{"id":620,"date":"2017-03-27T14:13:13","date_gmt":"2017-03-27T18:13:13","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/industry\/2017\/03\/27\/dealing-with-changing-security-paradigm\/"},"modified":"2017-03-27T14:13:13","modified_gmt":"2017-03-27T18:13:13","slug":"dealing-with-changing-security-paradigm","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2017\/03\/27\/dealing-with-changing-security-paradigm\/","title":{"rendered":"Dealing with the Changing Security Paradigm"},"content":{"rendered":"

Businesses all around the globe are suffering massive data breaches affecting their operations and customer loyalty. The cyber threat landscape continues to grow and evolve with many factors contributing.<\/p>\n

It is evident more than ever that fully secure, trusted networks no longer exist. But why is enterprise security in such chaos? Security Perimeter thinking is a major contributor.. Perimeter security is insufficient, and Identity is, in fact, the new perimeter. The guiding principal of an effective security strategy is to \u201cAssume Breach\u201d, and contain the threat rather than prevent it.<\/p>\n

Good Security Practices are only a start<\/h2>\n

With cybercriminals constantly inventing new techniques and looking for new vulnerabilities, an optimized security network is only optimized for so long. Some basic security practices to put into place include:<\/p>\n