Microsoft Defender for Business alerts can show what's happening in the network. The better users understand their network, the faster they can triage alerts.
Stories by Susan Bradley
Spring4Shell does not affect most systems, so a calm, methodical approach to assessing the real threat is best.
From cloud to on-premises access, having two-factor authentication (2FA) can help keep attackers at bay yet they continue to gain network access.
Microsoft changes default settings for a variety of reasons, but some recent key changes are designed to keep businesses safer from cyber attacks.
Logging can be the most useful tool in a customer's security arsenal, but it’s something businesses tend to overlook and not assign resources to.
Egress filtering, conditional access rules, and free tools from governments can help identify suspicious activity and protect credentials.
Defending against attacks intended to destroy systems rather than steal or extort requires a different approach, as Russia's cyber attacks against Ukraine demonstrate.
The Log4j vulnerability affects many applications running on Microsoft networks. Use this advice to determine whether your network has been exploited and to mitigate the issue.
Removing barriers to hardening a Windows network and planning a response will minimise disruption from a ransomware attack.
Attackers know how to manage and monitor our systems better than we do. They will analyse how best to gain entrance to our networks.
If you are still running and patching an on-premises Exchange server, you need to opt into a major protection that Microsoft is rolling out.
The discovery of serious vulnerabilities in Azure's Cosmos database and Linux VM shows you can't take cloud security for granted.
Many networked systems will not be compatible with Windows 11 and its advanced security features. Here's how to keep Windows 10 devices from being a weak link.
Attackers are targeting older, unpatched Microsoft Exchange Servers with much success because organisations don't properly assess the risk.
Analysing forensics logs requires a unique approach. Here are the basics of what you need to know and the tools to use.