{"id":22635,"date":"2026-03-12T09:00:00","date_gmt":"2026-03-12T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=22635"},"modified":"2026-04-10T14:00:30","modified_gmt":"2026-04-10T21:00:30","slug":"microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/","title":{"rendered":"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Microsoft business operations teams know all too well that cyberattackers seek to exploit customer support pathways. Tools that can unlock customer accounts or aid in troubleshooting issues in complex environments are a rich target.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThe path attackers really like to use is to compromise support tooling and laterally move to your core tooling,\u201d says Raji Dani, Deputy Chief Information Security Officer (CISO) for Microsoft business operations.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex has-2-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:65px\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"96\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Learn-how-p-g.png\" alt=\"\" class=\"wp-image-19668\" style=\"width:48px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4);margin-bottom:var(--wp--preset--spacing--spacing-4)\"><strong><strong>Learn from our experience<\/strong> <\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4);margin-bottom:var(--wp--preset--spacing--spacing-4)\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/10\/15\/the-importance-of-hardening-customer-support-tools-against-attack\/\" type=\"link\" id=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/picking-the-right-copilot-for-the-job-tips-from-our-experience-at-microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">The importance of hardening customer support tools against cyberattacks<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Dani and her team focus on understanding and mitigating the risks within customer support operations. In this video, she shares principles and practices for every business that relies on online tools in their customer support ecosystem.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/rJ87jjz3vvo?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><figcaption class=\"wp-element-caption\"><em>Watch this video to see Raji Dani discuss four customer support ecosystem security principles. (For a transcript, please view the video on YouTube: <a href=\"https:\/\/www.youtube.com\/watch?v=rJ87jjz3vvo\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=rJ87jjz3vvo <\/a><\/em>.)<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Here are best practices you can apply to your customer support ecosystem:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Create dedicated and isolated support identities. <\/strong>Use standardized support identities with phish-resistant multifactor authentication based in a separate identity ecosystem.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Implement least privilege and enforce device protection. <\/strong>Only grant the access needed for a given task and nothing more.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Ensure tooling does not have high privilege access to customer data. <\/strong>Architect secure tools and manage service-to-service trust and high privileged access.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Implement strong telemetry. <\/strong>Anomalous patterns in logs and telemetry data are often the first clue a cyberattack is underway.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/?OCID=InsideTrack_Product_10860\" target=\"_blank\" rel=\"noreferrer noopener\">Discover how to start applying Zero Trust practices to protect your customer support ecosystem.<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/07\/08\/enhancing-microsoft-365-security-by-eliminating-high-privilege-access\/\" target=\"_blank\" rel=\"noreferrer noopener\">Explore more approaches for eliminating high-privilege access to enhance security.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/mcsb-v2-logging-threat-detection\" target=\"_blank\" rel=\"noreferrer noopener\">Review logging and threat detection capabilities.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/sfi\/phishing-resistant-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">Find out more about phishing-resistant multifactor authentication.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/improving-security-by-protecting-elevated-privilege-accounts-at-microsoft\/\">Read how we\u2019re improving security by protecting elevated-privilege accounts at Microsoft.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-endpoint\/rbac\" target=\"_blank\" rel=\"noreferrer noopener\">Check out how to use role-based access control to manage endpoint access.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft business operations teams know all too well that cyberattackers seek to exploit customer support pathways. Tools that can unlock customer accounts or aid in troubleshooting issues in complex environments are a rich target. \u201cThe path attackers really like to use is to compromise support tooling and laterally move to your core tooling,\u201d says Raji [&hellip;]<\/p>\n","protected":false},"author":228,"featured_media":23080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71,896],"tags":[237,263,689,848,419],"coauthors":[895],"class_list":["post-22635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-office-of-the-ciso","tag-governance","tag-microsoft-365","tag-network-security","tag-security-and-risk-management","tag-zero-trust","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-12T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T21:00:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Social_image2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rani Lofstrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rani Lofstrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/\"},\"author\":{\"name\":\"Rani Lofstrom\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/a84c77f9cb72a705f03dfbc214dd817e\"},\"headline\":\"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem\",\"datePublished\":\"2026-03-12T16:00:00+00:00\",\"dateModified\":\"2026-04-10T21:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/\"},\"wordCount\":355,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10860-Hero_image2.jpg\",\"keywords\":[\"governance\",\"Microsoft 365\",\"Network Security\",\"Security and risk management\",\"Zero Trust\"],\"articleSection\":[\"Featured\",\"Office of the CISO\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/\",\"name\":\"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10860-Hero_image2.jpg\",\"datePublished\":\"2026-03-12T16:00:00+00:00\",\"dateModified\":\"2026-04-10T21:00:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/a84c77f9cb72a705f03dfbc214dd817e\"},\"description\":\"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10860-Hero_image2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10860-Hero_image2.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/a84c77f9cb72a705f03dfbc214dd817e\",\"name\":\"Rani Lofstrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g1f4b72779f158e872aad1ea503fc8b81\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g\",\"caption\":\"Rani Lofstrom\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/rlofstrom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem - Inside Track Blog","description":"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem - Inside Track Blog","og_description":"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/","og_site_name":"Inside Track Blog","article_published_time":"2026-03-12T16:00:00+00:00","article_modified_time":"2026-04-10T21:00:30+00:00","og_image":[{"width":742,"height":417,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Social_image2.jpg","type":"image\/jpeg"}],"author":"Rani Lofstrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rani Lofstrom","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/"},"author":{"name":"Rani Lofstrom","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e"},"headline":"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem","datePublished":"2026-03-12T16:00:00+00:00","dateModified":"2026-04-10T21:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/"},"wordCount":355,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg","keywords":["governance","Microsoft 365","Network Security","Security and risk management","Zero Trust"],"articleSection":["Featured","Office of the CISO"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/","name":"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem - Inside Track Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg","datePublished":"2026-03-12T16:00:00+00:00","dateModified":"2026-04-10T21:00:30+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e"},"description":"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg","width":2300,"height":1293,"caption":"Deputy Chief Information Security Officer Raji Dani shares four best practices for securing customer support ecosystems."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-explore-our-four-tips-for-securing-your-customer-support-ecosystem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft CISO advice: Explore our four tips for securing your customer support ecosystem"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e","name":"Rani Lofstrom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g1f4b72779f158e872aad1ea503fc8b81","url":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g","caption":"Rani Lofstrom"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/rlofstrom\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10860-Hero_image2.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-5T5","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=22635"}],"version-history":[{"count":19,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22635\/revisions"}],"predecessor-version":[{"id":22726,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22635\/revisions\/22726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/23080"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=22635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=22635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=22635"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=22635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}