{"id":51825,"date":"2021-09-06T13:07:31","date_gmt":"2021-09-06T12:07:31","guid":{"rendered":""},"modified":"2021-09-07T14:13:44","modified_gmt":"2021-09-07T13:13:44","slug":"future-proof-secure-against-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/","title":{"rendered":"How to future-proof and secure your organisation against cyberattacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-gif-2.gif\" alt=\"The evolving landscape graphic. Phishing attacks 72% - 83%; Viruses and malware: 33% - 9%; Ransomware: 17% - 7%. From NCSC Cyber Security Breaches Survey 2021\" width=\"374\" height=\"273\" \/><\/p>\n<p>The evolving threat landscape has highlighted how attackers are refining their tactics and techniques. It also shows just how far they\u2019re willing to go to disrupt organisations with cyberattacks.<\/p>\n<p>Let&#8217;s take the example of human-operated ransomware, and the deliberate targeting of critical infrastructure. This is designed to cause as much financial, operational and societal impact as possible. Additionally, this is often compounded by the pressure from consumers, media and government \u2013 and one where core supply chains are cut off or severely disrupted. While the motivation of the cyberattack varies, there is a rise of recklessness. Attackers go beyond disruption into destruction as they learn how to combat and evade security defences. This puts business leaders in a position where they feel they have limited options. With the response likely to play out in the public domain, they often feel like they must pay the extortion demands either to restore services or prevent further disruption.<br \/>\n<img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattacks-gif-1.gif\" alt=\"39% of organisations had a cyber breach or attack in the last 12 months. One in five lost money, data or other assets. From NCSC Cyber Security Breaches Survey 2021\" \/><\/p>\n<p>Enterprise resilience is needed to recover from human-operated cyberattacks. This goes beyond just cyber resilience. It requires a multi-faceted business, technology and operational response to recover services as quickly and effectively as possible across all domains. Resilience is the ability of the business to recover from failures and continue to function, in adverse conditions. It&#8217;s not about <em>avoiding<\/em> failures. It&#8217;s about taking proactive action to <em>detect and respond<\/em>\u00a0to failures in a way that reduces downtime or data loss.<\/p>\n<p>In the <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/blog\/anticipate-absorb-and-adapt-introducing-the-societal-resilience-research-agenda\/?lang=fr_ca\" target=\"_blank\" rel=\"noopener\">Microsoft Societal Resilience research program<\/a>, we define resilience as\u00a0<strong><em>the capacity to anticipate, absorb, and adapt to disruption<\/em><\/strong>. As Dr Peter Lee, Microsoft CVP of Research and innovations, says: \u201cIf we don\u2019t acknowledge our risks, we can\u2019t anticipate and prepare for them\u201d. This is especially true in today\u2019s world of radical innovation, where the threat actors often move faster than organisations do.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-large webp-format aligncenter\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-1024x864.webp\" alt=\"Just 3 in 10 businesses have business continuity plans that cover cybersecurity. From NCSC Cyber Security Breaches Survey 2021.\" width=\"643\" height=\"542\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-1024x864.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-300x253.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-768x648.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-296x250.jpg 296w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-330x278.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-800x675.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-400x337.jpg 400w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2.jpg 1118w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-2-1024x864.jpg\" \/><\/p>\n<h2>Planning for enterprise resilience against cyberattacks<\/h2>\n<p>Business continuity and information protection are absolute requirements for every business. But it can often entail cost, complexity, compliance, and resource to maintain. Using a cloud-based strategy helps to mitigate many of these issues. Building reliable and secure systems in the cloud is a shared responsibility. The reliability \u2018<strong>of<\/strong>\u00a0\u2018the cloud is the responsibility of the cloud service provider. The reliability<strong>\u00a0\u2018in\u2019\u00a0<\/strong>the cloud is the responsibility of the organisation. However, according to the\u00a0<a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2021\/cyber-security-breaches-survey-2021\" target=\"_blank\" rel=\"noopener\">National Cyber Security Centre, only three in 10 businesses have business continuity plans that cover cybersecurity<\/a>.<\/p>\n<h2>How to build a secure cloud strategy<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-large webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-1024x544.webp\" alt=\"The goal of reliability is to ensure availability for services and maintain reliable systems. Resilience is the how. The goal is to achieve reliability and respond to failure to avoid downtime and data loss.\" width=\"462\" height=\"246\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-1024x544.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-300x159.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-768x408.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-1536x816.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-330x175.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-800x425.