What Is "Holistic" Security?
With $1 billion invested in data security strategies, the number of security execs doubled, and the launch of a new cyber defense operations center, it is clear that Microsoft understands the importance of integrating security across all operational domains.
What does this mean?
Protecting, detecting, and responding to threats has proven to be central in any Business Continuity strategy. “We are making security part of everything we do, and will continue to invest in it,” says Microsoft’s chief security officer, Bret Arsenault.
bEATING tHE oDDS - MAKING INFORMATION SECURITY A PRIORITY
What can we do in our businesses to make sure we stay ahead of the curve? Here are 5 tips:
1. Invest in Antivirus, Firewall, Anti-phishing and Anti-spyware
· A free antivirus service may not update automatically, and this is very important. Make sure that whatever antivirus software you have is regularly updated.
· Firewalls are shields that can identify and block cyberattacks from the internet. Basic firewalls, such as the one included in Windows XP, only monitor incoming traffic by default. A good firewall will monitor both incoming and outgoing traffic, keeping your private information safe.
· Anti-phishing software can identify phishing content contained in websites or email. The software automatically blocks users from being tricked into giving away sensitive information to hackers.
· Anti-spyware can detect and remove programs that may have been installed on a computer without the user’s knowledge to collect sensitive information or degrade system performance.
2. Update Browsers and Operating Systems Regularly
· Hackers love old, outdated browsers
· Update browsers and set your computer to automatically download any future update
· To keep operating systems updated:
-On Windows : Start > Control Panel > Automatic Updating (turn on).
-On Mac OS X or Apple : “Apple Menu” > Software Update.Under the Scheduled Check tab make sure both “Check for Updates” and “Download Updates Automatically” are both selected.
3. Look Into Third-Party Encryption
· Encryption scrambles data so that people prying can’t make sense of it.
· Most computers already have the feature of encrypting files, folders, or the whole disk.
· If not, third-party encryption programs area available for free.
· Data backed up on an external hard drive can save your business in the event of a crash or security event.
· Cloud-based backup is another option that is encrypted, and it is becoming more common and affordable.
5. Modify Passwords
· Every account should have a unique password
· Use a password manager if remembering all the passwords is too difficult
· Choose long passwords with various characters
· Exclude words that can be found in a dictionary or successive letters/numbers on a keyboard
From darkreading, read the report on Microsoft:
Microsoft Invests $1 Billion In 'Holistic' Security Strategy Executives detail strategic and cultural shift at Microsoft to an integrated security approach across its software and services, and announce new managed services group and cyber defense operation center. Microsoft over the past year invested some $1 billion in security and doubled its number of security executives, and today announced the launch of a new managed security services group and a new cyber defense operations center -- all part of its new strategy of holistic and integrated security across its products and services. In exclusive interviews with Dark Reading, Microsoft executives -- including Microsoft's chief information security officer Bret Arsenault -- explained how Microsoft's new security strategy is manifested in the company's internal network and across its Windows, Office, and cloud offerings to customers.