Microsoft highlights Best Practices to help Customers combat Cyber Threats

To mitigate Cyber threat problem, Microsoft has developed an automated platform, as part of Microsoft Azure, which provides a rapid response to a Distributed Denial of Service (DDoS) attack. In addition, it shares a Cyber Defense Operations Center Strategy Brief.

A cybersecurity framework should possess all the necessary tools required to mount or build a competent defense against the ever-changing nature of cyber threats. This may include a vast array of prevention and sophisticated detection technologies, cyber intelligence reporting and instant access to the workforce of talented IT professionals.

 Best Practices to help Customers combat Cyber Threats

Most agencies despite having this infrastructure in place, fail to yield the desired results since, with every passing week new disclosure of a cybersecurity breach somewhere in the world is reported. To overcome this, Microsoft has developed an automated platform, as part of Microsoft Azure, that provides a rapid response to such attack.

Microsoft has continually improved its security environment. Some of its tools such as its DDoS protection platform analyzes traffic in real-time and has the capability to respond and mitigate an attack within 90 seconds of the detection. Apart from this, the company’s software-defined networks, the data plane can be upgraded to respond and stay ahead of network traffic, even while its service or corporate environment is under attack.

In addition to the above, Microsoft shares a Cyber Defense Operations Center Strategy Brief that details some best practices that can be employed for protecting, Detecting and Responding to cyber threats in real time.

Microsoft Cyber Defense Operations Center Strategy Brief

Both the growth of the internet and the Internet of Things (IoT) is creating more connected devices, many of which are unsecured, to carry out larger Distributed Denial-of-Service (DDoS) attacks. Due to the insecure implementation of internet-connected embedded devices, they are routinely being hacked and used in cyber attacks. Smart TVs and even refrigerators have been used to send out millions of malicious spam emails. Printers and set-top-boxes have been used to mine Bitcoins and cyber criminals have targeted CCTV cameras (common IoT devices), to launch DDoS attacks’, mentions a note on the website.

Cyber Defense Operations Center strategy brief mainly discusses the problem of cyber attack and attempts to address them under the following heads:

  1. Microsoft’s protect tactics – Capable of detecting an adversary rapidly and evict them from the network.
  2. Microsoft’s detect tactics – Triggers rapid response from teams in case something abnormal is detected.
  3. Microsoft’s respond tactics – includes measures that reduce the time to detect, investigate, analyze, respond, and recover from cyber attacks.

There are a lot of data and tips in this Cyber Defense Operations Center strategy brief that you may find useful and understand how Microsoft works to protect, detect and respond to cyber-security threats.

Posted by with Tags

The author Hemant Saxena is a post-graduate in technology and has an immense interest in following Microsoft and other technology developments around the world. Quiet by nature, he is an avid Lacrosse player.