Plain-English guide to the ACSC Essential Eight for Perth medical practices. What each control means for healthcare, maturity levels to target, and a 90-day implementation roadmap.

# Essential Eight Compliance for Medical Practices: A Practical Guide for Perth Clinics
If you've applied for cyber insurance lately, asked your IT provider about security compliance, or been through a recent RACGP accreditation review, you've probably heard about the Essential Eight. It sounds technical. It is technical. But the core idea is simple: the Australian Cyber Security Centre (ACSC) identified eight security controls that, if properly implemented, would prevent the vast majority of cyber attacks on Australian organisations.
For medical practices in Perth, the Essential Eight isn't just a government checkbox. It's increasingly what insurers, accreditation bodies, and even referral networks expect to see. More importantly, it's practical โ these eight controls are achievable by any clinic with the right IT support in place.
Many Perth medical practices and specialist clinics are now being asked by insurers and accreditation assessors about their cybersecurity posture. The Essential Eight framework has become one of the most referenced security models for healthcare organisations across Australia.
This guide explains what each control means, why it matters to a healthcare setting specifically, and what "good enough" looks like for a typical Perth GP practice or specialist clinic.
---
Essential Eight for Medical Practices โ Quick Summary
The Essential Eight is a cybersecurity framework from the Australian Cyber Security Centre designed to protect organisations from common cyber attacks.
For medical practices, the framework focuses on:
- Protecting patient data and health records
- Preventing ransomware attacks on clinical systems
- Ensuring secure access to clinical software and email
- Maintaining reliable, tested backups
What Is the Essential Eight?
The Essential Eight was developed by the Australian Signals Directorate (ASD) as a prioritised set of mitigation strategies for defending against cyber threats. It was originally aimed at government agencies, but the ACSC now recommends it for all Australian organisations โ including small and medium-sized businesses like medical practices.
The eight controls are grouped into three objectives:
Prevent cyber security incidents:
1. Application control
2. Patch applications
3. Configure Microsoft Office macro settings
4. User application hardening
Limit the extent of incidents:
5. Restrict administrative privileges
6. Patch operating systems
7. Multi-factor authentication (MFA)
Recover data and system availability:
8. Regular backups
| Essential Eight Control | Why It Matters for Clinics |
|---|---|
| --- | --- |
| Application Control | Prevents unauthorised software or malware from running |
| Patch Applications | Fixes vulnerabilities exploited by ransomware |
| Configure Office Macros | Blocks malicious macros and scripts in documents |
| User Application Hardening | Protects browsers and PDF readers from exploits |
| Restrict Admin Privileges | Prevents attackers gaining full system control |
| Patch Operating Systems | Protects Windows servers and workstations |
| Multi-Factor Authentication | Secures remote access, email, and cloud systems |
| Regular Backups | Enables recovery after ransomware or data loss |
---
Why Medical Practices Need to Care
Healthcare is one of the top-targeted sectors for cyber attack in Australia. The reasons aren't complicated: patient records contain everything a criminal needs โ Medicare numbers, addresses, dates of birth, health history, financial details. A single patient record is worth more on the dark web than a credit card number.
The Medibank breach in 2022 exposed 9.7 million Australians' health records. The Australian Digital Health Agency (ADHA) has made it clear that all participants in the My Health Record system need to meet baseline security standards. RACGP accreditation increasingly includes IT security as a review criterion.
Beyond compliance, there's a practical reality: a ransomware attack on a medical practice means you can't access patient records, can't look up medications, can't process pathology results. The average cost of a cyber incident for an Australian SMB now exceeds $46,000. For a clinic, the reputational and operational damage can be far worse.
The Essential Eight gives you a defensible framework for saying: "We've done the work. Here's what we have in place."
The Eight Controls Explained for Medical Practices
1. Application Control
What it means: Only software that has been approved by your practice can run on your computers. If a staff member accidentally downloads malware, or a USB stick is plugged in with something malicious, the program simply can't execute.
In a medical practice context: This is especially relevant for reception workstations and computers used by multiple staff members. Clinical software like Best Practice, Medical Director, and Genie are whitelisted; everything else is blocked.
Practical implementation: Application control is typically configured by your IT provider through tools like Windows Defender Application Control or AppLocker. At Maturity Level 1, the focus is on preventing execution of malicious code from standard user accounts.
Effort level: Medium-to-high โ this requires planning and ongoing management as software needs updating.
2. Patch Applications
What it means: Keep all your software up to date. When vendors release security patches for Acrobat, Chrome, your clinical software, or any other application, those patches need to be applied promptly โ within two weeks for standard patches, within 48 hours for critical vulnerabilities.
