New research shows IoT and OT innovation is critical to business but comes with significant risks

This year the need for much improved IoT and OT cybersecurity has become even more clear with the recent and now famous attacks. To better understand the challenges customers are facing, Microsoft partnered with the Ponemon Institute to produce empirical data to help us better understand the state of IoT and OT security from a customer’s perspective.
The post New research shows IoT and OT innovation is critical to business but comes with significant risks appeared first on Microsoft Security Blog. READ MORE HERE…

Read more

Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview

Smart meters and smart grid infrastructure have been deployed in many of the world’s electric distribution grids. They promise energy conservation, better grid management for utilities, electricity theft reduction, and a host of value-added services for consumers.
The post Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview appeared first on Microsoft Security. READ MORE HERE…

Read more

Meet critical infrastructure security compliance requirements with Microsoft 365

Critical infrastructure operators face a hostile cyber threat environment and a complex compliance landscape. Operators must manage industrial control systems as well as IT environments that are part of critical infrastructure or can form attack surfaces for control systems.
The post Meet critical infrastructure security compliance requirements with Microsoft 365 appeared first on Microsoft Security. READ MORE HERE…

Read more

Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact

GDPR, HIPPA, GLBA, all 50 U.S. States, and many countries have privacy breach reporting requirements. If an organization experiences a breach of relevant regulatory information, they must report it within the required time frame. The size and scope of this reporting effort can be massive. Using Microsoft 365 Advanced Audit and Advanced eDiscovery to better understand the scope of the breach can minimize the burden on customers as well as the financial and reputational cost to the organization.
The post Privacy breaches: Using Microsoft 365 Advanced Audit and Advanced eDiscovery to minimize impact appeared first on Microsoft Security. READ MORE HERE…

Read more

Microsoft recognized as a Leader in the 2020 Gartner Magic Quadrant for Enterprise Information Archiving

Organizations face an increasing volume of data generated daily and ever-evolving regulations around how that data is managed. To help navigate this complex information landscape, we are focused on delivering integrated, intelligent, and user-centric solutions.  Over the past few years, we significantly increased our investment in building risk management and compliance solutions, inclusive of information archiving and management. We delivered new…
The post Microsoft recognized as a Leader in the 2020 Gartner Magic Quadrant for Enterprise Information Archiving appeared first on Microsoft Security. READ MORE HERE…

Read more

Enable secure remote work, address regulations and uncover new risks with Microsoft Compliance

A recent Microsoft poll of Chief Information Security Officers (CISOs) revealed that providing secure remote access to resources, apps, and data is their top concern.
The post Enable secure remote work, address regulations and uncover new risks with Microsoft Compliance appeared first on Microsoft Security. READ MORE HERE…

Read more

Protecting your data and maintaining compliance in a remote work environment

Business continuity is an imperative, and you must rely on your employees to stay connected and productive outside of the traditional digital borders of business. In doing so, identifying and managing potential risks within the organization is critical to safeguarding your data and intellectual property (IP), while supporting a positive company culture.
The post Protecting your data and maintaining compliance in a remote work environment appeared first on Microsoft Security. READ MORE HERE…

Read more

Human-operated ransomware attacks: A preventable disaster

In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.
The post Human-operated ransomware attacks: A preventable disaster appeared first on Microsoft Security. READ MORE HERE…

Read more