{"id":13669,"date":"2024-03-12T15:16:36","date_gmt":"2024-03-12T22:16:36","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=13669"},"modified":"2025-10-17T11:16:40","modified_gmt":"2025-10-17T18:16:40","slug":"lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/","title":{"rendered":"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"112\" class=\"size-medium wp-image-7498 alignright\" style=\"margin-top: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories-300x112.png\" alt=\"Microsoft Digital technical stories\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories-300x112.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/ms-digital-technical-stories.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>As a part of our journey to reduce our ransomware risk internally here at Microsoft, we\u2019ve identified five principles that we believe every enterprise should follow to make themselves more secure from these attacks. We call these our Foundational Five of Ransomware.<\/p>\n<p>While we use Microsoft products to secure our systems, infrastructure, data, and identities, the Foundational Five are product agnostic and can be scaled to meet the needs and requirements of organizations of any size. This is especially important for smaller organizations, with 70 percent of encounters with human-operated ransomware happening in organizations with fewer than 500 employees, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noopener\">according to the Microsoft Digital Defense Report 2023<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_13674\" aria-describedby=\"caption-attachment-13674\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-13674\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Ransomware-Graphic-300x169.png\" alt=\"The five principles for fighting ransomware: Modern authentication, automatic cloud back up file-syncing, threat- and risk-free environments, posture management, and least privileged access.\" width=\"1000\" height=\"563\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Ransomware-Graphic-300x169.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Ransomware-Graphic-1024x576.png 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Ransomware-Graphic-768x432.png 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Ransomware-Graphic-1000x562.png 1000w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Ransomware-Graphic.png 1200w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-13674\" class=\"wp-caption-text\">We\u2019ve learned that adhering to these five principles is the key to fighting ransomware.<\/figcaption><\/figure>\n<h3>Our Foundational Five are:<\/h3>\n<ol class=\"c-list\">\n<li>Move to modern authentication with phishing-resistant multi-factor authentication.<\/li>\n<li>Always use automatic cloud backup and file syncing.<\/li>\n<li>Work towards having threat- and risk-free environments.<\/li>\n<li>Upgrade your posture management to improve the health of your devices, services, and assets.<\/li>\n<li>Apply least privileged access standards to your full technology stack.<\/li>\n<\/ol>\n<h2 style=\"margin-top: 20px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-13384 size-full\" style=\"float: none; margin-top: 0px; margin-right: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/02\/1-icon-50x50-1.png\" alt=\"1.\" width=\"50\" height=\"50\" \/> Modern authentication with phishing-resistant multi-factor authentication<\/h2>\n<p>It\u2019s a well-known fact that today\u2019s threat actors don\u2019t break in, they sign in. Whether done through illicitly acquired credentials, brute force attacks, or phishing, inadequate protective measures for authentication are like leaving the front door wide open for attackers to walk through.<\/p>\n<blockquote class=\"quote-body\"><p>Microsoft Incident Response observed that 21 percent of customers who experienced ransomware didn\u2019t have MFA or didn\u2019t mandate MFA for privileged accounts, while 37 percent didn\u2019t have advanced MFA protection mechanisms enabled.<\/p>\n<p class=\"source\">\u20142023 Microsoft Digital Defense Report<\/p>\n<\/blockquote>\n<p>The growth in password-based identity attacks on Microsoft Entra is startling, with a 10-fold increase observed between 2022 and 2023. While the use of multi-factor authentication (MFA) adds an extra layer of security, threat actors are increasingly turning to techniques such as MFA bombing to catch unwitting users off guard. Earlier in 2023, we observed 6,000 MFA fatigue attempts per day on customer identities. This is why we strongly advise using phishing-resistant MFA.<\/p>\n<p>Phishing-resistant MFA differs from traditional MFA by binding the token to the legitimate user\u2019s device. Windows Hello for Business and FIDO2 services, like physical tokens and Passkey, are examples of technologies that can be used for added protection. When combined with conditional access policies and step-up authentication, this can be an effective method to protect users who have access to sensitive resources or high-risk roles.<\/p>\n<p>Microsoft Incident Response observed that 21 percent of customers who experienced ransomware didn\u2019t have MFA or didn\u2019t mandate MFA for privileged accounts, while 37 percent didn\u2019t have advanced MFA protection mechanisms enabled.