Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results

Credit to Author: Christine Barrett| Date: Wed, 25 Jan 2023 17:00:00 +0000

Learn how Microsoft Security is simplifying security for the new hybrid, multi-platform environment while fostering a diverse new generation of defenders—and how your organization can benefit.

The post Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results appeared first on Microsoft Security Blog.

Read more

Human-operated ransomware attacks: A preventable disaster

Credit to Author: Eric Avena| Date: Thu, 05 Mar 2020 17:00:31 +0000

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.

The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security.

Read more

Step 10. Detect and investigate security incidents: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 04 Jun 2019 16:00:35 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 10. Detect and investigate security incidents,” you’ll learn how to set up Azure Advanced Threat Protection to uncover threats against your organization.

The post Step 10. Detect and investigate security incidents: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Step 9. Protect your OS: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 21 May 2019 16:00:43 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 9. Protect your OS,” you’ll learn how to configure Microsoft Defender Advanced Threat Protection to prevent, detect, investigate, and respond to advanced threats.

The post Step 9. Protect your OS: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Step 8. Protect your documents and email: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 09 Apr 2019 16:00:24 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and use Office 365 Advanced Threat Protection (ATP) and Exchange Online Protection to help secure your documents and emails.

The post Step 8. Protect your documents and email: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more

Step 7. Discover shadow IT and take control of your cloud apps: top 10 actions to secure your environment

Credit to Author: Todd VanderArk| Date: Tue, 26 Mar 2019 16:00:08 +0000

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 7. Discover shadow IT and take control of cloud apps,” you’ll learn how to set up Microsoft Cloud App Security (MCAS) to identify, access, and manage the cloud applications used by your organization.

The post Step 7. Discover shadow IT and take control of your cloud apps: top 10 actions to secure your environment appeared first on Microsoft Security.

Read more