.
A better approach is:
- Get the basics solid
- Prove it works
- Then lift maturity
Security that staff hate does not get followed.
So the goal is strong controls that are also usable.
A practical order of operations
If you want a simple sequence that works for most SMBs, here it is.
-
MFA and account security
-
Patching
-
Backups and restore testing
-
Admin privilege cleanup
-
Hardening the common attack surfaces
-
Application control
You can map that back to the Essential Eight, but this order matches real world risk.
Control 1: Multi factor authentication
If you do one thing this month, do this.
Most breaches we see start with stolen credentials.
A password on its own is not enough.
Where to enforce MFA
- Email accounts
- Microsoft 365 and cloud logins
- Admin accounts
- Remote access
- Anything that holds sensitive data
What good looks like
- Everyone has MFA
- No exceptions for executives
- Admin accounts have stronger rules
- You have a process for lost phones
This is a control that reduces risk fast.
It is also easy to explain to staff.
Control 2: Patch operating systems and apps
Patching is boring, but it stops a lot of attacks.
Attackers do not need a genius exploit. They just need you to be behind.
What to patch first
- Browsers
- Microsoft Office
- PDF readers
- Operating systems
- Remote access tools
What good looks like
- A regular patch cycle
- Critical patches are applied quickly
- Updates do not happen randomly in the middle of a work day
SMBs often have patching in name only.
A laptop pops up a message and the user clicks later.
That is not patch management.
Control 3: Backups, plus restore testing
Backups are only useful if you can restore.
A lot of businesses pay for backups they have never tested.
Then ransomware hits and they find out the backups are corrupt or incomplete.
What good looks like
- Backups run every day
- You have more than one copy
- You keep a copy that ransomware cannot encrypt
- You test restores
Restore tests do not need to be dramatic.
Pick one file share folder or one key system and practise restoring it.
Do it quarterly.
Control 4: Restrict admin privileges
This is where a lot of SMB environments get messy.
Someone needs admin rights to install something, so they get admin rights forever.
Then that account gets phished and the attacker has the keys.
What good looks like
- Staff have normal accounts for daily work
- Admin accounts are separate
- Admin access is limited to the people who need it
- Admin activity is logged
This control reduces the blast radius.
Even if someone gets compromised, the damage is contained.
Control 5: Hardening
Hardening sounds technical, but the idea is simple.
Remove the easy attack paths.
For SMBs this often means:
- Locking down macro settings
- Tightening browser settings
- Reducing risky plug ins
- Removing old software that nobody uses
You do not need to turn the business into a fortress.
You just need to remove the obvious holes.
Control 6: Application control
This is usually the hardest one.
It means only approved apps can run.
For many SMBs, doing this perfectly is a long term goal.
A practical way to start
- Start with admin devices
- Start with high risk roles
- Start with blocking known bad categories
The reason it is worth the effort is simple.
If malware cannot run, it cannot do damage.
What maturity looks like in the real world
You do not need to be perfect on day one.
For most SMBs, a realistic goal is:
- Solid baseline across the basics
- Consistent processes
- Visibility and reporting
Then you can lift maturity.
The goal is not to impress someone.
The goal is to avoid downtime, ransom demands, and panic.
The Essential Eight in a Microsoft 365 world
A big chunk of Australian SMBs run on Microsoft 365.
That is fine. It can be very secure.
But you need to configure it properly.
Practical wins include:
- MFA everywhere
- Blocking risky sign ins
- Tightening admin roles
- Logging and review
If you do not have visibility, you cannot respond.
What to document for your business
Security work that is not documented does not survive staff changes.
At minimum, document:
- Who has admin access and why
- How patching is handled
- What the backup schedule is
- How to restore
- Who to call in an incident
This is the difference between a calm response and a mess.
What to do in the first 30 days
If you are starting from scratch, here is a realistic 30 day plan.
Week 1
- Turn on MFA for email and cloud accounts
- Remove any old accounts
- Reset admin passwords
Week 2
- Confirm patching is happening
- Patch anything internet facing
- Set a regular patch window
Week 3
- Check backups
- Run a restore test
- Fix whatever breaks
Week 4
- Review admin privileges
- Remove local admin from daily accounts
- Set a process for elevating access when needed
This is not perfect security.
But it is a massive step up.
What to do if you have a small IT team or no IT at all
If you do not have internal IT, the Essential Eight can feel impossible.
It is not.
You just need to focus on what actually reduces risk.
Start by getting clear answers to these questions.
- Who can access your email and cloud admin settings
- Are all staff using MFA
- When was the last time you tested a restore
- What devices are out of date
- Who has admin rights on their laptop
If you cannot answer those quickly, that is your first job.
Once you can answer them, you can fix them.
What to tell staff, in plain English
Most security fails because nobody explains the why.
Here is the plain English version you can tell your team.
- MFA is there because passwords get stolen
- Updates are there because old software gets hacked
- Admin rights are restricted because one compromised laptop can take down the whole business
- Backups are there so we can recover without paying a ransom
If staff understand the reason, compliance goes up.
If they feel like it is just rules, they will work around it.
A short toolbox talk once a quarter is often enough. Ten minutes. One topic. Simple examples.
It is cheaper than cleaning up a breach.
Even a near miss costs time, stress, and customer trust.
How to keep it from drifting
SMBs do a burst of security work, then it slowly drifts back.
New staff start.
Old laptops stay in service.
Someone gets admin rights for a special job.
A new tool gets added without anyone checking settings.
The way to stop drift is simple.
- Monthly check in on MFA and admin access
- A set patch window
- Quarterly restore test
- A yearly review of your baseline
It does not need to be a huge program.
It needs to be consistent.
The bottom line
Essential Eight is not a buzzword.
It is a practical baseline.
If you do the basics well, you stop most common attacks.
If you ignore the basics, you are relying on luck.
If you want help getting this in place without disrupting the business, book a consult at /contact/.
We will tell you what matters first, what can wait, and what will make the biggest difference for your environment.