<\/p>\n<p>Phishing-resistant MFA with conditional access can help prevent:<\/p>\n<ul class=\"c-list\">\n<li><strong>Spear phishing:<\/strong> Attackers craft tailored phishing emails that are sophisticated and challenging to identify, aiming to deceive specific individuals.<\/li>\n<li><strong>Remote<\/strong><strong> Desktop Protocol (RDP) brute force attacks:<\/strong> Unauthorized remote access to resources is attempted through the exploitation of stolen credentials.<\/li>\n<li><strong>Local password storage:<\/strong> Measures are in place to prevent passwords stored locally on devices from being read or downloaded.<\/li>\n<li><strong>Unencrypted credential storage:<\/strong> Credentials are safeguarded against being stored without encryption, which would otherwise allow easy unauthorized access.<\/li>\n<li><strong>Credential and cookie theft:<\/strong> Security protocols are enforced to protect against the theft of credentials or cookies directly from browsers.<\/li>\n<li><strong>Unauthorized account creation:<\/strong> Systems are secured to prevent the unauthorized addition of new user accounts.<\/li>\n<\/ul>\n<p>What we use:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13706\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-Icon-13-29x25-1.png\" alt=\"\" \/><strong>Windows Hello for Business<\/strong> enhances multifactor authentication by offering secure sign-in capabilities and enabling a passwordless experience.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13729\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579-_Icon_11-32x35-1.png\" alt=\"\" \/><strong>Authenticator app<\/strong> is a secure and encrypted application that facilitates multifactor authentication to safeguard access to accounts and services.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13740\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_12-32x35-1.png\" alt=\"\" \/><strong>Entra ID<\/strong> serves as a comprehensive identity and access management solution.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13740\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_12-32x35-1.png\" alt=\"\" \/><strong>Secure Service Edge<\/strong> functions as a unified security point for protecting data and users across all network traffic.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13741\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_14-31x13-1.png\" alt=\"\" width=\"40\" height=\"17\" \/> <strong>FIDO keys<\/strong> offer a form of hardware-based authentication that is resistant to phishing and other forms of account compromise.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-13384 size-full\" style=\"float: none; margin-top: 0px; margin-right: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/02\/2-icon-50x50-1.png\" alt=\"2.\" width=\"50\" height=\"50\" \/> Automatic cloud backup and file-syncing for user and business-critical data<\/h2>\n<blockquote class=\"quote-body\"><p>Microsoft has observed that approximately 16 percent of human-operated ransomware activity involved both encryption and exfiltration, while 13 percent used exfiltration exclusively.<\/p>\n<p class=\"source\">\u20142023 Microsoft Digital Defense Report<\/p>\n<\/blockquote>\n<p>Much of the Foundational Five is about setting up preventative measures to secure your organization. But in the event of a successful breach, it\u2019s important that your data remains secure and accessible. For many organizations that have suffered a ransomware attack the biggest costs associated are restoring business continuity, including access to the files and resources vital to your organization.<\/p>\n<p>Setting up automatic cloud backup and file-syncing is one of the simplest ways to help achieve this, and arguably delivers the biggest bang for the buck in a ransomware prevention strategy. Active automatic backups can thwart common ransomware tactics including the disabling of system recovery capabilities and the deletion of , which are essential for business continuity. In some cases, it might be effective in preventing the exfiltration of documents, which can be used for data dumping, or double and triple extortion.<\/p>\n<p>\u201cMicrosoft has observed that approximately 16 percent of human-operated ransomware activity involved both encryption and exfiltration, while 13 percent used exfiltration exclusively,\u201d states the 2023 Microsoft Digital Defense Report.<\/p>\n<p>We recommend at a minimum setting up automatic cloud backup and file-syncing on all user devices for key folders such as Desktop, Documents, and other locations where user data and business-critical data are stored.<\/p>\n<p>Automatic cloud backup and file-syncing protects people from:<\/p>\n<ul class=\"c-list\">\n<li><strong>Deletion of shadow copy files:<\/strong> These are built-in local backup copies in Windows that aid in device restoration in the event of a compromise.<\/li>\n<li><strong>Disabling of recovery features:<\/strong> It ensures that features enabling individual device recovery remain active and cannot be turned off.<\/li>\n<li><strong>Document exfiltration for double extortion:<\/strong> It protects against scenarios where malicious actors not only demand a ransom to decrypt files but also threaten to release sensitive documents publicly unless an additional ransom is paid.