Essential Eight security stack: protecting your business at
three levels
Most IT providers install antivirus and call it done. That covers one angle. CIO Tech's Security Stack covers three: prevention, detection, and recovery. Built on the ACSC Essential Eight framework, backed by endpoint detection, and protected by immutable backups. Every CIO Tech Assured client gets all three layers, included as standard.
Essential Eight: the baseline your business needs
The Essential Eight is a set of eight security controls created by the ACSC (Australian Cyber Security Centre). It is the baseline the Australian Government recommends for every organisation. CIO Tech implements five of these controls at Level 1 across every Assured client.
Multi-factor authentication (MFA)
Every login to email, VPN, and admin accounts requires a second verification step. A stolen password alone is not enough to get in.
Patch management
Critical security patches are applied within 48 hours of release. Not when someone gets around to it. Within 48 hours, because the exploit is already live.
Restrict admin privileges
Only the people who need full system access have it. Everyone else works with standard permissions. This limits the damage if any single account is compromised.
Microsoft Office macro controls
Macros are small programs that run inside Word, Excel, and other Office files. They are a common way malware enters a business. We lock down macros and disable risky features.
Application control
Only approved software can run on your devices. If an employee downloads something that is not on the approved list, it does not execute. This blocks ransomware, cryptominers, and other malicious programs before they start.
These five controls address the most common ways Australian businesses get breached. They do not cover every threat. That is why the Security Stack has two more layers.
Endpoint detection that catches what prevention misses
EDR stands for Endpoint Detection and Response. It is software installed on every device in your business that watches for suspicious behaviour in real time. If something acts like ransomware, EDR catches it and isolates the device before it spreads.
Real-time threat detection
EDR monitors every device continuously. It does not wait for a scheduled scan. If a file starts encrypting other files, the signature behaviour of ransomware, it triggers immediately.
Automatic isolation
When a threat is detected, the infected device is quarantined from the network within seconds. The rest of your business keeps running while we deal with the compromised machine.
24/7 telemetry and alerting
Every device sends security data back to a central dashboard around the clock. If something unusual happens at 2am on a Saturday, the alert fires. It does not wait until Monday.
Forensic investigation
After an incident, EDR provides a full trace of what happened: how the threat got in, what it touched, and how far it spread. You need this for insurance claims and compliance reporting.
Antivirus catches known threats. EDR catches unknown behaviour. For a small business, that is the difference between a blocked attack and a full-scale breach.
Backups that ransomware cannot touch
Most businesses have some kind of backup. The question is whether it would actually work when you need it, and whether ransomware could delete it before you get the chance to restore. CIO Tech uses the 3-2-1 backup strategy with immutable storage.
Copies of your data
Three separate copies at all times. If one fails, two remain. If two fail, one remains.
Different storage types
Local disk and cloud storage, for example. This protects against a failure that takes out one type of storage entirely.
Copy offsite
At least one copy in a physically separate location. Fire, flood, theft, the offsite copy survives.
Immutable storage
Immutable means the backup cannot be changed or deleted. Not by ransomware, not by a compromised admin account, not by anyone. Once written, it is locked. This is the feature that separates a real backup from one that ransomware erases on the way in.
Monthly restore testing
A backup you have never tested is a backup you cannot trust. We run recovery drills and restore tests every month to verify that your data can actually be recovered.
Prevention. Detection. Recovery. They work together.
No single layer is enough on its own. Essential Eight controls prevent the most common attacks from getting through. But no prevention is perfect, so EDR detects the threats that slip past. And if something does get through both layers, immutable backups mean your data is recoverable.
Take ransomware as the example. Essential Eight blocks the most common delivery methods: malicious macros, unpatched software, compromised admin accounts. If a new variant gets through, EDR detects the encryption behaviour and isolates the device. And if somehow it spreads before EDR catches it, your immutable backups let you restore everything without paying a ransom.
That is three chances to stop the same attack. Most businesses are running on zero.
Every CIO Tech Assured plan (Essentials, Business, and Dedicated) includes the full Security Stack. This is not a premium add-on. It is the standard.
Questions we hear from business owners
What is the Essential Eight?
Do I need EDR if I already have antivirus?
What makes a backup immutable?
Is the Security Stack enough for cyber insurance?
Ready to get your IT sorted?
Start with a 90-day IT Audit to see exactly where you stand. Or take our free maturity assessment for a quick snapshot.