Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security

Credit to Author: Teri Seals-Dormer| Date: Mon, 05 Oct 2020 16:00:05 +0000

Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world can prevent 100 percent of phishing attacks from hitting user inboxes. At that point in…

The post Why integrated phishing-attack training is reshaping cybersecurity—Microsoft Security appeared first on Microsoft Security.

Read more

STRONTIUM: Detecting new patterns in credential harvesting

Credit to Author: Jim Flack| Date: Thu, 10 Sep 2020 18:45:52 +0000

Microsoft has tied STRONTIUM to a newly uncovered pattern of Office365 credential harvesting activity aimed at US and UK organizations directly involved in political elections.

The post STRONTIUM: Detecting new patterns in credential harvesting appeared first on Microsoft Security.

Read more

Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios

Credit to Author: Todd VanderArk| Date: Thu, 26 Mar 2020 16:00:24 +0000

Increased remote work has many organizations rethinking network and security strategies. In this post we share guidance on how to manage security in this changing environment.

The post Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios appeared first on Microsoft Security.

Read more

Protecting against coronavirus themed phishing attacks

Credit to Author: Todd VanderArk| Date: Fri, 20 Mar 2020 15:00:54 +0000

Customers are asking us what Microsoft is doing to help protect them from phishing and cyberattacks, and what they can do to better protect themselves. We thought now would be a good time to share some best practices and useful information.

The post Protecting against coronavirus themed phishing attacks appeared first on Microsoft Security.

Read more

The quiet evolution of phishing

Credit to Author: Eric Avena| Date: Wed, 11 Dec 2019 17:00:56 +0000

In 2019, we saw phishing attacks reach new levels of creativity and sophistication. Read about the most notable phishing techniques we spotted in the past year.

The post The quiet evolution of phishing appeared first on Microsoft Security.

Read more

Top 6 email security best practices to protect against phishing attacks and business email compromise

Credit to Author: Eric Avena| Date: Wed, 16 Oct 2019 17:00:11 +0000

What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.

The post Top 6 email security best practices to protect against phishing attacks and business email compromise appeared first on Microsoft Security.

Read more

TLS version enforcement capabilities now available per certificate binding on Windows Server 2019

Credit to Author: Todd VanderArk| Date: Mon, 30 Sep 2019 16:00:00 +0000

Microsoft is pleased to announce a powerful new feature in Windows to make your transition to a TLS 1.2+ world easier.

The post TLS version enforcement capabilities now available per certificate binding on Windows Server 2019 appeared first on Microsoft Security.

Read more