<\/li>\n<\/ul>\n<p>What we use:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"45\" height=\"25\" class=\"alignnone size-full wp-image-13738\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_9-45x25-1.png\" alt=\"\" \/><strong>OneDrive for Business<\/strong> is used for cloud-based device backups, ensuring data recovery in case of device compromise.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13739\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_10-42x35-1.png\" alt=\"\" \/><strong>Azure Backup Center<\/strong> (also known as Azure Cloud Backup) is used for the automated backup of Azure infrastructure and data, providing a reliable disaster recovery solution.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-13384 size-full\" style=\"float: none; margin-top: 0px; margin-right: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/02\/3-icon-50x50-1.png\" alt=\"3.\" width=\"50\" height=\"50\" \/> Threat- and risk-free environments<\/h2>\n<p>As there are always new and evolving cyber-risks, it\u2019s a continual effort to create an environment that\u2019s protected from ransomware by proactive measures. And while it might not be possible to guarantee an environment entirely free of threats and risks, it\u2019s something worth striving towards.<\/p>\n<p>Creating a threat- and risk-free environment starts with ensuring that the devices joining your network are healthy, and that controls are put in place to ensure vulnerabilities and threats are managed. We ensure this through the comprehensive use of endpoint detection and response (EDR) and our device management policy for all devices and operating systems. Our device health policy includes mandatory encryption, antimalware, tamper protection, specific mandatory hardware configurations, and minimum operating system version requirements. Devices that aren&#8217;t patched, updated, or properly configured are frequently exploited by threat actors and are vulnerable to cyberattacks. These devices aren\u2019t allowed on our network\u2014no exceptions permitted.<\/p>\n<p>Threat- and risk-free environments protect against:<\/p>\n<ul class=\"c-list\">\n<li><strong>Platform and supply chain-based attacks:<\/strong> These are sophisticated attacks that target vulnerabilities in the hardware and software supply chain, potentially compromising the integrity of platforms and services.<\/li>\n<li><strong>Threat actor reconnaissance:<\/strong> This refers to the preliminary activities of threat actors to gather information about systems and networks, identifying potential vulnerabilities to exploit.<\/li>\n<li><strong>Disabling of security features or systems:<\/strong> Prevent unauthorized attempts to disable or circumvent security measures that are in place to protect data and systems.<\/li>\n<li><strong>Deployment of ransomware:<\/strong> By maintaining a secure posture, the environment is protected against the deployment of ransomware, which can encrypt data and disrupt operations, demanding a ransom for decryption.<\/li>\n<\/ul>\n<p>What we use:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13736\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_7-37x35-1.png\" alt=\"\" \/><strong>Microsoft Entra Privileged Identity Management<\/strong> is used for managing and monitoring privileged roles within our organization.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13735\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_6-38x35-1.png\" alt=\"\" \/><strong>Microsoft Defender for Cloud<\/strong> offers comprehensive protection across cloud services to secure infrastructure and data.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13737\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_8-37x35-1.png\" alt=\"\" \/><strong>Microsoft Defender for Endpoint<\/strong> provides advanced threat defense and post-breach detection for endpoints.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13734\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_5-32x35-1.png\" alt=\"\" \/><strong>Microsoft Entra Identity Protection<\/strong> uses automated responses to detected identity risks, safeguarding user identities within the organization.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-13384 size-full\" style=\"float: none; margin-top: 0px; margin-right: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/02\/4-icon-50x50-1.png\" alt=\"4.\" width=\"50\" height=\"50\" \/> Posture management for compliance and the health of devices, services, and assets<\/h2>\n<p>The standards and policies an organization uses to protect against ransomware are only as good as the degree of adherence. This is where security posture management can help drive down the risk of a successful ransomware attack.<\/p>\n<p>The monitoring of cloud-based systems and infrastructures creates visibility and improves control over policies and configurations. It highlights risks and misconfigurations, such as insecure secrets and keys, potential points of data exposure, and data flows and resources containing sensitive and shadow data to be discovered and remediated. Increasingly, remediation can be automated when triggered by security events.<\/p>\n<p>Strong posture management can protect against:<\/p>\n<ul class=\"c-list\">\n<li><strong>Exploitation of vulnerable services:<\/strong> This prevents attackers from taking advantage of services that have known weaknesses or aren\u2019t regularly updated with patches.