In a medical practice context: Clinical software like Best Practice has regular updates that include both feature improvements and security fixes. Many practices delay these updates to avoid disrupting workflows, which is understandable โ but it creates risk. A good IT provider will test and schedule updates out of hours so they don't interrupt patient care.
Practical implementation: Automated patch management tools (included in most managed IT services) handle this. Your IT provider should be able to show you a patch compliance report on request.
Effort level: Low if automated by your IT provider, high if you're doing it manually.
3. Configure Microsoft Office Macro Settings
What it means: Macros are small programs that can run inside Word, Excel, or other Office documents. They're a common delivery mechanism for malware โ a staff member opens an email attachment that looks like an invoice or referral, and the macro runs in the background and installs ransomware.
In a medical practice context: Reception staff regularly open documents from patients and external providers. Disabling macros from untrusted sources significantly reduces the risk of this attack vector.
Practical implementation: Microsoft 365 has centrally managed macro policies. Your IT provider can configure these via Group Policy or Microsoft Intune so staff can't accidentally enable macros from untrusted sources. Legitimate macros used internally (e.g., in billing templates) can be signed and whitelisted.
Effort level: Low โ a single policy setting managed by your IT provider.
4. User Application Hardening
What it means: Disable features in common applications that aren't needed and are commonly exploited. This includes things like Internet Explorer compatibility mode in Edge, Flash Player, and advertisement scripts in browsers.
In a medical practice context: Workstations used for clinical work don't need outdated browser features or ad-supported functionality. Disabling these reduces the attack surface without affecting workflow.
Practical implementation: Configured through browser group policies and Windows security settings. Most modern managed IT environments do this as standard.
Effort level: Low โ mostly configuration managed by IT.
5. Restrict Administrative Privileges
What it means: Only users who genuinely need administrator access should have it. The GP, the nurses, and reception staff should be logging in as standard users โ not as administrators.
In a medical practice context: This is one of the most commonly misconfigured settings in smaller practices. When a practice first sets up their computers, IT providers sometimes give everyone admin access because it's easier. But admin accounts can install software, change security settings, and do significant damage if compromised. A standard user account, even if compromised, has much more limited impact.
Practical implementation: Your IT provider audits user accounts and removes unnecessary admin privileges. Admin accounts are separate, named accounts used only for administrative tasks โ similar to the M365 admin account separation we covered in our Microsoft 365 security article.
Effort level: Medium โ requires an initial audit and some staff education.
6. Patch Operating Systems
What it means: Keep Windows (or macOS) itself up to date. Operating system patches close vulnerabilities that attackers actively exploit. This is separate from application patching โ it specifically covers the OS itself.
In a medical practice context: This includes not running end-of-life operating systems. Windows 10 reaches end of life in October 2025. Any practice still running Windows 10 on internet-connected computers needs a plan to upgrade. Windows 7 and earlier are already well past this point and should not be present in any clinical environment.
Practical implementation: Automated OS update management, typically included in managed IT services. At Maturity Level 1, critical patches are applied within one month; at Level 2, within two weeks.
Effort level: Low if managed by IT, high if you're managing updates manually across multiple workstations.
7. Multi-Factor Authentication (MFA)
What it means: Logins require more than just a password โ a second verification step (usually a phone app or SMS code) is required. This means that even if a password is compromised, an attacker can't log in without also having access to the second factor.
In a medical practice context: MFA should be enabled for:
- Microsoft 365 (email, Teams, SharePoint)
- Remote access to the practice network or server
- Any cloud-based systems containing patient data
- Practice management software portals (where available)
Practical implementation: Microsoft 365 security defaults enforce MFA for all users. For Windows logins, tools like Duo or Windows Hello can add a second factor. This is covered in detail in our M365 security settings guide.
Effort level: Low-medium โ setup takes time but is straightforward with the right IT provider.
8. Regular Backups
What it means: Back up your data regularly. Test those backups. Store copies offline or in a separate cloud environment so that ransomware can't encrypt your backups along with your live data.
In a medical practice context: Your backups should cover:
- The clinical database (Best Practice, Medical Director, Genie)
- Microsoft 365 data (email, SharePoint, OneDrive โ Microsoft does NOT back this up for you)
- Accounting and billing data
- Any locally stored documents, templates, or files
Practical implementation: A managed backup solution covering both on-premise data and M365. Backups stored in a geographically separate location (separate cloud region, not just a USB drive in the server room).
Effort level: Low once set up โ the main risk is practices that set up a backup years ago and have never tested whether it actually restores.
What Maturity Level Should Your Practice Target?
