{"id":14794,"date":"2021-05-18T05:45:00","date_gmt":"2021-05-18T05:45:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/05\/18\/microsoft-announces-new-products-and-guidance-for-enhanced-security-in-hybrid-work-environments\/"},"modified":"2021-05-18T05:45:00","modified_gmt":"2021-05-18T05:45:00","slug":"microsoft-announces-new-products-and-guidance-for-enhanced-security-in-hybrid-work-environments","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/05\/18\/microsoft-announces-new-products-and-guidance-for-enhanced-security-in-hybrid-work-environments\/","title":{"rendered":"Microsoft announces new products and guidance for enhanced security in hybrid work environments"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<ul>\n<li><i>Microsoft telemetry shows increase in malware and ransomware&#13;<br \/>\nencounter rates in Asia Pacific since pre-COVID <\/i><\/li>\n<li><i>New products developed to secure remote working for&#13;<br \/>\ncustomers <\/i><\/li>\n<li><i>New guidance released for Microsoft&#8217;s transition of more&#13;<br \/>\nthan 160,000 employees to hybrid work <\/i><\/li>\n<li><i>Multifactor authentication, Zero Trust, cloud migration and&#13;<br \/>\nsecurity talent key pillars to the new work reality<\/i><\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">SINGAPORE<\/span><span class=\"normaltextrun\">\u00a0&#8211; <a href=\"https:\/\/www.media-outreach.com\">Media OutReach<\/a> &#8211; 18 May 2021 &#8211;<\/span><span class=\"normaltextrun\">\u00a0Microsoft Corp. has announced new products, employee plans, and guidance to&#13;<br \/>\ntackle the global fight against increasingly large-scale and complex&#13;<br \/>\ncyberattacks. These include additional support on multifactor authentication&#13;<br \/>\n(MFA) and security protection for customers, along with Microsoft&#8217;s own&#13;<br \/>\ntransition of having employees adopt a Zero Trust approach. <\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">\u00a0<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><span class=\"normaltextrun\">The cybersecurity landscape has fundamentally changed due&#13;<br \/>\nto large-scale, complex attacks in recent times. <\/span><span class=\"normaltextrun\">Hackers launch an average of 50&#13;<br \/>\nmillion password attacks every day\u2014579 per second, and phishing attacks have&#13;<br \/>\nincreased. Firmware attacks are on the rise, and ransomware has become&#13;<br \/>\nincredibly problematic. Microsoft had intercepted and thwarted a&#13;<br \/>\nrecord-breaking 30 billion email threats last year and is currently actively tracking&#13;<br \/>\n40 plus active nation-state actors and over 140 threat groups representing 20&#13;<br \/>\ncountries.<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">According to Microsoft&#13;<br \/>\nDefender Antivirus&#8217; telemetry, malware encounter rates in Asia Pacific have&#13;<br \/>\nincreased \u2013 23% in Australia; 80% in China; 15% in India; 16% in Japan; 19% in New&#13;<br \/>\nZealand; and 43% in Singapore over the past 18 months, spanning pre-pandemic to&#13;<br \/>\nnow. As a subset of malware, ransomware encounters have also increased 453% in Australia;&#13;<br \/>\n463% in China; 100% in India; 541% in Japan; 825% in New Zealand; and 296% in Singapore&#13;<br \/>\nover the same period. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">According to&#13;<br \/>\nMicrosoft&#8217;s Work Trend Index<sup>[1]<\/sup>,&#13;<br \/>\n53% of people surveyed in Asia plan to move because they can now work remotely&#13;<br \/>\n\u2013 this is slightly higher than the global figure of 46%, pointing to the&#13;<br \/>\nurgency for security to address this new way of working.\u00a0\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Mary Jo Schrade, Assistant General&#13;<br \/>\nCounsel, Regional Lead, Microsoft Digital Crimes Unit Asia<\/b>, shared, &#8220;Most of our region has transitioned to remote&#13;<br \/>\nworking over the past year. As we continue the need to work from home either&#13;<br \/>\nfull time or part time, we need to adopt more tools and build our defenses&#13;<br \/>\nagainst potential cyberattacks. In Asia, adopting multi-factor authentication&#13;<br \/>\ntogether with a Zero Trust approach are the foundations to safer work from home&#13;<br \/>\nor hybrid work scenarios.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">Small-and-medium&#13;<br \/>\nbusinesses (SMBs) are particularly vulnerable to cybersecurity threats \u2013 in&#13;<br \/>\nAsia Pacific, SMBs make up more than 98% of enterprise and employ 50% of the&#13;<br \/>\nworkforce<sup>[2]<\/sup>,&#13;<br \/>\ncomprising an integral part of the region&#8217;s social and economic well-being.