security

Microsoft shares crucial tips to guard against cyber attacks – HT Tech



With advancing technology, cybersecurity is a growing concern for businesses as cybercriminals exploit vulnerabilities through credential-based attacks. Microsoft Security reveals tips to safeguard yourself from these attacks.

By:

HT TECH


Updated on: May 29 2023, 11:39 IST


One of the most popular ways to steal information is ‘Phishing’. Phishing emails and websites created to attack corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.  (Microsoft)

1/6


One of the most popular ways to steal information is ‘Phishing’. Phishing emails and websites created to attack corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.  (Microsoft)

Another way is ‘Push-bombing,’ which is an attack that triggers multiple access attempts with stolen credentials. It causes a rush of push notifications and can confuse the user and cause them to mistakenly allow authentication. So, how you can avoid such scenarios? (Pexels)

2/6


Another way is ‘Push-bombing,’ which is an attack that triggers multiple access attempts with stolen credentials. It causes a rush of push notifications and can confuse the user and cause them to mistakenly allow authentication. So, how you can avoid such scenarios? (Pexels)

First, always use Multi-Factor Authentication (MFA) with “Number Matching” or similar functionality. This also includes accepting a push notification and inputting a matching number.   (Pexels)

3/6


First, always use Multi-Factor Authentication (MFA) with “Number Matching” or similar functionality. This also includes accepting a push notification and inputting a matching number.   (Pexels)

To regain control and ensure security, isolation plays a vital role by enabling strict control of communications and access between security zones. Without proper isolation, the security model becomes ineffective. Therefore, remote administration necessitates a computer within the same security zone. (Unsplash)

4/6


To regain control and ensure security, isolation plays a vital role by enabling strict control of communications and access between security zones. Without proper isolation, the security model becomes ineffective. Therefore, remote administration necessitates a computer within the same security zone. (Unsplash)

Keep your operating systems updated and maintain secure administrative practices. (Unsplash)

5/6


Keep your operating systems updated and maintain secure administrative practices. (Unsplash)

Finally, implement comprehensive centralized log collection with a well-defined retention policy.   (Pixabay)

6/6


Finally, implement comprehensive centralized log collection with a well-defined retention policy.   (Pixabay)


First Published Date: 29 May, 11:39 IST




READ SOURCE

Readers Also Like:  Celerium Announces Compromise Defender™ Solution with ... - PR Newswire

This website uses cookies. By continuing to use this site, you accept our use of cookies.