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-400x213.jpg 400w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3.jpg 1592w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-3-1024x544.jpg\" \/><\/p>\n<p>Those new to cloud should begin with <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/\" target=\"_blank\" rel=\"noopener\">Azure\u2019s Cloud Adoption Framework,<\/a> to determine business drivers and strategy. The <a href=\"http:\/\/aka.ms\/wellarchitected\/framework\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Well-Architected Framework<\/a> is a set of guiding tenants that architects, developers and solution owners can use to build and optimise reliable, secure and resilient services in the cloud.<\/p>\n<h2>Design for reliability and security<\/h2>\n<p>Designing for reliability requires an assume failure mindset. Designing for security requires an assume compromise mindset.<\/p>\n<p>Cybersecurity is hard to mitigate for. Adversaries are working to counteract the business continuity strategy by actively adapting and navigating the controls that the business has implemented. If a plan is too rigid and does not anticipate change, it can often fail as the business is not able to react and pivot quickly enough to the ferocity of change or cyberattacks.<\/p>\n<p>Machine learning and AI can take the pressure off IT or security teams with real-time threat detection and automation. This allows them to focus on higher value tasks, such as designing resilient workloads.<\/p>\n<h2>Choose the right workload<\/h2>\n<p>Designing workloads that are resistant to both natural disasters and malicious human intervention such as cyberattacks requires a thoughtful combination of high availability, disaster recovery and backup solutions. Across the whole environment, you need to consider how likely the primary control is to fail and the potential organisational risk if it does. Additionally, you need to counteract any of these with mitigating factors.<\/p>\n<ul>\n<li><strong>High availability (HA)<\/strong>: The ability of the application or service to continue running in a healthy state, without significant downtime.<\/li>\n<li><strong>Disaster recovery (DR)<\/strong>: The ability to recover from rare but wide-scale failures. For example, service disruption that affects an entire region.<\/li>\n<li><strong>Data backup: <\/strong>A critical part of resiliency, distinct from\u00a0storage redundancy solutions.<\/li>\n<\/ul>\n<p>You can specifically address HA and DR needs with <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/common\/storage-redundancy\" target=\"_blank\" rel=\"noopener\">storage redundancy<\/a> solutions that simultaneously replicate data and services to an alternative location. However, a secondary location can be impacted at the same time a near-real-time attack encrypts data in a primary location. This results in data loss or corruption.<\/p>\n<p>When designing a backup solution for business-critical data in the cloud consider a tertiary, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/blobs\/immutable-storage-overview\" target=\"_blank\" rel=\"noopener\">immutable backup<\/a> (write-once-read-many). This is both physically and logically held away from any primary and secondary backups. As a result, there is another layer of protection against data loss, corruption, or malicious encryption. This is a good option for highly sensitive and regulated entities who are required to legally hold data. <a href=\"https:\/\/azure.microsoft.com\/en-gb\/services\/backup\/#overview\" target=\"_blank\" rel=\"noopener\">Azure Backup<\/a> provides security features to help protect backup data even after deletion; one such feature is <strong>soft delete<\/strong>. If a backup is accidentally or maliciously deleted, soft delete retains it for an extra 14 days. Remember, regularly validate and test backup and restore procedures.<\/p>\n<h2>Protect privileged identities against cyberattacks<\/h2>\n<p>Often one of the most overlooked part of resilience is protecting the identities that have access to backups. As a result, compromised accounts can be used maliciously to encrypt or delete backups. Even in the example of soft delete, a compromised account with the appropriate rights can disable the feature before deleting backups.<\/p>\n<p>Attackers deliberately target these resources because it impacts the ability to recover. Mitigate this by granting <strong><em>accounts the minimum privilege required to accomplish their assigned tasks<\/em><\/strong>. Limit the number of accounts with access to backups (but with a break-glass account included). Protect these with multi-factor authentication (MFA), which <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/\" target=\"_blank\" rel=\"noopener\">stops 99.9% of account compromise attacks<\/a>. You should also consider just-in-time and just-enough access using dedicated privileged access workstations (PAWS). Log and monitor all changes for verification and compliance.<\/p>\n<h2>Validate your response to cyberattacks<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-large webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-1024x745.webp\" alt=\"Are organisations ready? 34% run cybersecurity assessments. 20% run mock-phishing exercises. 15% audit vulnerabilities. From NCSC Cyber Security Breaches Survey 2021\" width=\"480\" height=\"349\" data-orig-srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-1024x745.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-300x218.jpg 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-768x559.jpg 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-330x240.jpg 330w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-800x582.jpg 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-400x291.jpg 400w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1.jpg 1100w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/08\/Cyberattack-info-1-1024x745.jpg\" \/>To truly know if your strategy can hold up against cyberattacks, you need to successfully measure reliability and security to and understand the resilience of that system. This means testing end-to-end workloads against a range of severe but plausible scenarios.