At AnalyseMySite, we provide a quick and comprehensive cybersecurity assessment to help you understand your current risk level and identify the gaps in your digital defences.

Our free form-based evaluation covers the Essential Eight cyber mitigation strategies developed by the Australian Cyber Security Centre (ACSC), as well as additional measures that enhance your organisation’s security posture.

Notifiable Data Breach Compliance Criteria

Essential Eight Controls

Instructions:

For each question, select "Yes" if your organisation fully meets the criteria, or "No" if it does not. This assessment will help you evaluate your cybersecurity posture based on the Australian Government’s Essential Eight mitigation strategies.

Application Control

Why This Matters: Application control prevents the execution of malware and unauthorised software by only allowing approved applications to run on systems.

Patch Applications

Why This Matters: Regular patching of applications reduces the risk of exploitation by addressing known vulnerabilities.

Restrict Microsoft Office Macros

Why This Matters: Macros are commonly used in phishing and malware attacks, so restricting their use helps prevent malicious activity.

Configure Web Browsers

Why This Matters: Disabling outdated or risky features reduces exposure to vulnerabilities and malware.

Privileged Account Access

Why This Matters: Maintaining least-privilege access and monitoring administrative accounts helps prevent privilege misuse and cyberattacks.

Patch Operating Systems

Why This Matters: Regular patching of operating systems ensures that security vulnerabilities are addressed promptly.

Multi-Factor Authentication (MFA)

Why This Matters: MFA provides an additional layer of security, ensuring that even if credentials are compromised, unauthorised access is prevented.

Backup and Recovery

Why This Matters: Regular backups and tested recovery processes ensure business continuity in the event of data loss or ransomware attacks.

Bonus Cybersecurity Measures

These additional questions are designed to assess advanced cybersecurity practices beyond the Essential Eight.

Endpoint Detection and Response (EDR)
Managed Detection and Response (MDR)
DNS Filtering
Password Management
Cybersecurity Awareness Training
NDB Compliance Criteria
Essential Eight Controls
Bonus Cybersecurity Measures
0%