Microsoft bolsters its security features through a phishing attack simulator
Phishing attacks are some of the common and popular information extortion methods used by hackers. Although some of these phishing attacks can be smartly dodged by knowing what one clicks on, simulating such threats could go a long way in understanding the precautionary measures that could potentially prevent any unforeseen damages.
As a countermeasure to such threats, Microsoft recently launched a series of security tools, one of them being a phishing attack simulator, right before the RSA conference to be held in San Francisco. Majorly reliant on the Microsoft Intelligent Security Graph, the security tools that detect these attacks encompass various platforms and services. Microsoft’s Andrew Conway describes the toolsets as “central nervous system for security solutions.”
The company leverages expertise from analyzing various sources of data such as email accounts, web pages, and malware threats occurring on their windows platform to keep users safe from existing and newer threats. Conditional access, a feature based on Intelligent Security Graph, grants access to Office 365 services only to the users that have been authenticated previously or use devices that comply with the prerequisites of the platform. This data then merges with the Windows Defender Advanced Threat Protection (ATP) scanner to grant permission to healthy devices only. According to the company that these features will be publically available with the succeeding iterations of Windows 10, allowing users to benefit from these security protocols on the go.
Check This Out:
By Linda H. Butler, VP of Medical Affairs/CMO/CMIO, Rex...
By Laura Cruz, Global CIO, MDC Partners
By Greg Morrison, SVP & CIO, Cox Enterprises
By Lowell Gilvin, Chief Process Officer, Jabil
By Joe LaFeir, SVP, IS&S (Information Systems & Solutions),...
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Aaron Weis, VP & CIO, Axalta Coating Systems
By Levon Hooks, CIO-Global Corporate Solutions, JLL
By Steve Bein, VP-GIS, Michael Baker International
By Sam Schoelen, Chief Information Technology Officer,...
By Georgios Kyriakopoulos, VP of Equity Research, SunTrust...
By David Sliter, VP & GM of Communications, Media &...
By Julie Stafford, SVP Strategic Consulting, Tangoe
By Dan Adam, CIO, Extreme Networks
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Aaron Gette, CIO, The Bay Club Company
By Dr. Volker G. Hildebrand, Global VP, SAP Hybris
By Meerah Rajavel, CIO, Forcepoint
By Philip Loftus, SVP IT & CIO, SSM Health
By Christy Hartner, SVP, Commerce Bank