Microsoft Cybersecurity

“If you make security hard, people may work around it. With Microsoft, we get native capabilities, visibility into our operational environment, and simplicity for all employees."
-Simon Hodgkinson, Group Chief Information Security Officer, BP 
Cyber Security is a condition in which confidential data is compromised, stolen or altered  due to external factors like computer viruses, data breaches, and Denial of Service (DoS) attacks
Increasing cyber security in critical sectors is vital to the future of national economies, and has become a priority for governments around the world. Microsoft supports these risk-management efforts and believes that every nation should have a strategy to frame its investments and desired outcomes in cyber security.

•Malware – It is a malicious attack on a targeted system which could take up the entire system and corrupt it.
•Phishing – Targets are contacted through email, calls or a text message where their sensitive content like usernames, passwords, credit card information are compromised 
•Spear Phishing – Spear phishing is a variation on phishing in which hackers send emails to groups of people with specific common characteristics or other identifiers. Spear phishing emails appear to come from a trusted source but are designed to help hackers obtain trade secrets or other classified information.
•“Man in the Middle” (MitM) attack - Where an attacker establishes a position between the sender and recipient of electronic messages and intercepts them, perhaps changing them in transit. The sender and recipient believe they are communicating directly with one another. A MitM attack might be used in the military to confuse an enemy.
•Trojans - Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer.
•Ransomware – Malware which is designed to deny access to a device until a Ransom is given 
• Denial of Service attack or Distributed Denial of Service Attack (DDoS). 
•Attacks on IoT Devices- IoT devices like industrial sensors are vulnerable to multiple types of cyber threats. These include hackers taking over the device to make it part of a DDoS attack and unauthorized access to data being collected by the device. Given their numbers, geographic distribution and frequently out-of-date operating systems, IoT devices are a prime target for malicious actors.
•Data Breaches – An Incident in which all the information is accessed without any authorization.

Exclusively 3,500+ dedicated Microsoft cybersecurity professionals collaboratively help to  protect, detect, and respond to threats  delivering security operations which are custom made.
Microsoft generates Microsoft Security Intelligence Report every year. Along with that and other external data Microsoft offers various courses under Cybersecurity

•Expertise in the Microsoft portfolio, technology integration, and digital transformation
•Capabilities that are broad, deep, and suited to your industry, along with a global network of skilled professionals and partners
•Accountability for the long term, addressing complex challenges while mitigating risk
•Flexibility to engage the way that works for you, with the global reach to satisfy your business needs
•Best Results that demonstrate our ability to lead change and deliver on our promise

Be prepared to defend your organization from new cyberthreats with help from Microsoft. Start by learning ten tips to enable Zero Trust security.
•Security cloud operations at global scale
With over 3,500 global security experts and $1 billion invested annually in R+D, we’re making AI and automation work for our customers.
•Enterprise-class technology
Our security solutions reduce noise by 90 percent, eliminate time consuming tasks, and automatically remediate 97 percent of attacks on endpoints.
•Partnerships for a heterogeneous world
We provide simplified integration with your current portfolio through our broad ecosystem of partners.

•Microsoft Security blog
Learn about the latest trends in cybersecurity and solutions from Microsoft.
•CISO blog series
Discover successful security strategies and valuable lessons learned from CISOs and our top security experts to help you navigate an ever-expanding threat landscape.
•Microsoft Security intelligence series
Read the latest news about security research, threat intelligence, and Microsoft Threat Protection.
•Threat protection series
Learn about the latest enhancements to Microsoft Threat Protection. It offers next-gen security information and event management (SIEM), hybrid infrastructures, and holistic 
•Compliance security series
Keep up to date with developments in compliance and regulation and learn how to manage your security while staying compliant.
•Microsoft Security Response Center
Learn how Microsoft stays current and responds to new cyberthreats.

To maintain global trust in technology - and secure cyberspace against new and emerging threats - public policy must continue to evolve. Microsoft supports these critical efforts, focusing its research on four broad themes of concern to policymakers

By haripriya.krishnakum Krishnakumar | 18 Oct 2019 | 0 Comments