Understanding Qatar Infection Rates

One of the most interesting aspects of the Microsoft Security Intelligence Report is data on how regional malware infection rates change over time. This data helps us and our customers understand the tactics and strategies that attackers are using to compromise systems, steal identities and confidential data. Subsequently this intelligence helps our customers optimize their defenses.

Read more Understanding Qatar Infection Rates

Hang up on phone scams

Read more Hang up on phone scams

Millions of Java Exploit Attempts: The Importance of Keeping All Software Up To Date

Read more Millions of Java Exploit Attempts: The Importance of Keeping All Software Up To Date

Phone Scammers: Here to Help…Themselves

Read more Phone Scammers: Here to Help…Themselves

Weekly Roundup : Nov 25, 2011 : Black Friday and Cyber Monday Heralded with Release of More Malware

Read more Weekly Roundup : Nov 25, 2011 : Black Friday and Cyber Monday Heralded with Release of More Malware

Stay safer when you shop online (part 3 of 3)

Read more Stay safer when you shop online (part 3 of 3)

Think twice before you broadcast holiday plans

Read more Think twice before you broadcast holiday plans

Planning for the Unexpected

We might not be able to predict the unknown, but we can do our best to be prepared for it. For organizations of all sizes contingency planning is vital to success. To this end, my Microsoft colleague, Cindy Bates, vice president, U.S. SMB Organization, recently shared a set of helpful resources on the subject of disaster preparedness.

This e-guide helps cut through the clutter by pointing out the key factors for organizations to consider when building business contingency plans. There’s no one disaster preparedness plan that works for all organizations, but elements such as environment mapping, data backup options and communication methods are integral parts of any successful plan.

Read more Planning for the Unexpected

The Curious Case of Qatar

Read more The Curious Case of Qatar

Discussing Privacy in the Cloud

Read more Discussing Privacy in the Cloud