​​7 cybersecurity trends and tips for small and medium businesses to stay protected

Credit to Author: Scott Woodgate| Date: Thu, 31 Oct 2024 16:00:00 +0000

The challenges that small and midsize businesses (SMBs) face when it comes to security continue to increase as it becomes more difficult to keep up with sophisticated cyberthreats with limited resources or security expertise. Research conducted highlights the top seven SMB cybersecurity trends and steps that can be taken to stay protected.​

The post ​​7 cybersecurity trends and tips for small and medium businesses to stay protected appeared first on Microsoft Security Blog.

Read more

3 new ways the Microsoft Intune Suite offers security, simplification, and savings

Credit to Author: Michael Wallent and Dilip Radhakrishnan| Date: Thu, 01 Feb 2024 17:00:00 +0000

The main components of the Microsoft Intune Suite are now generally available. Read about how consolidated endpoint management adds value and functionality for security teams.

The post 3 new ways the Microsoft Intune Suite offers security, simplification, and savings appeared first on Microsoft Security Blog.

Read more

Why a proactive detection and incident response plan is crucial for your organization

Credit to Author: Brooke Lynn Weenig and Matt Suiche| Date: Tue, 06 Jun 2023 16:00:00 +0000

Matt Suiche of Magnet Forensics talks about top security threats for organizations and strategies for effective incident response.

The post Why a proactive detection and incident response plan is crucial for your organization appeared first on Microsoft Security Blog.

Read more

XDR meets IAM: Comprehensive identity threat detection and response with Microsoft

Credit to Author: Rob Lefferts and Alex Weinert| Date: Wed, 31 May 2023 16:00:00 +0000

Identity-based attacks are on the rise, making identity protection more important than ever. Explore our blog post to learn how Microsoft’s Identity Threat Detection and Response can help.

The post XDR meets IAM: Comprehensive identity threat detection and response with Microsoft appeared first on Microsoft Security Blog.

Read more

Cyber Signals: Shifting tactics fuel surge in business email compromise

Credit to Author: Vasu Jakkal| Date: Fri, 19 May 2023 10:00:00 +0000

Business email operators seek to exploit the daily sea of email traffic to lure victims into providing financial and other sensitive business information.

The post Cyber Signals: Shifting tactics fuel surge in business email compromise appeared first on Microsoft Security Blog.

Read more

Getting started with the CDMC framework—Microsoft’s guide to cloud data management

Credit to Author: Christine Barrett| Date: Mon, 24 Apr 2023 16:00:00 +0000

Learn how Cloud Data Management Capabilities (CDMC) certification can build trust with your customers and provide a standard for data governance and controls for managing sensitive data at scale.

The post Getting started with the CDMC framework—Microsoft’s guide to cloud data management appeared first on Microsoft Security Blog.

Read more

See product news and on-demand sessions from Microsoft Secure

Credit to Author: Christine Barrett| Date: Mon, 17 Apr 2023 16:00:00 +0000

Microsoft Secure on March 28, 2023, was a major success, thanks to more than 51,000 virtual attendees. It’s not too late to watch a session you missed. Watch on-demand.

The post See product news and on-demand sessions from Microsoft Secure appeared first on Microsoft Security Blog.

Read more