{"id":68734,"date":"2017-06-21T09:00:45","date_gmt":"2017-06-21T16:00:45","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=68734"},"modified":"2023-05-15T23:11:16","modified_gmt":"2023-05-16T06:11:16","slug":"tips-for-securing-your-identity-against-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/21\/tips-for-securing-your-identity-against-cybersecurity-threats\/","title":{"rendered":"Tips for securing your identity against cybersecurity threats"},"content":{"rendered":"
This post is authored by\u00a0Simon Pope, Principal Security Group Manager, Microsoft Security Response Center.<\/em><\/p>\n <\/a>Ask any CISO or cybersecurity professional about their greatest security challenge, and it\u2019s a good chance the answer will be \u201cthe actions of our people.\u201d<\/p>\n While virtually all employees, contractors, and partners have the best of intentions, the fact is that protecting their online credentials, identifying and avoiding phishing scams, and evading cybercriminals is getting more difficult each day. More of our time each day is spent online, and as more financial transactions and social activities are conducted online, adversaries are becoming ever-more sophisticated in their cyberattacks.<\/p>\n Microsoft faces these same threats, and we have made deep investments in training our people to be more aware and diligent in the face of such dangers. Our cybersecurity success depends on our customers\u2019 trust in our products and services, and their confidence that they can be safe on the internet. To help keep our customers and the global online community safe, we want to share some of our Cyber Defense Operations Center\u2019s best practices for Securing your identity against cybersecurity threats<\/em><\/a> in this video.<\/p>\n <\/a>In this video, we discuss some best practices around securing your identity, such as avoiding social engineering scams that trick people into giving up their most sensitive secrets, recognizing phishing emails that falsely represent legitimate communications, and how to spot false impersonations of your trusted colleagues or friends. We also discuss some of the types of information you don\u2019t want to share broadly (i.e. credentials, financial information and passwords), and tips for protecting your sensitive data.<\/p>\n Some cybersecurity tips that we discuss include:<\/p>\n Please take a few minutes to watch the video<\/a> and share it with your colleagues, friends and family. We all need to be diligent in the face of this growing and ever-more sophisticated threat. And check back next week for our second video on\u00a0Protecting your devices from cybersecurity threats<\/em>, and in two weeks, we will share more on Protecting your information and data from cybersecurity threats<\/em> on the\u00a0Microsoft Secure blog.<\/a><\/p>\n This post is authored by\u00a0Simon Pope, Principal Security Group Manager, Microsoft Security Response Center. Introducing new video on best practices from the Microsoft Cyber Defense Operations Center Ask any CISO or cybersecurity professional about their greatest security challenge, and it\u2019s a good chance the answer will be \u201cthe actions of our people.\u201d While virtually all […]<\/p>\n","protected":false},"author":61,"featured_media":70244,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3671,3673,3688],"products":[],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[1957],"class_list":["post-68734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-email-security","topic-identity-and-access-management","topic-threat-trends","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\nIntroducing new video on best practices from the Microsoft Cyber Defense Operations Center<\/h2>\n
\n
Additional resources:<\/h3>\n
\n