{"id":977,"date":"2015-04-24T18:52:56","date_gmt":"2015-04-24T18:52:56","guid":{"rendered":"https:\/\/www.microsoft.com\/industry\/blog\/uncategorized\/laying-a-sound-foundation-for-cybersecurity\/"},"modified":"2023-05-31T16:34:05","modified_gmt":"2023-05-31T23:34:05","slug":"laying-a-sound-foundation-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/government\/2015\/04\/24\/laying-a-sound-foundation-for-cybersecurity\/","title":{"rendered":"Laying a sound foundation for cybersecurity"},"content":{"rendered":"
Much cybersecurity news today focuses on the emergence of new and complex threats and the widespread damage they can inflict on our society. Yet despite the rise in dynamic and sophisticated cyber attacks \u2013 and therefore an increase in developing complex defense mechanisms to combat them \u2013 the basic elements of cybersecurity remain fundamentally important to a secure enterprise.<\/p>\n
Cybersecurity has always been the highest priority at Microsoft; we\u2019ve invested millions over the past four decades to develop the most robust and secure platforms for our customers. But we also understand that an effective cybersecurity program must be built on a solid foundation of basic practices, including things like identity management and patch management. When agencies neglect basic cybersecurity responsibilities, it leaves the door open for attackers to inflict serious harm on their organization through intellectual property and business information theft, service disruptions, reputational damage, and more \u2013 losses that cost the global economy billions of dollars annually<\/a><\/p>\n At its most basic, the fundamental elements of a secure enterprise must:<\/p>\n Key to platform security is keeping software up to date. Software patches leverage the intelligence and research of the cybersecurity community to fix known vulnerabilities and prevent their exploit by attackers. Applying patches \u2013 such as those offered weekly by Microsoft<\/a> \u2013 is a routine procedure that often gets too little attention; but it remains vital to enterprise security. If the patches are not installed throughout the enterprise on a timely basis, vulnerabilities exist that could easily be blocked.<\/p>\n Identity management is another security fundamental. This means knowing all system users, verifying their identity when they connect, and using that identity to determine what resources they will have access to. If you are not managing identity through Active Directory or an equivalent technology, a malicious actor assuming another identity can access an otherwise secure system and effectively become an insider threat.<\/p>\n Our worldwide team of Chief Security Advisors regularly briefs governments, law enforcement, and intelligence agencies on current threats and their potential social and economic impact to their organizations. Our Digital Crimes Unit<\/a> is also a vigilant security force, often working directly with law enforcement to take down botnets that attacks systems and users.<\/p>\n Understanding and executing on the fundamentals, combined with the range of advanced cybersecurity services, can help global agencies Protect, Detect, Respond and Recover in today\u2019s cyber environment and ensure their cybersecurity program is built on a solid foundation.<\/p>\n Sergio Ortega Cruz Much cybersecurity news today focuses on the emergence of new and complex threats and the widespread damage they can inflict on our society.<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[1608],"class_list":["post-977","post","type-post","status-publish","format-standard","hentry","category-government","content-type-thought-leadership"],"yoast_head":"\n\n
\n Worldwide Industry Solution Manager, Public Safety and National Security<\/p>\n","protected":false},"excerpt":{"rendered":"