Microsoft shares tips on how to protect your information and privacy against cybersecurity threats


cyber security threats are all around us
from hackers causing mischief to organized crime syndicates pursuing
financial gain to nation-states conducting espionage the primary goal of
cyber criminals is to gain access to corporate and/or personal data the value
of this data isn’t just for primary use for instance opening new credit card
accounts or hacking into a company server a vibrant market exists in the
Deep Web for selling credentials and sensitive information to other cyber
criminals in this video we cover some of the best practices to protect sensitive
information and your own privacy responsible information management
begins with understanding the types of data being handled and classifying it
accordingly the growth of social collaboration and new ways of collecting
data and storing content exposes organizations to evolving security risks
Microsoft Azure information protection lets people classify label and protect
the content they use both inside and outside of organizational boundaries
this technology can also automate the classification for content that has
sensitive information in it such as credit card numbers or social security
numbers five classifications define the level of protection applied to emails
and content personal is used for personal use only and only contains
non-business data public is used for business data specifically prepared and
approved for public consumption general is used for business data not intended
for public consumption but can be shared with external partners as required
confidential is used for sensitive business data that could cause damage to
the business if shared with unauthorized people
examples include contracts sales reports and security assessments highly
confidential is used for very sensitive business data such as personal employee
and customer information passwords and pre-announced financial reports while
our best practice video on securing your identity discussed how you can protect
your credentials this video goes deeper into how IT organizations can manage end
user credentials and their access to sensitive data and applications Identity
and Access Management enables the right individuals to access the right
resources at the right times for the right reasons
employees are granted authorization based on business needs and in alignment
with the Identity and Access Management policy and process multi-factor
authentication is a method of authentication that requires the use of
more than one verification method and adds a critical second layer of security
to user sign ins and transactions this may also be referred to as a two-factor
authentication when only two methods of verification are needed multi-factor
authentication works by requiring any two or more verification methods which
would include something you know typically a password or PIN something
you have such as a trusted device like a phone and something you are your
fingerprint facial shape or other unique attribute that can’t be replicated users
and systems should only have the minimum level of access necessary to perform
their defined function all unnecessary levels of access should be disallowed
privileges should be allocated on a need-to-know basis and we’re possible
event by event so that accounts have only the minimum level of access for
their functional role and only for as long as needed to complete the task
for access to sensitive infrastructure applications and data we recommend using
a strategy of just-in-time and just enough administrator access Microsoft’s
just-in-time administrative service not only grants time limited administrator
access but allows tracking and auditing of privileged accounts to control the
amount of privileged access to sensitive resources persistent administration
credentials leave many organizations exposed to harm as intruders can use
them to navigate laterally on the network and cause further harm our
customers can leverage these best practices and more via our enterprise
identity security and cyber security technologies such as asher security
center Microsoft advanced threat analytics Azure information protection
office 365 advanced threat protection and Windows Defender maintaining
appropriate protections for data based on its value or risk for the
organization is the cornerstone for privacy and tightly controlling access
to infrastructure applications and data to those who have a business need and
only for the time needed is a critical step in helping ensure your organization
is protected from intrusion and disruption taking the appropriate steps
will help protect your sensitive information and your own privacy both
online and offline you

Leave a Reply