{"id":41759,"date":"2020-10-14T08:00:57","date_gmt":"2020-10-14T07:00:57","guid":{"rendered":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?p=41759"},"modified":"2020-11-17T17:13:33","modified_gmt":"2020-11-17T16:13:33","slug":"leveraging-security-to-build-customer-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/10\/14\/leveraging-security-to-build-customer-trust\/","title":{"rendered":"Leveraging security to build customer trust"},"content":{"rendered":"
Our year of social, institutional and commercial upheaval \u2013 including the widespread emergence of remote-working, the growth of e-commerce and evidence of COVID 19-related cybercrime<\/a> \u2013 has certainly thrust the issue of cybersecurity into the spotlight.<\/p>\n The link between secure data and trust is well established. It is also a topic that frequently comes up when I talk to our customers and partners<\/span><\/span>. You cannot have trust without privacy, and you cannot have privacy without security. Many organisations now face the challenge of meeting the growing expectations of customers while maintaining productivity in a secure, \u2018hybrid\u2019 environment.<\/p>\n Clearly, it\u2019s a narrow path, and this year in particular we\u2019ve been learning how to walk it. So today, I\u2019m going to share our learnings \u2013 that it\u2019s possible to retain and even improve customer trust while effectively managing security and risk<\/a>.<\/p>\n Innovation and productivity are hugely important to organisations, especially in unpredictable times. So how can an effective security solution work with and enable them?<\/p>\n Our experience is that having an integrated approach built on a \u2018zero-trust\u2019 model can keep your digital real estate secure, without sacrificing creativity or impacting workflows.<\/p>\n What is zero trust? It\u2019s when all users, devices, apps and infrastructure \u2013 both inside and outside your network \u2013 are presumed untrustworthy. So, by default, the same automated security checks are applied to all users, devices, applications and data, every time.<\/p>\n When we implemented zero trust at Microsoft<\/a>, it enabled our employees to access the tools they needed to work with their customers, from anywhere.<\/p>\n We\u00a0<\/span><\/span>also\u00a0<\/span><\/span>use single sign<\/span><\/span>–<\/span><\/span>on\u00a0<\/span><\/span>using<\/span><\/span>\u00a0<\/span><\/span>biometric based authentication wherever possible, focussing on multi-factor\u00a0<\/span><\/span>authentication<\/span><\/span>.<\/span><\/span>\u00a0<\/span><\/span>MFA reduces the risk of identity fraud by more than 99.9 percent<\/span><\/span><\/span><\/a>.\u00a0<\/span><\/span>And s<\/span><\/span>ingle sign<\/span><\/span>–<\/span><\/span>on means employees only\u00a0<\/span><\/span>have to<\/span><\/span>\u00a0sign in securely on a device once (unless the conditions change) before accessing all the tools and apps they need to provide great customer experiences.<\/span><\/span>\u00a0<\/span><\/p>\n In a fast-changing threat landscape, it\u2019s crucial to safeguard organisational data. Our own research<\/a> suggests that criminals have even been exploiting COVID-19 for their own personal gain. For a company like Vodafone, they have to keep over 630 million customers\u2019 data secure, while complying with government regulations. They also want to ensure they can continue delivering services to customers.<\/p>\n <\/a><\/p>\n Alongside our zero-trust model, we\u2019ve established a secure foundation, based on Azure. It has multi-layered security across physical data centres, infrastructure and operations. We have over 3,500 global cybersecurity experts working to safeguard assets and data. In the background, machine learning, behavioural analytics and application-based intelligence check out potential threats, while we all get on with our work. Integration combined with intelligence reduces thousands of alerts to a handful of incidents correlating those alerts. Information Protection (DLP) and Compliance helps us make sure we meet industry regulations and customer requirements while also helping protect, govern, and recover data.