<\/li>\n<li><strong>Unpatched vulnerabilities in applications:<\/strong> This ensures that applications are kept up to date with the latest security patches to mitigate the risk of exploitation.<\/li>\n<li><strong>Scheduled tasks leading to system compromise:<\/strong> This controls and monitors scheduled tasks to prevent them from being used as a pathway for system compromise.<\/li>\n<\/ul>\n<p>What we use:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13737\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_8-37x35-1.png\" alt=\"\" \/><strong>Microsoft Defender for Endpoint<\/strong> provides advanced protection for enterprise endpoints with threat prevention, detection, and response capabilities.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13735\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_6-38x35-1.png\" alt=\"\" \/><strong>Microsoft Defender for Cloud<\/strong> secures cloud services by safeguarding infrastructure and data against threats.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13733\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_4-32x35-1.png\" alt=\"\" \/><strong>Azure Policy<\/strong> enforces organizational standards and monitors compliance, providing automated remediation for policy violations.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-13384 size-full\" style=\"float: none; margin-top: 0px; margin-right: 0px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/02\/5-icon-50x50-1.png\" alt=\"5.\" width=\"50\" height=\"50\" \/> Least privileged access applied to the entire technology stack<\/h2>\n<p>Least privileged access (LPA) involves limiting access to only what\u2019s necessary to perform the intended function. This includes concepts such as removing admin from a workstation, limiting access to on-premises and cloud environments, and restricting access to critical services to only specific administrative roles. It\u2019s a way of reducing the cyber-attack surface, stopping the spread of malicious activity. Additionally, LPA helps to prevent privilege creep, which happens when users accumulate unnecessary access to accounts over time.<\/p>\n<p>LPA can help prevent ransomware attacks by limiting the access rights of users and devices to only the resources they need to perform their tasks. Should a user or device be compromised by ransomware, the impact and spread of the infection is minimized. Ransomware often relies on exploiting vulnerabilities or stealing credentials to gain access to sensitive data and systems. By applying the principle of least privilege, organizations can reduce the attack surface and the potential damage of ransomware attacks.<\/p>\n<p>We recommend applying LPA over the entire technology stack as it ensures complete protection of all parts including devices, users, applications, systems, and data. Comprehensive application will require a solution that can manage and secure privileged credentials and controls.<\/p>\n<p>When applied to the entire stack, LPA protects against:<\/p>\n<ul class=\"c-list\">\n<li><strong>Ransomware:<\/strong> By ensuring that users and devices have access only to the data and systems necessary for their roles, LPA prevents ransomware from encrypting or exfiltrating data.<\/li>\n<li><strong>Privilege creep:<\/strong> LPA combats the accumulation of unnecessary privileges by users over time, which can be exploited by ransomware and other malicious software.<\/li>\n<li><strong>Inappropriate access levels:<\/strong> Regular monitoring and reviews under LPA ensure that users and devices maintain appropriate access levels, reducing the risk of inappropriate access.<\/li>\n<\/ul>\n<p>What we use:<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13732\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_3-35x35-1.png\" alt=\"\" \/><strong>Entra PIM <\/strong>manages roles and permissions, ensuring just-in-time access to critical resources in line with LPA.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13731\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_2x39x35.png\" alt=\"\" \/><strong>Intune <\/strong>protects least privilege by enabling organizations to run users as standard while elevating privileges only when necessary.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-13730\" style=\"display: inline;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_Icon_1-38x35-1.png\" alt=\"\" \/><strong>Entra Conditional Access within Microsoft Entra<\/strong> secures resource access by enforcing rules based on user location, device status, and sign-in behavior.<\/p>\n<h2>Building an even stronger foundation<\/h2>\n<p>The Foundational Five are an excellent starting point to defending your enterprise against ransomware. However, it\u2019s just the beginning of a broader, more involved strategy against cybercrime.<\/p>\n<p>If your organization doesn\u2019t already have one, consider developing a <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RW15llO?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noopener\">ransomware incident response playbook<\/a> and pressure-test its efficacy with table-top exercises or attack simulations. Incident response preparedness has an outsized effect on business continuity and recovery.