Archive for the ‘cloud security’ Category

Stay ahead of multi-cloud attacks with Azure Security Center

June 15th, 2020 No comments

The COVID-19 crisis has challenged just about every business on the planet to quickly adapt and transform. With massive workforces now remote, IT administrators and security professionals are under increased pressure to keep these workers connected and productive while combating evolving threats, many of which are taking advantage of the situation.

For example, in the process of monitoring 8 trillion daily signals from a range of Microsoft products, services, and feeds, the Microsoft security team has identified multiple COVID-19-themed email campaigns that deliver the powerful credential-stealing program Agent Tesla.

To learn how to defend against these threats and others, join me and Eric Doerr, General Manager of Microsoft Security Response Center, in our next Azure Security Experts Virtual Events Series, Stay Ahead of Attacks with Azure Security Center, on June 30, 2020, from 10:00 AM to 11:00 AM Pacific Time.

There, we’ll step through three strategies to help you lock down your environment:

  • Protect all cloud resources across cloud-native workloads, virtual machines, data services, containers, and IoT edge devices.
  • Strengthen your overall security posture with enhanced Azure Secure Score.
  • Connect Azure Security Center with Azure Sentinel for proactive hunting and threat mitigation with advanced querying and the power of AI.

You’ll see demos of Secure Score and other Security Center features, while Stuart Gregg, Security Operations Manager at global online fashion retailer ASOS shares how his organization has gained stronger threat protection by pairing these technologies with smarter security management practices.

You’ll have the opportunity to take deep dives into how to use Security Center to achieve hybrid and multi-cloud threat protection for:

  • Servers and virtual machines. Learn how to protect your Linux and Windows virtual machines (VMs) using new Security Center features Just-In-Time VM Access, adaptive network hardening, and adaptive application controls. You’ll learn, too, how Security Center works with Microsoft Defender Advanced Threat Protection for Servers to provide threat detection for endpoint servers.
  • Cloud-native workloads. You’ll learn how Security Center supports containers and provides vulnerability assessment.
  • Data services. Breakthroughs in big data and machine learning make it possible for Security Center to detect anomalous database access and query patterns, SQL injection attacks, and other threats targeting your SQL databases in Azure. Learn, too, about malware reputation screening for Azure Storage and threat protection for Azure Key Vault.

In just one hour, you’ll learn how to implement broad threat protection across all your cloud resources, improve your cloud security posture management, keep up with compliance requirements, and stay ahead of a constantly evolving threat landscape.

Register now >

How do I learn more about Azure security and connect with peers and security experts?

In staying ahead of evolving security threats, it’s helpful to stay connected to other security professionals. Here are several ways to do that:

Bookmark the Security blog to keep up with our expert coverage on security matters. Follow us at @MSFTSecurity for the latest news and updates on cybersecurity.

The post Stay ahead of multi-cloud attacks with Azure Security Center appeared first on Microsoft Security.

What you need to know about privacy and security in OneDrive

July 24th, 2014 No comments

OneDrive is free online storage that’s built into Windows 8.1 and Windows RT 8.1. Add files from your PC to OneDrive, and then easily access your photos, music, documents, and other files on all the devices you use.

How you can help protect your privacy and security in OneDrive

Create a strong password for your Microsoft Account. You sign into OneDrive with your Microsoft Account. Here is some basic guidance on how to create a strong password for that account. Different sites have different rules for passwords that they’ll accept, but this guidance should work anywhere you need to create a password:

  • Length. Make your passwords at least eight (8) characters long.
  • Complexity. Include a combination of at least three (3) uppercase and/or lowercase letters, punctuation, symbols, and numerals. The more variety of characters in your password, the better.
  • Variety. Don’t use the same password for everything. Cybercriminals can steal passwords from websites that have poor security and then use those same passwords to target more secure environments, such as banking websites. Check the strength of your password.

Manage who can view or edit your OneDrive files. By default, your OneDrive files are available to you, although you can choose to share photos, documents, and other files. To share files or folders, right-click them and choose how you want to share them.

Add security info to your Microsoft account. You can add information like your phone number, an alternate email address, and a security question and answer to your account. That way, if you ever forget your password or your account gets hacked, we can use your security info to verify your identity and help you get back into your account. Go to the Security info page.

Use two-step verification. This helps protect your account by requiring you to enter an extra security code whenever you sign in on a device that isn’t trusted. For more information about two-step verification, see Two-step verification: FAQ.

Back up your OneDrive files. For details about using File History in Windows, see Set up a drive for File History.

For more information about how Microsoft helps keep your files safe in the cloud, see Privacy in OneDrive.