{"id":8451,"date":"2023-11-13T09:08:55","date_gmt":"2023-11-13T17:08:55","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=8451"},"modified":"2023-11-13T09:39:45","modified_gmt":"2023-11-13T17:39:45","slug":"sharing-how-microsoft-protects-against-ransomware","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/sharing-how-microsoft-protects-against-ransomware\/","title":{"rendered":"Sharing how Microsoft protects against ransomware"},"content":{"rendered":"
Anyone can fall victim to ransomware.<\/p>\n
As cybercriminals shift from wide-net approaches to focus on precision attacks against high-dollar targets, there is extra pressure for companies and governments to evaluate and defend themselves against ransomware attacks.<\/p>\n
This is why Microsoft is driving new priorities to protect our company, our people, and our customers.\u00a0We launched our Ransomware Elimination Program (REP)\u2014a multi-stakeholder effort built upon Zero Trust<\/a>\u2014to better understand our risk profile and deploy additional controls, processes, and practices to improve resiliency against intrusion.<\/p>\n This allowed us to weave our many different ransomware systems and processes into a single agile framework that we use to holistically guard against attacks.<\/p>\n It\u2019s made a big difference for us\u2014we\u2019re now better able to analyze our systems, understand capabilities, and innovate on some of the solutions we rely on to stay safe.<\/p>\n [Read blog two in our ransomware series: Why Microsoft uses a playbook to guard against ransomware.<\/a> | Read blog three in our ransomware series: Building an anti-ransomware program at Microsoft focused on an Optimal Ransomware Resiliency State.<\/a> | Learn more about human-operated ransomware.<\/a> |\u00a0Discover how Microsoft\u2019s Zero Trust effort keeps the company secure.<\/a>]<\/em><\/p>\n Ransomware today is a large and profitable business where technically skilled human operators work in unison to exploit high-value targets. Healthcare, government, utilities, businesses, and universities have all been victimized by gangs of hackers. It wasn\u2019t always this way, though.<\/p>\n Historically, ransomware was a commodity effort, meaning attacks were automated and spread like a virus. Phishers spammed as many accounts as possible with the hopes of infecting a device with malware. Once inside the device, the ransomware encrypts files and folders, holding it hostage. Cybercriminals then extort the victim, selling restored access to the device.<\/p>\nA new threat emerges<\/h2>\n