<\/p>\n<p>Additionally, as phishing is a common starting point for ransomware threat actors, consider frequent phishing simulations, and education and awareness training for employees on topics including business email compromise and vendor email compromise\u2014both of which are on the rise.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"74\" class=\"alignnone size-medium wp-image-7448\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png\" alt=\"Key Takeaways\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways-300x74.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/key-takeaways.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\nHere are some suggestions for getting started with the Foundational Five of ransomware elimination at your company:<\/p>\n<ul class=\"c-list\">\n<li>Progressively build up and invest in your ransomware elimination strategy. The goal is to make incremental improvements to reduce your attack surface area.<\/li>\n<li>While attackers commonly sign in using stolen credentials, MFA attacks are on the rise. Consider the use of phishing-resistant credentials such as FIDO2 tokens and ensure that users have the correct privileges to limit mobility.<\/li>\n<li>Ensure that the technologies and systems you have in place are properly configured and fully operational. Test your systems to ensure they\u2019re working as expected.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"81\" class=\"alignnone size-medium wp-image-7482\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png\" alt=\"Related links\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links-300x81.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2021\/10\/related_links.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul class=\"c-list\">\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noopener\">Read the Microsoft Digital Defense Report 2023 to learn more.<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/solutions\/ransomware-protection-microsoft-365?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">Explore deploying ransomware protection for your Microsoft 365 tenant.<\/a><\/li>\n<li><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-blog\/defend-your-users-from-mfa-fatigue-attacks\/ba-p\/2365677\" target=\"_blank\" rel=\"noopener\">Read more about defending your users from MFA fatigue attacks.<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/verifying-device-health-at-microsoft-with-zero-trust\/\">Unpack verifying device health at Microsoft with Zero Trust.<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/insidetrack\/transitioning-to-modern-access-architecture-with-zero-trust\">Discover transitioning to modern access architecture with Zero Trust.<\/a><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"68\" class=\"alignnone size-medium wp-image-11919\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-300x68.png\" alt=\"Try it out\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-300x68.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-1024x234.png 1024w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out-768x175.png 768w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/07\/OKR_Try_it_out.png 1319w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><br \/>\n<a href=\"https:\/\/azure.microsoft.com\/en-us\/explore\/security\/?OCID=InsideTrack_Product_10579\" target=\"_blank\" rel=\"noopener\">Strengthen your security posture with Microsoft Azure.<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-12081 size-full\" style=\"margin-top: 15px;\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1.png\" alt=\"We'd like to hear from you!\" width=\"580\" height=\"85\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1.png 580w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2023\/05\/Customer-Survey-580x85-1-300x44.png 300w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><br \/>\n<a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/p>\n<p><a href=\"https:\/\/forms.office.com\/r\/czbs6PptPe\" target=\"_blank\" rel=\"noopener\">Please share your feedback with us\u2014take our survey and let us know what kind of content is most useful to you.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a part of our journey to reduce our ransomware risk internally here at Microsoft, we\u2019ve identified five principles that we believe every enterprise should follow to make themselves more secure from these attacks. We call these our Foundational Five of Ransomware. While we use Microsoft products to secure our systems, infrastructure, data, and identities, [&hellip;]<\/p>\n","protected":false},"author":175,"featured_media":13675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71],"tags":[848,419],"coauthors":[774,775],"class_list":["post-13669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","tag-security-and-risk-management","tag-zero-trust","program-microsoft-digital-technical-stories","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk<\/title>\n<meta name=\"description\" content=\"Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk\" \/>\n<meta property=\"og:description\" content=\"Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-12T22:16:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T18:16:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Justin Couture, Justin Roy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Justin Couture, Justin Roy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/\"},\"author\":{\"name\":\"Justin