Microsoft shares crucial tips to guard against cyber attacks | Photos

Microsoft shares crucial tips to guard against cyber attacks

With advancing technology, cybersecurity is a growing concern for businesses as cybercriminals exploit vulnerabilities through credential-based attacks. Microsoft Security reveals tips to safeguard yourself from these attacks.

By: HT TECH
| Updated on: May 29 2023, 11:41 IST
Cyber security
One of the most popular ways to steal information is ‘Phishing’. Phishing emails and websites created to attack corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.  (Microsoft)
1/6 One of the most popular ways to steal information is ‘Phishing’. Phishing emails and websites created to attack corporate targets only need to succeed once to gain credentials that can be sold to and shared with other bad actors.  (Microsoft)
Cyber security
Another way is 'Push-bombing,' which is an attack that triggers multiple access attempts with stolen credentials. It causes a rush of push notifications and can confuse the user and cause them to mistakenly allow authentication. So, how you can avoid such scenarios? (Pexels)
2/6 Another way is 'Push-bombing,' which is an attack that triggers multiple access attempts with stolen credentials. It causes a rush of push notifications and can confuse the user and cause them to mistakenly allow authentication. So, how you can avoid such scenarios? (Pexels)
Cybersecurity
First, always use Multi-Factor Authentication (MFA) with "Number Matching" or similar functionality. This also includes accepting a push notification and inputting a matching number.   (Pexels)
image caption
3/6 First, always use Multi-Factor Authentication (MFA) with "Number Matching" or similar functionality. This also includes accepting a push notification and inputting a matching number.   (Pexels)
Cybersecurity
To regain control and ensure security, isolation plays a vital role by enabling strict control of communications and access between security zones. Without proper isolation, the security model becomes ineffective. Therefore, remote administration necessitates a computer within the same security zone. (Unsplash)
image caption
4/6 To regain control and ensure security, isolation plays a vital role by enabling strict control of communications and access between security zones. Without proper isolation, the security model becomes ineffective. Therefore, remote administration necessitates a computer within the same security zone. (Unsplash)
cybersecurity
Keep your operating systems updated and maintain secure administrative practices. (Unsplash)
image caption
5/6 Keep your operating systems updated and maintain secure administrative practices. (Unsplash)
Cybersecurity
Finally, implement comprehensive centralized log collection with a well-defined retention policy.   (Pixabay)
image caption
6/6 Finally, implement comprehensive centralized log collection with a well-defined retention policy.   (Pixabay)
First Published Date: 29 May, 11:39 IST
NEXT ARTICLE BEGINS