Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
This blog is part of a series that responds to common questions we receive from customers about how to most effectively deploy Microsoft 365 Security. -
Best practices for securely moving workloads to Microsoft Azure
Azure is Microsoft’s cloud computing environment. -
Developing an effective cyber strategy
The word strategy has its origins in the Roman Empire and was used to describe the leading of troops in battle. -
How to disrupt attacks caused by social engineering
This post is authored by Milad Aslaner, Senior Program Manager, Windows & Devices Group. -
SSN for authentication is all wrong
Unless you were stranded on a deserted island or participating in a zen digital fast chances are you’ve heard plenty about the massive Equifax breach and the head-rolling fallout. -
3 key tenets to help with security management
This post is authored by Berk Veral, Director, Product Marketing, Enterprise Cybersecurity Group. -
Top 5 best practices to automate security operations
This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group. -
5 Reasons why Microsoft should be your cybersecurity ally
When you think about cybersecurity, does Microsoft come to mind? Probably not. -
Tips for protecting your information and privacy against cybersecurity threats
This post is authored by Steven Meyers, security operations principal, Microsoft Cyber Defense Operations Center. -
Tips for securing your identity against cybersecurity threats
This post is authored by Simon Pope, Principal Security Group Manager, Microsoft Security Response Center. -
Use Enterprise Threat Detection to find “invisible” cyberattacks
This post is authored by Roberto Bamberger, Principal Consultant, Enterprise Cybersecurity Group. -
4 steps to managing shadow IT
Shadow IT is on the rise. More than 80 percent of employees report using apps that weren’t sanctioned by IT.