Microsoft bolsters its security features through a phishing attack simulator
Phishing attacks are some of the common and popular information extortion methods used by hackers. Although some of these phishing attacks can be smartly dodged by knowing what one clicks on, simulating such threats could go a long way in understanding the precautionary measures that could potentially prevent any unforeseen damages.
As a countermeasure to such threats, Microsoft recently launched a series of security tools, one of them being a phishing attack simulator, right before the RSA conference to be held in San Francisco. Majorly reliant on the Microsoft Intelligent Security Graph, the security tools that detect these attacks encompass various platforms and services. Microsoft’s Andrew Conway describes the toolsets as “central nervous system for security solutions.”
The company leverages expertise from analyzing various sources of data such as email accounts, web pages, and malware threats occurring on their windows platform to keep users safe from existing and newer threats. Conditional access, a feature based on Intelligent Security Graph, grants access to Office 365 services only to the users that have been authenticated previously or use devices that comply with the prerequisites of the platform. This data then merges with the Windows Defender Advanced Threat Protection (ATP) scanner to grant permission to healthy devices only. According to the company that these features will be publically available with the succeeding iterations of Windows 10, allowing users to benefit from these security protocols on the go.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure