Microsoft bolsters its security features through a phishing attack simulator
Phishing attacks are some of the common and popular information extortion methods used by hackers. Although some of these phishing attacks can be smartly dodged by knowing what one clicks on, simulating such threats could go a long way in understanding the precautionary measures that could potentially prevent any unforeseen damages.
As a countermeasure to such threats, Microsoft recently launched a series of security tools, one of them being a phishing attack simulator, right before the RSA conference to be held in San Francisco. Majorly reliant on the Microsoft Intelligent Security Graph, the security tools that detect these attacks encompass various platforms and services. Microsoft’s Andrew Conway describes the toolsets as “central nervous system for security solutions.”
The company leverages expertise from analyzing various sources of data such as email accounts, web pages, and malware threats occurring on their windows platform to keep users safe from existing and newer threats. Conditional access, a feature based on Intelligent Security Graph, grants access to Office 365 services only to the users that have been authenticated previously or use devices that comply with the prerequisites of the platform. This data then merges with the Windows Defender Advanced Threat Protection (ATP) scanner to grant permission to healthy devices only. According to the company that these features will be publically available with the succeeding iterations of Windows 10, allowing users to benefit from these security protocols on the go.
Check This Out:
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sergey Cherkasov, CIO, PhosAgro
By Pascal Becotte, MD-Global Supply Chain Practice for the...
By Stephen Caulfield, Executive Director, Global Field...
By Shamim Mohammad, SVP & CIO, CarMax
By Ronald Seymore, Managing Director, Enterprise Performance...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
By Jim Whitehurst, CEO, Red Hat
By Clark Golestani, EVP and CIO, Merck
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
By Amit Bahree, Executive, Global Technology and Innovation,...
By Greg Tacchetti, CIO, State Auto Insurance