The Australian Signals Directorate (ASD) lays out eight essential mitigation strategies as a baseline for your security mitigation. Implemented correctly, the ASD claims that ASD Essential 8 will mitigate up to 85% of the most common cyber threats.
The Missing Link did a great job delivering the first step on our digital security journey. Our network refresh replaced ageing equipment with more modern technology to prevent, detect and respond to the growing digital threats. The Missing Link also worked to incorporate other security focused solutions via the ASD as a Service. This combined approach has allowed us to take a proactive and significant step forward in protecting our corporate and regulatory data. The Missing Link has always gone above and beyond, our relationship with them is a proper partnership.
The Missing Link helped us to understand our current level of maturity against the ASD Essential 8. The expertise and in-depth knowledge provided by their Security Consultants helped us immensely to decipher where we currently stand, and they delivered a roadmap to improve our overall security posture as well. Their team were very easy to deal with, and at the end of the project they delivered a brilliant report that included concise action items. I would highly recommend The Missing Link to any organisation looking to implement the ASD Essential 8.
Working with The Missing Link has fundamentally changed the way we do things. They have identified outdated processes that other IT experts have not commented on, and they’ve given us guidance on how to fix them with clear start and endpoints. The Missing Link’s advice and service are incredibly good, we would recommend them to anybody needing to meet ISO standards.
"We’d been working towards aligning our organisation with the Australian Signals Directorate Essential Eight (ASD8), but when our executive team made it a priority, we knew we had to bring in external support. The Missing Link was the obvious solution – they’d been working with us since we operated from internal servers, had migrated us to the cloud, and were managing our infrastructure. They knew our business so well that they barely needed a brief. They completed a Security Controls Review, identified areas needing work and provided full costings. Now we’re working together to reach ASD8 maturity.”