For most Perth GP practices and specialist clinics, Maturity Level 1 is the practical minimum, and Maturity Level 2 is the appropriate target:
| Level | What it means | Right for |
| ------- | -------------- | ----------- |
| Level 0 | Not implemented | Not acceptable for any practice handling patient data |
| Level 1 | Basic controls in place, mitigation partially effective | Small practices โ minimum viable compliance |
| Level 2 | Matured controls, mitigation mostly effective | Most GP practices and specialist clinics โ recommended target |
| Level 3 | Full implementation aligned with government standards | Large multi-site practices, hospital networks |
Getting Started: A Practical Roadmap
If you haven't assessed your practice against the Essential Eight, here's where to start:
Quick wins (do these first):
- Enable MFA on Microsoft 365 for all users
- Confirm automated OS patching is running
- Restrict admin privileges โ remove admin access from standard user accounts
- Configure Microsoft Office macro settings
- Verify your backup solution covers all critical data and test a restore
- Ask your IT provider for a patch compliance report
- Conduct an application control review
- Complete a full Essential Eight maturity assessment
- Document your current maturity level and create a plan to reach Level 2
How SkyComm Helps Perth Practices Meet the Essential Eight
As Perth's specialist medical IT provider and cybersecurity solutions partner and a certified Magentus Adviser, we work with GP clinics, specialist practices, and allied health providers across WA. We provide:
Typical Essential Eight improvements we implement include:
- Multi-factor authentication for Microsoft 365 and remote access
- Secure off-site backups with monthly restore testing
- Automated patch management for Windows systems and clinical software
- Restricted administrator access across all workstations
- Endpoint protection and monitoring (EDR)
- Essential Eight maturity assessments โ where your practice currently sits across all eight controls
- Remediation planning โ prioritised roadmap to reach your target maturity level
- Implementation and ongoing management โ automated patching, MFA deployment, backup monitoring, application control configuration
- Documentation for accreditation โ evidence packages for RACGP reviews, cyber insurance applications, and other compliance requirements
Frequently Asked Questions
Do medical practices legally have to comply with the Essential Eight?
The Essential Eight isn't currently a legal mandate for most private medical practices (unlike some government health agencies). However, the Privacy Act requires that you take reasonable steps to protect personal information โ and if your practice suffers a breach and you hadn't implemented basic controls, regulators increasingly look at Essential Eight compliance as the benchmark for "reasonable steps."
How does the Essential Eight relate to RACGP accreditation?
RACGP accreditation doesn't specifically require Essential Eight compliance, but it does require evidence of systematic IT security policies and controls. The Essential Eight provides a recognised framework that maps well onto RACGP's IT security expectations and gives you a structured way to document your approach.
Is the Essential Eight the same as ISO 27001?
No. ISO 27001 is a broader international information security management standard โ much more comprehensive, more expensive to achieve, and typically pursued by larger organisations. The Essential Eight is specifically designed for Australian SMBs and is a more practical target for most medical practices.
What does a maturity assessment cost?
For existing SkyComm managed IT clients, an Essential Eight assessment is included in our regular security reviews. For new clients, we offer a standalone assessment โ contact us for current pricing.
Can we do the Essential Eight ourselves without an IT provider?
Some elements โ like testing your backups or reviewing who has admin access โ can be done in-house. But most of the technical controls (application control, OS hardening, automated patching, MFA configuration) require IT expertise to implement correctly and maintain ongoing. Attempting these without the right knowledge often results in misconfiguration that creates a false sense of security.
Does Essential Eight apply to cloud systems like Microsoft 365?
Yes. Controls such as multi-factor authentication, patching, and privilege management apply to cloud platforms as well as on-premise systems. Our Microsoft 365 security guide covers the specific M365 settings that map to Essential Eight controls.
---
Related Articles
- Medical Practice Cybersecurity Compliance Checklist
- Microsoft 365 Security for Medical Practices: 10 Settings to Check
- Cyber Insurance for Medical Practices in Perth
- Medical IT Support Perth โ Complete Guide
- Medical IT Services & Support Perth
- Managed IT Services
- Cybersecurity Solutions
- Cloud IT Solutions
- Managed IT Services
- Cybersecurity Solutions
- Cloud IT Solutions
This guide is based on SkyComm's experience supporting medical practices across Perth implementing the Essential Eight cybersecurity framework.
SkyComm is Perth's specialist medical IT support provider. We provide managed IT, cybersecurity, and clinical software support for GP clinics, dental practices, specialists, and allied health across Western Australia. Contact us on 1800 957 977 or visit our contact page.
SkyComm IT Solutions
Perth's leading medical and business IT support provider. Trusted by healthcare practices, law firms, and businesses across Western Australia for over 20 years.



