HT TECH wants to start sending you push notifications. Click allow to subscribe

Microsoft shares crucial tips to guard against cyber attacks

With advancing technology, cybersecurity is a growing concern for businesses as cybercriminals exploit vulnerabilities through credential-based attacks. Microsoft Security reveals tips to safeguard yourself from these attacks.

By: HT TECH
Updated on: May 29 2023, 11:41 IST
One of the most popular ways to steal information is ‘Phishing’. Phishing emails and websites created to attack corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.  (Microsoft)
1/6 One of the most popular ways to steal information is ‘Phishing’. Phishing emails and websites created to attack corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.  (Microsoft)
Another way is 'Push-bombing,' which is an attack that triggers multiple access attempts with stolen credentials. It causes a rush of push notifications and can confuse the user and cause them to mistakenly allow authentication. So, how you can avoid such scenarios? (Pexels)
2/6 Another way is 'Push-bombing,' which is an attack that triggers multiple access attempts with stolen credentials. It causes a rush of push notifications and can confuse the user and cause them to mistakenly allow authentication. So, how you can avoid such scenarios? (Pexels)
First, always use Multi-Factor Authentication (MFA) with "Number Matching" or similar functionality. This also includes accepting a push notification and inputting a matching number.   (Pexels)
3/6 First, always use Multi-Factor Authentication (MFA) with "Number Matching" or similar functionality. This also includes accepting a push notification and inputting a matching number.   (Pexels)
To regain control and ensure security, isolation plays a vital role by enabling strict control of communications and access between security zones. Without proper isolation, the security model becomes ineffective. Therefore, remote administration necessitates a computer within the same security zone. (Unsplash)
4/6 To regain control and ensure security, isolation plays a vital role by enabling strict control of communications and access between security zones. Without proper isolation, the security model becomes ineffective. Therefore, remote administration necessitates a computer within the same security zone. (Unsplash)

You may be interested in

Mobiles Tablets Laptops
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹148,900₹159,900
Buy now
23% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
₹115,999₹149,999
Buy now
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
₹106,998
Check details
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹87,900
Check details
27% OFF
Microsoft Surface Studio A1Y 00022
  • Platinum Silver
  • 16 GB LPDDR4X RAM
  • 512 GB SSD
₹179,990₹245,900
Buy now
7% OFF
Microsoft Surface Pro 8 8PV 00029
  • Graphite Black
  • 16 GB DDR4 RAM
  • 256 GB SSD
₹139,999₹149,999
Buy now
47% OFF
Microsoft Surface 4 5UI 00049
  • Platinum Silver
  • 8 GB DDR4 RAM
  • 256 GB SSD
₹98,000₹186,500
Buy now
28% OFF
Microsoft Surface Pro 7 M1866 VDH 00013
  • Platinum
  • 4 GB LPDDR4X RAM
  • 128 GB SSD
₹74,000₹102,990
Buy now
34% OFF
Xiaomi Pad 6
  • Mist Blue
  • 6 GB RAM
  • 128 GB Storage
₹26,299₹39,999
Buy now
55% OFF
Lenovo Tab M10 5G
  • Abyss Blue
  • 6 GB RAM
  • 128 GB Storage
₹20,999₹47,000
Buy now
32% OFF
Realme Pad 2
  • Imagination Grey
  • 6 GB RAM
  • 128 GB Storage
₹19,790₹28,999
Buy now
Honor Pad X9
  • Gray
  • 4 GB RAM
  • 128 GB Storage
₹14,999
Check details
Keep your operating systems updated and maintain secure administrative practices. (Unsplash)
5/6 Keep your operating systems updated and maintain secure administrative practices. (Unsplash)
Finally, implement comprehensive centralized log collection with a well-defined retention policy.   (Pixabay)
6/6 Finally, implement comprehensive centralized log collection with a well-defined retention policy.   (Pixabay)
First Published Date: 29 May, 11:39 IST

Sale

Mobiles Tablets Laptops
4% OFF
Samsung Galaxy S24 Ultra
  • Titanium Black
  • 12 GB RAM
  • 256 GB Storage
₹129,999₹134,999
Buy now
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹148,900₹159,900
Buy now
13% OFF
Xiaomi 14
  • Matte Black
  • 12 GB RAM
  • 512 GB Storage
₹69,999₹79,999
Buy now
8% OFF
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹82,600₹89,900
Buy now
35% OFF
Xiaomi Pad 6
  • Mist Blue
  • 6 GB RAM
  • 128 GB Storage
₹25,999₹39,999
Buy now
53% OFF
Lenovo Tab M10 5G
  • Abyss Blue
  • 6 GB RAM
  • 128 GB Storage
₹21,999₹47,000
Buy now
36% OFF
Realme Pad 2
  • Imagination Grey
  • 6 GB RAM
  • 128 GB Storage
₹18,699₹28,999
Buy now
31% OFF
Samsung Galaxy Tab A7 Lite
  • Silver
  • 3 GB RAM
  • 32 GB Storage
₹9,990₹14,500
Buy now
23% OFF
Infinix INBook X1 Neo XL22 Laptop Intel Celeron Quad Core 8 GB 256 GB SSD Windows 11
  • Blue
  • 4 GB RAM
  • 128 GB SSD
₹22,990₹29,990
Buy now
24% OFF
Asus ROG Strix G15 G512LI HN057T Laptop
  • Black
  • 16 GB RAM
  • 512 GB SSD
₹68,990₹90,990
Buy now
42% OFF
MSI Modern 15 A5M 055IN Laptop
  • Black
  • 8 GB RAM
  • 512 GB SSD
₹35,990₹61,990
Buy now
29% OFF
Asus VivoBook 15X OLED K3504VA LK541WS Laptop
  • Indie Black
  • 16 GB RAM
  • 512 GB SSD
₹65,980₹92,990
Buy now
NEXT ARTICLE BEGINS