&#13;<br \/>\nHowever, a large percentage of SMBs do not know how to protect their companies,&#13;<br \/>\nlack dedicated IT staff and have inadequate computer and network security.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>Joe Sweeney, Advisor, Intelligent&#13;<br \/>\nBusiness Research Services (IBRS)<\/b>, added,&#13;<br \/>\n&#8220;Highly automated social attacks (phishing) are on the rise. They are <span class=\"normaltextrun\">coming&#13;<br \/>\nthrough email, instant messaging, social media and texts. It is critical for&#13;<br \/>\norganizations to take on a Zero Trust approach to address this, by segmenting&#13;<br \/>\nall aspects of the end user environment and treat each as untrusted.\u00a0 This requires a very different thinking from&#13;<br \/>\nthe traditional &#8216;network as the border&#8217; and &#8216;protect the device&#8217; approach. It&#13;<br \/>\nrequires a data-centric and authentication-centric approach. While there are&#13;<br \/>\nother security considerations, getting identity, authentication and information&#13;<br \/>\nmanagement sorted is essential.&#8221;<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">\u00a0<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><b><u>Securing remote&#13;<br \/>\nworking with new products<span class=\"normaltextrun\"\/><\/u><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">In&#13;<br \/>\nline with individual and business security needs that come with remote working,&#13;<br \/>\nMicrosoft has launched new innovations to further protect customers. These new verification&#13;<br \/>\nfeatures include Azure AD Conditional Access to give admins more granular&#13;<br \/>\naccess controls, conditional launch settings with App Protection Policies in&#13;<br \/>\nMicrosoft Endpoint Manager, and an Azure AD shared device mode across multiple&#13;<br \/>\nusers.<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">\u00a0<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">Additional&#13;<br \/>\nfeatures and enhancements have also been launched on Microsoft 365 Defender, Azure&#13;<br \/>\nSentinel and Microsoft Cloud App Security. More on the new products launched&#13;<br \/>\nglobally can be found at <\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/12\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/\">https:\/\/www.microsoft.com\/security\/blog\/2021\/05\/12\/how-to-secure-your-hybrid-work-world-with-a-zero-trust-approach\/<\/a><span class=\"normaltextrun\">.&#13;<br \/>\n<\/span><\/p>\n<p>&#13;<br \/>\n&#13;<br \/>\n&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><b><u>Microsoft&#8217;s&#13;<br \/>\ntechnology plan for employees <\/u><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\">Microsoft and its&#13;<br \/>\n160,000 employees made the transition to hybrid work in 2020, with the&#13;<br \/>\nfollowing new guidance released organization-wide to maintain and uphold security:&#13;\n<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<ul>\n<li><b>Keeping devices healthy and managed<\/b>: All devices that&#13;<br \/>\nneed access to corporate resources must be managed to seamlessly keep the&#13;<br \/>\ndevice secure and protected from phishing and malicious websites.<\/li>\n<li><b>Making security everyone&#8217;s job<\/b>: Microsoft is offering&#13;<br \/>\nnew training, opportunities to provide feedback, and a new virtual security&#13;<br \/>\nsummit to ensure employees are empowered and equipped to be more secure.<\/li>\n<li><b>Securing home offices<\/b>: Microsoft will continue to build&#13;<br \/>\nand offer resources and guidelines for employees that will work remotely either&#13;<br \/>\npart or full time.<\/li>\n<li><b>Building for Zero Trust<\/b>: Microsoft is&#13;<br \/>\nasking developers to build with a Zero Trust mentality.<\/li>\n<\/ul>\n<p><span style=\"font-size: 1rem\">\u00a0<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><b><u>Four key pillars to&#13;<br \/>\na new work reality <span class=\"normaltextrun\"\/><\/u><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">As&#13;<br \/>\nsecurity becomes increasingly top-of-mind for individuals and businesses,&#13;<br \/>\nMicrosoft has outlined key imperatives for users to be protected against cyber&#13;<br \/>\nthreats. <\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\">\u00a0<\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\"><b>#1&#13;<br \/>\n\u2013 Using existing tools, including MFA<\/b><\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Recent&#13;<br \/>\ncyberattacks have revealed that identity will be the battleground for attacks&#13;<br \/>\nof the future. As businesses build their defenses for the new threat landscape,&#13;<br \/>\nthey should first examine the tools they already have. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>For instance, MFA&#13;<br \/>\nis a defense that organizations have available to them, and any Microsoft&#13;<br \/>\ncustomer with a commercial service subscription can turn on MFA at no&#13;<br \/>\nadditional cost. However, Microsoft&#8217;s customer data show that only 18% have it&#13;<br \/>\nturned on. Microsoft is actively working to make MFA rollout easier and more&#13;<br \/>\nseamless for its customers, ensuring that the end-user experience is as&#13;<br \/>\nfrictionless and friendly as possible.\u00a0 <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\"><b>#2&#13;<br \/>\n\u2013 Embracing a Zero Trust Mindset<\/b><\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>People and&#13;<br \/>\norganizations need to have trust in the technologies that bring them together&#13;<br \/>\nand adopting a Zero Trust strategy is no longer an option, but a new business&#13;<br \/>\nimperative. When companies assume breach and provide the least privileged&#13;<br \/>\naccess necessary, this empowers employees with the flexibility and freedom they&#13;<br \/>\nwant. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Microsoft also believes&#13;<br \/>\nthat the future is passwordless and that the industry will see the transition&#13;<br \/>\nhappening this year. It recently deployed a new Zero Trust assessment tool<sup>[3]<\/sup> that can&#13;<br \/>\nhelp companies understand where they are currently on their Zero Trust journey and&#13;<br \/>\nwhere they need to go. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\"><b>#3&#13;<br \/>\n\u2013 Taking advantage of more robust security in the cloud<\/b><\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The benefits of&#13;<br \/>\nthe cloud for a remote or hybrid workforce are plentiful, and Microsoft&#13;<br \/>\nbelieves that there will be a rapid migration to the cloud over the next six to&#13;<br \/>\n12 months as companies recover from 2020 and implement new infrastructure. Microsoft&#8217;s&#13;<br \/>\nrecent survey of its Microsoft Intelligent Security Association (MISA) partners&#13;<br \/>\nfound that 90% reported that customers have accelerated their move to the cloud&#13;<br \/>\ndue to the pandemic. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Having a strong&#13;<br \/>\ncloud posture also provides a level of security that most companies are unable&#13;<br \/>\nto achieve on their own. The recent NOBELIUM cyberattack revealed that that the&#13;<br \/>\nvast majority of attacks originated on-premises, while attacks via the cloud&#13;<br \/>\nwere largely unsuccessful.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p class=\"paragraph\"><span class=\"normaltextrun\"><b>#4&#13;<br \/>\n\u2013 Investing in people and skills, and focusing on diversity<\/b><\/span><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The shortage of&#13;<br \/>\ncybersecurity professionals and a lack of diversity within teams are two big&#13;<br \/>\nproblems that attackers will take advantage in the coming year.\u00a0 91% of Microsoft&#8217;s MISA partners reported&#13;<br \/>\nmore demand than supply for cybersecurity professionals, and there is an&#13;<br \/>\nestimated shortfall of 3.5 million security professionals this year. This&#13;<br \/>\nshortage would not only mean unfilled positions, but also too much work on&#13;<br \/>\nexisting teams. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>By teaching,&#13;<br \/>\ntraining, and arming new talent, this will solve the issue and build the&#13;<br \/>\nworkforce of the future. It is pertinent for organizations to build diverse&#13;<br \/>\nteams that reflect the many viewpoints of people globally, including the same&#13;<br \/>\ndemographics as cyber attackers, to meet today&#8217;s security and privacy&#13;<br \/>\nchallenges.<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-05-18\/78289\/microsoft-announces-new-products-and-guidance-for-enhanced-security-in-hybrid-work-environments\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft telemetry shows increase in malware and ransomware&#13; encounter rates in Asia Pacific since pre-COVID New products developed to secure remote working for&#13; customers New guidance released for Microsoft&#8217;s transition of more&#13; than 160,000 employees to hybrid work Multifactor authentication, Zero Trust, cloud migration and&#13; security talent key pillars to the new work reality &#13; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/14794"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=14794"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/14794\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=14794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=14794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=14794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}