Step 8. Protect your documents and email: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8.
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8.
Recent research on email journaling—an often used testing methodology—shows it can lead to misinterpreted results.
Find out how Office 365 learned to mitigate phishing attacks.
In the final part of this blog series, we highlight how Microsoft 365 Security solutions work together to help customers secure their IT environments.
In part 1 of our blog series, we shared the Microsoft 365 Security strategy for integrating with the broader security community. Today, we cover the services Microsoft 365 Security offers customers to protect assets beyond the Microsoft ecosystem.
This post is authored by Milad Aslaner, Senior Program Manager, Windows & Devices Group. A decade ago, most cyber-attacks started with a piece of malware or a complex method to directly attack the infrastructure of a company. But this picture has changed and today all it takes is a sophisticated e-mail phishing for an identity.
This post is authored by Simon Pope, Principal Security Group Manager, Microsoft Security Response Center. Introducing new video on best practices from the Microsoft Cyber Defense Operations Center Ask any CISO or cybersecurity professional about their greatest security challenge, and it’s a good chance the answer will be “the actions of our people.
We’ve received reports of a recent email scam that spoofs the Microsoft Services Agreement. The scam email message replaces legitimate links in the agreement with links that can compromise your computer when clicked.
If you think you’re a target of a phishing scam or other fraud in an email, Xbox instant message, or on a website, you can report it. Most Microsoft products have built-in tools that make this easier. Hotmail.
It pays to keep your email address as private as possible, but sometimes it seems like there’s nothing you can do to keep it out of the hands of spammers.