<\/p>\n Our security journey has changed how we manage identity and network access, and our ability to secure a remote workforce has improved. As I\u2019ve outlined, at the core of zero trust is user identity and endpoint management. This makes it easy for our employees to securely access their work, no matter where they are.<\/p>\n The same foundation effectively supports any Bring Your Own Device scenario. This can reduce costs and make life easier, as your employees seamlessly use their own devices while staying secure.<\/p>\n What do I believe is the most important part of our security strategy? Our people. There\u2019s nothing like creating a culture of security to keep organisations safe. That\u2019s why it\u2019s important to\u00a0<\/span><\/span>ensure everyone \u2013 from the top down \u2013 has good cybersecurity awareness and knowledge.\u00a0<\/span><\/span>It\u2019s important to ensure everyone is comfortable to speak up if they\u2019ve done something wrong, without fear of re<\/span><\/span><\/span>tribution.\u00a0<\/span><\/span><\/span>We incorporate<\/span><\/span>\u00a0fun<\/span><\/span><\/span>\u00a0web training that makes employees feel empowered to stay secure.<\/span><\/span><\/p>\n That said, we\u2019re aware that there\u2019s a looming security skills shortage, with 3.5 million unfilled positions predicted by 2021<\/a>. At Microsoft, we\u2019ve widened our search for talent, broadened our inclusion and diversity efforts, and are aiming to re- and up-skill current employees. Our security skills training is accessible to all and can be applied beyond typical office scenarios.<\/p>\n Meanwhile<\/span><\/span>, automation takes on\u00a0<\/span><\/span>our\u00a0<\/span><\/span>more repetitive\u00a0<\/span><\/span>security\u00a0<\/span><\/span>tasks, such as<\/span><\/span>\u00a0<\/span><\/span><\/span>low-level event handling. Azure Sentinel, for example, cuts alert noise by 90 percent, with just the most critical, thorny issues\u2014the top 10 percent\u2014escalated to professionals\u00a0<\/span><\/span>for them to<\/span><\/span>\u00a0address.<\/span><\/span>\u00a0<\/span><\/span><\/span>Security Graph<\/span><\/span><\/span><\/span><\/a>\u00a0<\/span><\/span><\/span>uses the cloud<\/span><\/span><\/span>\u00a0to\u00a0<\/span><\/span><\/span>connect<\/span><\/span><\/span>\u00a0all\u00a0<\/span><\/span><\/span>of<\/span><\/span><\/span>\u00a0Microsoft security products,\u00a0<\/span><\/span><\/span>services, and partners,\u00a0<\/span><\/span><\/span>collecting trillions of data points daily<\/span><\/span><\/span>. This<\/span><\/span><\/span>\u00a0feeds threat intelligence\u00a0<\/span><\/span><\/span>across customers and partners.\u00a0<\/span><\/span><\/span>Ultimately,\u00a0<\/span><\/span><\/span>speed<\/span><\/span><\/span>ing<\/span><\/span><\/span>\u00a0up<\/span><\/span><\/span>\u00a0threat detection and incident response.<\/span><\/span><\/span>\u00a0<\/span><\/p>\n I believe security, when it is built-in and treated like an<\/span><\/span>\u00a0<\/span><\/span><\/span>enabler\u00a0<\/span><\/span><\/span>rather than a pain point, frees up employees to be able to do their best work. Supported by AI and machine learning to help take over the low-level monitoring, your cybersecurity team can focus on higher<\/span><\/span>–<\/span><\/span>level tasks.\u00a0<\/span><\/span>This\u00a0<\/span><\/span>translates to better customer experiences and protection over your whole digital estate<\/span><\/span>,\u00a0<\/span><\/span>including data.<\/span><\/span>\u00a0<\/span><\/p>\n 10 tips for enabling zero trust security<\/a><\/p>\n How we enabled zero trust<\/a><\/p>\n Our remote working best practices<\/a><\/p>\n Optimise recruitment in cybersecurity<\/a><\/p>\n Security and risk management<\/a><\/p>\n How modern cybersecurity helps you stay productive and resilient<\/a><\/p>\nSimplify security to improve customer and employee experiences<\/h2>\n
Data security in the cloud<\/h2>\n
Enable remote work security<\/h2>\n
Staying cyberstrong<\/h2>\n
Building customer trust with security<\/h2>\n
Find out more<\/h2>\n
Resources for your development team<\/h2>\n