b'Webwaves WebwavesSecurity Centre) updated their Essential 8be uninstalled. Additionally, unneeded guidelines, originally released in Februaryfeatures in Microsoft Office should be 2017. These provide eight strategiesdisabled. Flash, ads and Java are popular designed to mitigate cyber securityways to deliver and execute malicious code.incidents and represent a prioritised list of mitigation strategies. This can be viewedMitigation strategies to limit the in full online (https://www.cyber.gov.au/ extent of cyber security incidentspublications/essential-eight-explained) and an abridged version is published below. Restrict administrative privilegesThe Essential 8 are grouped into threeUsers should not be running with an sections; to prevent malware, limit theadmin account. Elevated privileges extent of malware, and recover data. should be dropped when not needed. Ian JamesThey allow full access to the system for ASEG WebmasterMitigation strategies to preventany code that is run.webmaster@aseg.org.au malware delivery and executionPatch operating systemsEssential 8 Application whitelisting Dont use unsupported versions of To prevent non-approved applicationsoperating systems and patch your In this issue of Preview I am going to beand malicious code from executing, it isoperating system within 48 hours looking at viruses, malware and otherrecommended to only allow trusted andof extreme risk vulnerabilities. security vulnerabilities on modernapproved programmes to run. These vulnerabilities can be used to electronic devices, and some bestcompromise the system.practices for protecting you and your data. Patch applicationsHeartbleed, Spectre, Meltdown. No, ImMultifactor Authenticationnot listing Bond films or villains. TheseSoftware should be regularly updated. AnyIf performing a privileged action, are some of the names of vulnerabilitiessecurity patches should be applied withinor accessing highly sensitive data, that have been found on computers in48 hours of release. Security patches andmultifactor authentication should be the past decade. Some of these exploitupdates are designed to fix vulnerabilitiesused. Think withdrawing money from the microprocessors used in our devices.in software that can be used to executea bank account: you need both your Others, like Heartbleed, are vulnerabilitiesmalicious code. card (something you have) and your PIN in OpenSSL, used by some of the mostConfigure Microsoft Office macro settings (something you know).popular websites. Every Intel processor that has been released since 1995 isWhile you are ideally operating a Unix/ Mitigation strategies to recover affected by Meltdown. Spectre canLinux environment, for those runningdata and system availabilityexploit a wide variety of devices includingMicrosoft applications it is highly smartphones, and has been verified onrecommended that only vetted macrosDaily backupsIntel, AMD and ARM processors. from trusted locations are allowed toUsers should keep daily (or more The Australian Government has a seriesrun. Macros can be used to executefrequent) backups of important or of recommendations for ensuring cybermalicious code. changed data. Restoration should be security and protecting you and yourUser application hardening tested on a regular basis and when IT business from threats (and avoiding theinfrastructure changes. This prevents virus aquarium shown in the cartoon).Web browsers should be configured toransomware incidents.In 2019, the ACSC (Australian Cyberblock ads and Java, and Flash shouldBreaking newsNon-members of the ASEG can now sign up for email reminders for the latest issue of Preview. Head over to https://www.aseg.org.au/publications/PVCurrent and simply sign up to receive email notifications every time an issue of Preview is released. Members of ASEG will continue to receive email notifications when new issues are published.There are other works in the pipeline for the website that will improve the user experience and add additional features. If youd like to help out with the website, A virus aquarium (https://www.xkcd.com/350) please email webmaster@aseg.org.au.43 PREVIEW OCTOBER 2019'