Back to blog
CybersecurityEssential EightSMBAustraliaACSC

Essential Eight for SMBs: What You Actually Need to Do

22 January 2026
14 min read

Essential Eight for SMBs: What You Actually Need to Do

Most Essential Eight content reads like it was written for government departments with unlimited time and a full IT team.

If you run an Australian SMB, that is not your world.

You have a business to run. Staff to support. Customers to look after.

You still need security, but you need it in the right order.

This guide is a practical way to think about the Essential Eight.

Not as a compliance trophy, but as a risk reduction plan.

First, what the Essential Eight is really about

The Essential Eight is a set of baseline controls recommended by the Australian Cyber Security Centre.

It focuses on the most common ways businesses get hit.

  • Someone clicks a dodgy link
  • A password gets stolen
  • A system does not get patched
  • Ransomware hits
  • Backups do not work

If you handle customer data, rely on systems to deliver work, or just want to avoid a week from hell, this matters.

The biggest mistake SMBs make

The biggest mistake is trying to do everything at once.

You end up doing a little bit of everything and none of it sticks.

A better approach is:

  • Get the basics solid
  • Prove it works
  • Then lift maturity

Security that staff hate does not get followed.

So the goal is strong controls that are also usable.

A practical order of operations

If you want a simple sequence that works for most SMBs, here it is.

  1. MFA and account security

  2. Patching

  3. Backups and restore testing

  4. Admin privilege cleanup

  5. Hardening the common attack surfaces

  6. Application control

You can map that back to the Essential Eight, but this order matches real world risk.

Control 1: Multi factor authentication

If you do one thing this month, do this.

Most breaches we see start with stolen credentials.

A password on its own is not enough.

Where to enforce MFA

  • Email accounts
  • Microsoft 365 and cloud logins
  • Admin accounts
  • Remote access
  • Anything that holds sensitive data

What good looks like

  • Everyone has MFA
  • No exceptions for executives
  • Admin accounts have stronger rules
  • You have a process for lost phones

This is a control that reduces risk fast.

It is also easy to explain to staff.

Control 2: Patch operating systems and apps

Patching is boring, but it stops a lot of attacks.

Attackers do not need a genius exploit. They just need you to be behind.

What to patch first

  • Browsers
  • Microsoft Office
  • PDF readers
  • Operating systems
  • Remote access tools

What good looks like

  • A regular patch cycle
  • Critical patches are applied quickly
  • Updates do not happen randomly in the middle of a work day

SMBs often have patching in name only.

A laptop pops up a message and the user clicks later.

That is not patch management.

Control 3: Backups, plus restore testing

Backups are only useful if you can restore.

A lot of businesses pay for backups they have never tested.

Then ransomware hits and they find out the backups are corrupt or incomplete.

What good looks like

  • Backups run every day
  • You have more than one copy
  • You keep a copy that ransomware cannot encrypt
  • You test restores

Restore tests do not need to be dramatic.

Pick one file share folder or one key system and practise restoring it.

Do it quarterly.

Control 4: Restrict admin privileges

This is where a lot of SMB environments get messy.

Someone needs admin rights to install something, so they get admin rights forever.

Then that account gets phished and the attacker has the keys.

What good looks like

  • Staff have normal accounts for daily work
  • Admin accounts are separate
  • Admin access is limited to the people who need it
  • Admin activity is logged

This control reduces the blast radius.

Even if someone gets compromised, the damage is contained.

Control 5: Hardening

Hardening sounds technical, but the idea is simple.

Remove the easy attack paths.

For SMBs this often means:

  • Locking down macro settings
  • Tightening browser settings
  • Reducing risky plug ins
  • Removing old software that nobody uses

You do not need to turn the business into a fortress.

You just need to remove the obvious holes.

Control 6: Application control

This is usually the hardest one.

It means only approved apps can run.

For many SMBs, doing this perfectly is a long term goal.

A practical way to start

  • Start with admin devices
  • Start with high risk roles
  • Start with blocking known bad categories

The reason it is worth the effort is simple.

If malware cannot run, it cannot do damage.

What maturity looks like in the real world

You do not need to be perfect on day one.

For most SMBs, a realistic goal is:

  • Solid baseline across the basics
  • Consistent processes
  • Visibility and reporting

Then you can lift maturity.

The goal is not to impress someone.

The goal is to avoid downtime, ransom demands, and panic.

The Essential Eight in a Microsoft 365 world

A big chunk of Australian SMBs run on Microsoft 365.

That is fine. It can be very secure.

But you need to configure it properly.

Practical wins include:

  • MFA everywhere
  • Blocking risky sign ins
  • Tightening admin roles
  • Logging and review

If you do not have visibility, you cannot respond.

What to document for your business

Security work that is not documented does not survive staff changes.

At minimum, document:

  • Who has admin access and why
  • How patching is handled
  • What the backup schedule is
  • How to restore
  • Who to call in an incident

This is the difference between a calm response and a mess.

What to do in the first 30 days

If you are starting from scratch, here is a realistic 30 day plan.

Week 1

  • Turn on MFA for email and cloud accounts
  • Remove any old accounts
  • Reset admin passwords

Week 2

  • Confirm patching is happening
  • Patch anything internet facing
  • Set a regular patch window

Week 3

  • Check backups
  • Run a restore test
  • Fix whatever breaks

Week 4

  • Review admin privileges
  • Remove local admin from daily accounts
  • Set a process for elevating access when needed

This is not perfect security.

But it is a massive step up.

What to do if you have a small IT team or no IT at all

If you do not have internal IT, the Essential Eight can feel impossible.

It is not.

You just need to focus on what actually reduces risk.

Start by getting clear answers to these questions.

  • Who can access your email and cloud admin settings
  • Are all staff using MFA
  • When was the last time you tested a restore
  • What devices are out of date
  • Who has admin rights on their laptop

If you cannot answer those quickly, that is your first job.

Once you can answer them, you can fix them.

What to tell staff, in plain English

Most security fails because nobody explains the why.

Here is the plain English version you can tell your team.

  • MFA is there because passwords get stolen
  • Updates are there because old software gets hacked
  • Admin rights are restricted because one compromised laptop can take down the whole business
  • Backups are there so we can recover without paying a ransom

If staff understand the reason, compliance goes up.

If they feel like it is just rules, they will work around it.

A short toolbox talk once a quarter is often enough. Ten minutes. One topic. Simple examples.

It is cheaper than cleaning up a breach.

Even a near miss costs time, stress, and customer trust.

How to keep it from drifting

SMBs do a burst of security work, then it slowly drifts back.

New staff start.

Old laptops stay in service.

Someone gets admin rights for a special job.

A new tool gets added without anyone checking settings.

The way to stop drift is simple.

  • Monthly check in on MFA and admin access
  • A set patch window
  • Quarterly restore test
  • A yearly review of your baseline

It does not need to be a huge program.

It needs to be consistent.

The bottom line

Essential Eight is not a buzzword.

It is a practical baseline.

If you do the basics well, you stop most common attacks.

If you ignore the basics, you are relying on luck.

If you want help getting this in place without disrupting the business, book a consult at /contact/.

We will tell you what matters first, what can wait, and what will make the biggest difference for your environment.