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/framework\/resiliency\/chaos-engineering\" target=\"_blank\" rel=\"noopener\"><strong>Chaos engineering<\/strong><\/a> is the practice of subjecting cloud applications and services to real world failures and dependency disruptions to build, measure and improve resilience. <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/framework\/resiliency\/testing#fault-injection-testing\" target=\"_blank\" rel=\"noopener\"><strong>Fault injection<\/strong><\/a> is the deliberate introduction of a failure into a system to validate robustness and error handling.<\/p>\n<p>We use fault injection at Microsoft to induce a major failure or disaster and validate both the recovery and incident management processes. We place strict access controls around this capability to prevent accidents or malicious attacker abuse to safeguard and limit the impact of the testing. This enables the business and IT to consider and prepare for a range of scenarios that determine the robustness and design of the overall solution in a safe environment. It also increases the resilience and confidence in Azure and our services.<\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/learn-about-the-latest-innovations-inside-azure-datacenter-architecture\/\" target=\"_blank\" rel=\"noopener\">Microsoft Ignite 2021 provided a first look at Azure Chaos Studio<\/a> which is our upcoming native chaos engineering and fault injection service. This will help organisations to measure, understand, and improve the resilience of their Azure applications.<\/p>\n<h2>Anticipate and adapt<\/h2>\n<p>Organisations require a level of preparedness that anticipates and adapts to a range of scenarios, whether accidental or malicious. The strategy needs to be flexible to adapt to the evolving threat landscape and be capable of delivering effective and scalable enterprise-wide recovery.<\/p>\n<p>The good news is that cloud architectures can help improve enterprise resilience goals whilst enabling effective business continuity.<\/p>\n<h2>Find out more<\/h2>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/backup-and-disaster-recovery\/#overview\" target=\"_blank\" rel=\"noopener\">Learn more about backup and disaster recovery<\/a><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\" target=\"_blank\" rel=\"noopener\">Human-operated ransomware attacks: A preventable disaster<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/protect-against-ransomware\" target=\"_blank\" rel=\"noopener\">Rapidly protect against ransomware and extortion<\/a><\/p>\n<h2>Resources to empower your development team<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/20\/cybersecurity-practices-implement-secured-devices\/\">Cybersecurity best practices to implement highly secured devices<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-gb\/learn\/modules\/intro-to-cybersecurity\/\">Introduction to cybersecurity learning path\u00a0<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-gb\/learn\/paths\/data-identification-cybersecurity\/\">Data discovery, classification and protection learning path<\/a><\/p>\n<h2>About the authors<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-thumbnail size-thumbnail webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/10\/Sarah-Armstrong-Smith-150x150.webp\" alt=\"Sarah Armstrong-Smith, a person posing for the camera\" width=\"150\" height=\"150\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/10\/Sarah-Armstrong-Smith-150x150.jpg\" \/><\/p>\n<p>Sarah Armstrong-Smith is Chief Security Advisor in Microsoft\u2019s Cybersecurity Solutions Area. She principally works with \u00a0strategic customers across Europe, to help them evolve their security strategy and capabilities to support digital transformation and cloud adoption.<\/p>\n<p>Sarah has a background in business continuity, disaster recovery, data protection and privacy, as well as crisis management. Combining these elements means she operates holistically to understand the cybersecurity landscape, and how this can be proactively enabled to deliver effective operational resilience.<\/p>\n<p>Sarah is recognised as one of the most influential women in UK Tech and UK cybersecurity. She regularly contributes to thought leadership and industry publications.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-full size-full webp-format alignright\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/Lesley-Kipling.jpg\" alt=\"Photo of a smiling woman wearing a hat, Lesley Kipling\" width=\"120\" height=\"120\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/05\/Lesley-Kipling.jpg\" \/><\/p>\n<p>Previously lead investigator for Microsoft\u2019s detection and response team (DART), Lesley Kipling has spent more than 17 years responding to our customers\u2019 largest and most impactful cybersecurity incidents. As Chief Cybersecurity Advisor, she now provides customers, partners and agencies around the globe with deep insights into how and why security incidents happen, how to harden defences and more importantly, how to automate response and contain attacks with the power of the cloud and machine learning. She holds a Master of Science in Forensic Computing from Cranfield University in the United Kingdom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.