Microsoft is deploying new features and defaults to help keep threat actors from remotely accessing networks, but you can do more.
Stories by Susan Bradley
CISOs can follow this advice to minimise stress when recovering credentials, systems and settings after a ransomware or other cyber attack.
Are your settings, policies and processes keeping up with the changing threat landscape? Review your network to make sure.
New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.
Whenever the second Tuesday of the month rolls around, Microsoft begins to push out a raft of updates and patches for Windows users.
Microsoft Defender for Business alerts can show what's happening in the network. The better users understand their network, the faster they can triage alerts.
Spring4Shell does not affect most systems, so a calm, methodical approach to assessing the real threat is best.
From cloud to on-premises access, having two-factor authentication (2FA) can help keep attackers at bay yet they continue to gain network access.
Microsoft changes default settings for a variety of reasons, but some recent key changes are designed to keep businesses safer from cyber attacks.
Logging can be the most useful tool in a customer's security arsenal, but it’s something businesses tend to overlook and not assign resources to.
Egress filtering, conditional access rules, and free tools from governments can help identify suspicious activity and protect credentials.
Defending against attacks intended to destroy systems rather than steal or extort requires a different approach, as Russia's cyber attacks against Ukraine demonstrate.
The Log4j vulnerability affects many applications running on Microsoft networks. Use this advice to determine whether your network has been exploited and to mitigate the issue.
Removing barriers to hardening a Windows network and planning a response will minimise disruption from a ransomware attack.
Attackers know how to manage and monitor our systems better than we do. They will analyse how best to gain entrance to our networks.