{"id":1,"date":"2023-11-10T00:32:10","date_gmt":"2023-11-10T00:32:10","guid":{"rendered":"https:\/\/konos.com.au\/?p=1"},"modified":"2025-03-21T16:12:41","modified_gmt":"2025-03-21T05:42:41","slug":"security","status":"publish","type":"post","link":"https:\/\/konos.com.au\/?p=1","title":{"rendered":"Essentials Eight Maturity Model"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Alignment of the ACSC Essentials Eight Maturity Model is key to maintaining security and continuity for your business data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"276\" src=\"https:\/\/konos.com.au\/wp-content\/uploads\/2023\/11\/ACSC_Logo-1024x276.webp\" alt=\"\" class=\"wp-image-1615\" style=\"width:311px;height:auto\" srcset=\"https:\/\/konos.com.au\/wp-content\/uploads\/2023\/11\/ACSC_Logo-1024x276.webp 1024w, https:\/\/konos.com.au\/wp-content\/uploads\/2023\/11\/ACSC_Logo-300x81.webp 300w, https:\/\/konos.com.au\/wp-content\/uploads\/2023\/11\/ACSC_Logo-768x207.webp 768w, https:\/\/konos.com.au\/wp-content\/uploads\/2023\/11\/ACSC_Logo.webp 1193w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/essential-eight\">https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/essential-eight<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Please talk to us about cyber threat and how we can help you understand the implications and fortify your network.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alignment of the ACSC Essentials Eight Maturity Model is key to maintaining security and continuity for your business data. Please talk to us about cyber threat and how we can help you understand the implications and fortify your network.<\/p>\n","protected":false},"author":1,"featured_media":1624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/konos.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":16,"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":1637,"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/1637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/konos.com.au\/index.php?rest_route=\/wp\/v2\/media\/1624"}],"wp:attachment":[{"href":"https:\/\/konos.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/konos.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/konos.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}