Couture\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/704b4d7a329da8d9906373d0e80386c9\"},\"headline\":\"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk\",\"datePublished\":\"2024-03-12T22:16:36+00:00\",\"dateModified\":\"2025-10-17T18:16:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/\"},\"wordCount\":2237,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/03\\\/10579_hero_2300x1293.jpg\",\"keywords\":[\"Security and risk management\",\"Zero Trust\"],\"articleSection\":[\"Featured\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/\",\"name\":\"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/03\\\/10579_hero_2300x1293.jpg\",\"datePublished\":\"2024-03-12T22:16:36+00:00\",\"dateModified\":\"2025-10-17T18:16:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/704b4d7a329da8d9906373d0e80386c9\"},\"description\":\"Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/03\\\/10579_hero_2300x1293.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2024\\\/03\\\/10579_hero_2300x1293.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We\u2019ve learned that there are five key steps you can take to reduce your ransomware risk.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/704b4d7a329da8d9906373d0e80386c9\",\"name\":\"Justin Couture\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d307839d4f6445d9528bbf6a0c59c1a9caed5e3d5d759b85fb3f6b9af45ca815?s=96&d=mm&r=ga41c9d43312f2b8dc833449214ede474\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d307839d4f6445d9528bbf6a0c59c1a9caed5e3d5d759b85fb3f6b9af45ca815?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d307839d4f6445d9528bbf6a0c59c1a9caed5e3d5d759b85fb3f6b9af45ca815?s=96&d=mm&r=g\",\"caption\":\"Justin Couture\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/jcouture\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk","description":"Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/","og_locale":"en_US","og_type":"article","og_title":"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk","og_description":"Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/","og_site_name":"Inside Track Blog","article_published_time":"2024-03-12T22:16:36+00:00","article_modified_time":"2025-10-17T18:16:40+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg","type":"image\/jpeg"}],"author":"Justin Couture, Justin Roy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Justin Couture, Justin Roy","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/"},"author":{"name":"Justin Couture","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/704b4d7a329da8d9906373d0e80386c9"},"headline":"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk","datePublished":"2024-03-12T22:16:36+00:00","dateModified":"2025-10-17T18:16:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/"},"wordCount":2237,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg","keywords":["Security and risk management","Zero Trust"],"articleSection":["Featured"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/","name":"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg","datePublished":"2024-03-12T22:16:36+00:00","dateModified":"2025-10-17T18:16:40+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/704b4d7a329da8d9906373d0e80386c9"},"description":"Check out the five key principles that we use to reduce our ransomware risk internally here at Microsoft.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg","width":2300,"height":1293,"caption":"We\u2019ve learned that there are five key steps you can take to reduce your ransomware risk."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-at-microsoft-five-steps-you-can-take-to-reduce-your-ransomware-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Lessons learned at Microsoft: Five steps you can take to reduce your ransomware risk"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/704b4d7a329da8d9906373d0e80386c9","name":"Justin Couture","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d307839d4f6445d9528bbf6a0c59c1a9caed5e3d5d759b85fb3f6b9af45ca815?s=96&d=mm&r=ga41c9d43312f2b8dc833449214ede474","url":"https:\/\/secure.gravatar.com\/avatar\/d307839d4f6445d9528bbf6a0c59c1a9caed5e3d5d759b85fb3f6b9af45ca815?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d307839d4f6445d9528bbf6a0c59c1a9caed5e3d5d759b85fb3f6b9af45ca815?s=96&d=mm&r=g","caption":"Justin Couture"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/jcouture\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2024\/03\/10579_hero_2300x1293.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-3yt","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/13669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/175"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=13669"}],"version-history":[{"count":51,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/13669\/revisions"}],"predecessor-version":[{"id":13794,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/13669\/revisions\/13794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/13675"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=13669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=13669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=13669"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=13669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}