How to Implement the Essential Eight on a Small Business Budget
The Essential Eight doesn't have to be expensive — here's how Australian small businesses can reach Maturity Level 1 without breaking the bank.
The Australian Cyber Security Centre's Essential Eight is the gold standard framework for protecting Australian businesses from cyber threats. But mention it to most small business owners and you'll get a look of concern — surely implementing a government security framework requires a dedicated IT team and a significant budget?
The reality is more encouraging. Several Essential Eight controls cost nothing. Others are already included in tools you're probably already paying for. And reaching Maturity Level 1 — the baseline that meaningfully reduces your risk — is achievable for most small businesses without an IT consultant on retainer.
What Is the Essential Eight?
The Essential Eight is a set of eight mitigation strategies developed by the ACSC to help organisations protect against the most common cyber threats. It's not a compliance checklist — it's a practical set of controls that collectively make it much harder for attackers to compromise your systems, move around inside them, or cause lasting damage.
Each control has three maturity levels. Maturity Level 1 is the starting point — basic implementation that addresses the most common attack techniques. That's the target for most small businesses.
The Eight Controls and What They Cost
1. Application Control — Free
Application control means only allowing approved software to run on your devices. Windows includes a built-in feature called AppLocker (available on Windows Pro and Enterprise) that can do this. The cost is zero; the time investment is a few hours to configure. For many small businesses, a simpler approach — removing the ability for staff to install software without approval — achieves much of the same effect.
2. Patch Applications — Free
Keeping your applications updated to close known security vulnerabilities. Most modern software patches itself automatically if you allow it to. Turn on automatic updates for your browsers, Office suite, PDF reader, and any other regularly used software. Check your update settings now — this costs nothing and takes minutes.
3. Configure Microsoft Office Macro Settings — Free
Macros in Microsoft Office documents are a common way attackers deliver malware. Restricting macros to only run when they come from trusted, digitally signed sources significantly reduces this risk. This is a settings change inside Microsoft 365 or the standalone Office application — no additional software required. Microsoft's own documentation walks you through it step by step.
4. User Application Hardening — Free to Low Cost
This involves configuring browsers and other applications to block or restrict features commonly exploited by attackers — like web advertisements that can carry malware. Installing a reputable ad blocker on all business browsers (uBlock Origin is free and widely recommended) is a practical first step. Disabling Flash (now obsolete) and restricting Java in browsers covers more ground.
5. Restrict Administrative Privileges — Free
Admin accounts are powerful — they can install software, change system settings, and access sensitive data. If a staff member's everyday account has admin rights and they click a malicious link, the attacker inherits those same rights. The fix: create separate admin accounts used only when needed, and ensure everyday user accounts have standard privileges only. This costs nothing but takes some time to set up correctly.
6. Patch Operating Systems — Free
Just like patching applications, keeping Windows or macOS updated closes vulnerabilities attackers actively exploit. Enable automatic operating system updates on every device used for work. If you're running Windows 10 and haven't upgraded to Windows 11, check whether your devices are eligible — Windows 10 reaches end of support in October 2025, which means no more security patches.
7. Multi-Factor Authentication — Often Already Included
MFA requires users to verify their identity with something beyond just a password — typically a code from an app on their phone. This is one of the most effective controls available because it stops the vast majority of account compromise attacks, even when passwords are stolen.
If you use Microsoft 365 or Google Workspace, MFA is already included in your subscription at no extra cost. Enabling it is a settings change in the admin console. Do this for all accounts — email, accounting software, cloud storage, everything. The Microsoft Authenticator and Google Authenticator apps are free.
8. Regular Backups — Low Cost
Backing up your data regularly — and keeping backups separate from your main systems — means that if ransomware hits or data is accidentally deleted, you can recover without paying a ransom or losing everything. Cloud backup services like Backblaze cost around $10 AUD per month per device. Microsoft 365 includes basic OneDrive storage, though a dedicated backup solution that retains multiple versions of files is more robust.
What to Prioritise First
If you're starting from scratch, tackle these four controls first — they address the most common attack methods and cost the least:
- Enable MFA on all business accounts immediately
- Enable automatic updates for your operating system and all applications
- Remove admin rights from everyday user accounts
- Set up automated backups with offsite or cloud storage
Once these are in place, work through restricting macros, configuring application control, and hardening your browsers.
Free Resources to Help You
The ACSC provides free, plain-English guidance for each Essential Eight control at cyber.gov.au. The Small Business Cyber Security Guide is a particularly useful starting point. You don't need to pay for a consultant to get started — the documentation is genuinely accessible to non-technical business owners.
Many banks, industry associations, and state government programs also offer free cyber security assessments for small businesses. Search for your state's small business support programs — you may find free advice is already available to you.
The Bottom Line
Reaching Essential Eight Maturity Level 1 is not a luxury reserved for large organisations with dedicated IT teams. It's an achievable goal for a small business owner who is willing to spend a few evenings working through the controls. The cost is mostly time, not money. And the risk you're reducing — ransomware, account takeover, data theft — represents a genuine threat to your business's survival. Start with MFA and automatic updates today. Build from there.
Free tool
Know your cyber risk in 15 minutes
50 plain-English questions. Prioritised recommendations. Free PDF report. No sign-up.
Start free assessment →Frequently asked questions
How much does it cost to implement the Essential Eight?
Several of the Essential Eight controls cost nothing beyond staff time — including restricting admin privileges, patching applications, and configuring application control through built-in operating system features. Others, like multi-factor authentication, are often included free in existing Microsoft 365 or Google Workspace subscriptions. A small business aiming for Maturity Level 1 can realistically get there for very little money, especially if they already pay for a mainstream productivity suite.
Which Essential Eight controls should a small business do first?
Prioritise multi-factor authentication and patching first — they address the highest volume of real-world attacks. MFA stops the majority of account compromise attempts, and patching closes the vulnerabilities attackers actively exploit. After those, focus on restricting admin privileges and configuring automatic backups. These four controls together significantly reduce your risk profile without requiring specialist knowledge or expensive tools.
Can I implement the Essential Eight without an IT consultant?
For Maturity Level 1, yes — most of the controls can be configured by a reasonably tech-comfortable business owner using guides from the ACSC website. Controls like enabling MFA, setting up automatic updates, restricting who has admin accounts, and configuring cloud backups are well-documented and don't require specialist skills. That said, if you have more than ten staff or complex systems, a one-off session with an IT professional to review your setup is money well spent.
Tags