<\/p>\n","protected":false},"author":585,"featured_media":52125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1],"post_tag":[160,122,804,1467,1664,924,199],"content-type":[],"coauthors":[1520,1350],"class_list":["post-51825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cross-industry","tag-blogger-series","tag-cloud","tag-cyber-security","tag-hybrid-workplace","tag-insider-threats","tag-mfa","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to future-proof and secure your organisation against cyberattacks - Microsoft Industry Blogs - United Kingdom<\/title>\n<meta name=\"description\" content=\"Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to future-proof and secure your organisation against cyberattacks - Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"og:description\" content=\"Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-06T12:07:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-07T13:13:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sarah Armstrong-Smith, Lesley Kipling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah Armstrong-Smith, Lesley Kipling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/sarah-armstrong-smith\/\",\"@type\":\"Person\",\"@name\":\"Sarah Armstrong-Smith\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/lesley-kipling\/\",\"@type\":\"Person\",\"@name\":\"Lesley Kipling\"}],\"headline\":\"How to future-proof and secure your organisation against cyberattacks\",\"datePublished\":\"2021-09-06T12:07:31+00:00\",\"dateModified\":\"2021-09-07T13:13:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\"},\"wordCount\":1510,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png\",\"keywords\":[\"Blogger Series\",\"Cloud\",\"Cyber-security\",\"Hybrid Workplace\",\"Insider threats\",\"MFA\",\"Security\"],\"articleSection\":[\"Cross-industry\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\",\"name\":\"How to future-proof and secure your organisation against cyberattacks - Microsoft Industry Blogs - United Kingdom\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png\",\"datePublished\":\"2021-09-06T12:07:31+00:00\",\"dateModified\":\"2021-09-07T13:13:44+00:00\",\"description\":\"Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png\",\"width\":800,\"height\":450,\"caption\":\"Secure your organisation against cyberattacks featured image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to future-proof and secure your organisation against cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs - United Kingdom\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to future-proof and secure your organisation against cyberattacks - Microsoft Industry Blogs - United Kingdom","description":"Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"How to future-proof and secure your organisation against cyberattacks - Microsoft Industry Blogs - United Kingdom","og_description":"Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.","og_url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/","og_site_name":"Microsoft Industry Blogs - United Kingdom","article_published_time":"2021-09-06T12:07:31+00:00","article_modified_time":"2021-09-07T13:13:44+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png","type":"image\/png"}],"author":"Sarah Armstrong-Smith, Lesley Kipling","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sarah Armstrong-Smith, Lesley Kipling","Est. reading time":"6 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/sarah-armstrong-smith\/","@type":"Person","@name":"Sarah Armstrong-Smith"},{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/lesley-kipling\/","@type":"Person","@name":"Lesley Kipling"}],"headline":"How to future-proof and secure your organisation against cyberattacks","datePublished":"2021-09-06T12:07:31+00:00","dateModified":"2021-09-07T13:13:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/"},"wordCount":1510,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png","keywords":["Blogger Series","Cloud","Cyber-security","Hybrid Workplace","Insider threats","MFA","Security"],"articleSection":["Cross-industry"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/","name":"How to future-proof and secure your organisation against cyberattacks - Microsoft Industry Blogs - United Kingdom","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png","datePublished":"2021-09-06T12:07:31+00:00","dateModified":"2021-09-07T13:13:44+00:00","description":"Learn how to take a multi-faceted response of business, technology, and operations against cyberattacks to stay innovative and competitive.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2021\/09\/Secure-cyberattacks.png","width":800,"height":450,"caption":"Secure your organisation against cyberattacks featured image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2021\/09\/06\/future-proof-secure-against-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"How to future-proof and secure your organisation against cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","name":"Microsoft Industry Blogs - United Kingdom","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization","name":"Microsoft Industry Blogs - United Kingdom","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs - United Kingdom"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/51825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/users\/585"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/comments?post=51825"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/51825\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media\/52125"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media?parent=51825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/categories?post=51825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=51825"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=51825"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=51825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}