{"id":870,"date":"2015-02-01T19:40:20","date_gmt":"2015-02-02T03:40:20","guid":{"rendered":"https:\/\/www.microsoft.com\/industry\/blog\/uncategorized\/achieving-resilience-against-modern-cyberthreats\/"},"modified":"2023-07-11T10:13:38","modified_gmt":"2023-07-11T17:13:38","slug":"achieving-resilience-against-modern-cyberthreats","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2015\/02\/01\/achieving-resilience-against-modern-cyberthreats\/","title":{"rendered":"Achieving resilience against modern cyberthreats"},"content":{"rendered":"
Our whitepaper explores how you can protect, detect, and defend against modern cyberthreats in your enterprise.<\/p>\n
As our use of mobile computing and social media grows, so does our exposure to risk. As any member of the modern workforce knows, the widespread adoption of cloud services and big data technologies has created unprecedented opportunities for mobile and social productivity. Yet without the right defenses in place, they can also open us to new kinds of vulnerabilities, as attacks that target devices operating outside the enterprise perimeter are quickly growing in volume and sophistication.<\/p>\n
Passive protection is no longer sufficient for ensuring the security of information and IT infrastructures. Our recent Microsoft whitepaper, Achieving Resilience Against Modern CyberThreats<\/a>, explores the ways that governments and enterprises can protect their valuable information by creating a holistic, risk-aware security strategy to achieve resilience against in an era of constant targeted attacks and determined adversaries.<\/p>\n The paper explores Microsoft\u2019s holistic Protect<\/strong>, Detect<\/strong> and Respond<\/strong> approach to security strategy, including key principles for organizations, the importance of trustworthy cloud services, and the steps to take for securing an IT infrastructure in today\u2019s threat landscape. This proactive strategy requires that an organization understand its assets and its exposure, and apply appropriate protection throughout the entire IT ecosystem in a continuous process. It also recognizes that enterprises must manage their inevitable risk \u2013 absolute security is not possible, so organizations must go beyond just protecting resources and also establish processes for detecting, responding and recovering from incidents when they occur.<\/p>\n In order increase an enterprise\u2019s resilience against threats and \u201cboost the IT immune system,\u201d organizations need a security strategy that includes a resilient infrastructure based in trustworthy cloud services\u2014as well as good IT hygiene and policy-based access to information. This includes taking steps such as:<\/p>\n No one understands the complexity of this challenge better than Microsoft. Our world-class Trustworthy Computing<\/a> (TwC) Initiative has been developing secure and reliable computing solutions for more than a decade, laying the foundation for advanced solutions and services to help customers protect themselves against the attacks of determined adversaries and quickly recover key IT systems in the aftermath of a breach.<\/p>\n\n