{"id":22779,"date":"2026-03-19T09:00:00","date_gmt":"2026-03-19T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=22779"},"modified":"2026-04-10T14:04:08","modified_gmt":"2026-04-10T21:04:08","slug":"microsoft-ciso-advice-read-our-four-tips-for-securing-your-network","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/","title":{"rendered":"Microsoft CISO advice: Read our four tips for securing your network"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Geoff Belknap, CVP and operating CISO for Core and Enterprise, shares four key practices your business can use to be prepared for managing network security incidents.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex has-2-columns\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:65px\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"95\" height=\"96\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Learn-how-p-g.png\" alt=\"\" class=\"wp-image-19668\" style=\"width:48px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4);margin-bottom:var(--wp--preset--spacing--spacing-4)\"><strong><strong>Learn from our experience<\/strong> <\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-4);margin-bottom:var(--wp--preset--spacing--spacing-4)\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/sfi\/network-isolation\" target=\"_blank\" rel=\"noreferrer noopener\">Network isolation (Secure Future Initiative)<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cKnowing where devices are, who owns them, and what they&#8217;re supposed to be doing is pretty important in the middle of an incident,\u201d Belknap says.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/nWPaaTHGE-M?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><figcaption class=\"wp-element-caption\"><em>Watch this video to see Geoff Belknap discuss how we&#8217;re securing our network at Microsoft. (For a transcript, please view the video on YouTube: <a href=\"https:\/\/www.youtube.com\/watch?v=nWPaaTHGE-M\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=nWPaaTHGE-M<\/a><\/em>.)<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Here are best practices you can use to secure your network:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Build a complete inventory.<\/strong> Keep track of what your network devices are, who owns them, and what they do.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Capture robust telemetry.<\/strong> Make sure your operational teams have the tools they need to see and analyze access and authentication logs.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Use dynamic access control. <\/strong>Manage who can send packets on the corporate network by applying policies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Deprecate old network assets. <\/strong>Cyberattackers know to look for older, unpatched network devices. You can reduce the attack surface by replacing older devices.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<ul class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-endpoint\/machines-view-overview?OCID=InsideTrack_Product_10864\" target=\"_blank\" rel=\"noreferrer noopener\">Find at-risk devices with device inventory in Microsoft Defender for Endpoint.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/managed-identities-azure-resources\/managed-identity-best-practice-recommendations?OCID=InsideTrack_Product_10864\" target=\"_blank\" rel=\"noreferrer noopener\">Learn how to apply managed identity best practices in Azure.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/networking\/security\/network-security\" target=\"_blank\" rel=\"noreferrer noopener\">Read about how to apply Azure network security in a Zero Trust approach to security.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/network-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Discover the key network security capabilities in Azure.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/compliance\/assurance\/assurance-network-security\" target=\"_blank\" rel=\"noreferrer noopener\">Explore how Microsoft online services secure the network boundary.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/benchmark\/azure\/security-controls-v3-network-security\" target=\"_blank\" rel=\"noreferrer noopener\">View security principles and guidance on establishing related network security controls.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Geoff Belknap, CVP and operating CISO for Core and Enterprise, shares four key practices your business can use to be prepared for managing network security incidents. Learn from our experience Network isolation (Secure Future Initiative) \u201cKnowing where devices are, who owns them, and what they&#8217;re supposed to be doing is pretty important in the middle [&hellip;]<\/p>\n","protected":false},"author":228,"featured_media":23082,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[71,896],"tags":[237,263,689,848,419],"coauthors":[895],"class_list":["post-22779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-office-of-the-ciso","tag-governance","tag-microsoft-365","tag-network-security","tag-security-and-risk-management","tag-zero-trust","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft CISO advice: Read our four tips for securing your network - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft CISO advice: Read our four tips for securing your network - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-19T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T21:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Social_image2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rani Lofstrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rani Lofstrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/\"},\"author\":{\"name\":\"Rani Lofstrom\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/a84c77f9cb72a705f03dfbc214dd817e\"},\"headline\":\"Microsoft CISO advice: Read our four tips for securing your network\",\"datePublished\":\"2026-03-19T16:00:00+00:00\",\"dateModified\":\"2026-04-10T21:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/\"},\"wordCount\":298,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10864-Hero_image2.jpg\",\"keywords\":[\"governance\",\"Microsoft 365\",\"Network Security\",\"Security and risk management\",\"Zero Trust\"],\"articleSection\":[\"Featured\",\"Office of the CISO\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/\",\"name\":\"Microsoft CISO advice: Read our four tips for securing your network - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10864-Hero_image2.jpg\",\"datePublished\":\"2026-03-19T16:00:00+00:00\",\"dateModified\":\"2026-04-10T21:04:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/a84c77f9cb72a705f03dfbc214dd817e\"},\"description\":\"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10864-Hero_image2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2026\\\/03\\\/10864-Hero_image2.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft CISO advice: Read our four tips for securing your network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/a84c77f9cb72a705f03dfbc214dd817e\",\"name\":\"Rani Lofstrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g1f4b72779f158e872aad1ea503fc8b81\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g\",\"caption\":\"Rani Lofstrom\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/rlofstrom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft CISO advice: Read our four tips for securing your network - Inside Track Blog","description":"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft CISO advice: Read our four tips for securing your network - Inside Track Blog","og_description":"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/","og_site_name":"Inside Track Blog","article_published_time":"2026-03-19T16:00:00+00:00","article_modified_time":"2026-04-10T21:04:08+00:00","og_image":[{"width":742,"height":417,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Social_image2.jpg","type":"image\/jpeg"}],"author":"Rani Lofstrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rani Lofstrom","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/"},"author":{"name":"Rani Lofstrom","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e"},"headline":"Microsoft CISO advice: Read our four tips for securing your network","datePublished":"2026-03-19T16:00:00+00:00","dateModified":"2026-04-10T21:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/"},"wordCount":298,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg","keywords":["governance","Microsoft 365","Network Security","Security and risk management","Zero Trust"],"articleSection":["Featured","Office of the CISO"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/","name":"Microsoft CISO advice: Read our four tips for securing your network - Inside Track Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg","datePublished":"2026-03-19T16:00:00+00:00","dateModified":"2026-04-10T21:04:08+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e"},"description":"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg","width":2300,"height":1293,"caption":"Corporate Vice President and Operating Chief Information Security Officer Geoff Belknap shares four tips for securing a corporate network."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsoft-ciso-advice-read-our-four-tips-for-securing-your-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft CISO advice: Read our four tips for securing your network"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/a84c77f9cb72a705f03dfbc214dd817e","name":"Rani Lofstrom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g1f4b72779f158e872aad1ea503fc8b81","url":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88c3eec1cb70ef934ce9039cd3d24ebd790bdd4d17bba4e5c1cab34692f73822?s=96&d=mm&r=g","caption":"Rani Lofstrom"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/rlofstrom\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2026\/03\/10864-Hero_image2.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-5Vp","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=22779"}],"version-history":[{"count":7,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22779\/revisions"}],"predecessor-version":[{"id":22812,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/22779\/revisions\/22812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/23082"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=22779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=22779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=22779"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=22779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}