Going back to security basics – embracing the Essential Eight When the Australian government published its Top 4 Strategies to Mitigate Targeted Cyber Intrusions, it was like applying Occam's razor to cybersecurity.