{"id":68734,"date":"2017-06-21T09:00:45","date_gmt":"2017-06-21T16:00:45","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=68734"},"modified":"2023-05-15T23:11:16","modified_gmt":"2023-05-16T06:11:16","slug":"tips-for-securing-your-identity-against-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/21\/tips-for-securing-your-identity-against-cybersecurity-threats\/","title":{"rendered":"Tips for securing your identity against cybersecurity threats"},"content":{"rendered":"

This post is authored by\u00a0Simon Pope, Principal Security Group Manager, Microsoft Security Response Center.<\/em><\/p>\n

Introducing new video on best practices from the Microsoft Cyber Defense Operations Center<\/h2>\n

\"\"<\/a>Ask any CISO or cybersecurity professional about their greatest security challenge, and it\u2019s a good chance the answer will be \u201cthe actions of our people.\u201d<\/p>\n

While virtually all employees, contractors, and partners have the best of intentions, the fact is that protecting their online credentials, identifying and avoiding phishing scams, and evading cybercriminals is getting more difficult each day. More of our time each day is spent online, and as more financial transactions and social activities are conducted online, adversaries are becoming ever-more sophisticated in their cyberattacks.<\/p>\n

Microsoft faces these same threats, and we have made deep investments in training our people to be more aware and diligent in the face of such dangers. Our cybersecurity success depends on our customers\u2019 trust in our products and services, and their confidence that they can be safe on the internet. To help keep our customers and the global online community safe, we want to share some of our Cyber Defense Operations Center\u2019s best practices for Securing your identity against cybersecurity threats<\/em><\/a> in this video.<\/p>\n

\"\"<\/a>In this video, we discuss some best practices around securing your identity, such as avoiding social engineering scams that trick people into giving up their most sensitive secrets, recognizing phishing emails that falsely represent legitimate communications, and how to spot false impersonations of your trusted colleagues or friends. We also discuss some of the types of information you don\u2019t want to share broadly (i.e. credentials, financial information and passwords), and tips for protecting your sensitive data.<\/p>\n

Some cybersecurity tips that we discuss include:<\/p>\n