Cyber security 101: A crash course on the Essential 8