Microsoft bolsters its security features through a phishing attack simulator
Phishing attacks are some of the common and popular information extortion methods used by hackers. Although some of these phishing attacks can be smartly dodged by knowing what one clicks on, simulating such threats could go a long way in understanding the precautionary measures that could potentially prevent any unforeseen damages.
As a countermeasure to such threats, Microsoft recently launched a series of security tools, one of them being a phishing attack simulator, right before the RSA conference to be held in San Francisco. Majorly reliant on the Microsoft Intelligent Security Graph, the security tools that detect these attacks encompass various platforms and services. Microsoft’s Andrew Conway describes the toolsets as “central nervous system for security solutions.”
The company leverages expertise from analyzing various sources of data such as email accounts, web pages, and malware threats occurring on their windows platform to keep users safe from existing and newer threats. Conditional access, a feature based on Intelligent Security Graph, grants access to Office 365 services only to the users that have been authenticated previously or use devices that comply with the prerequisites of the platform. This data then merges with the Windows Defender Advanced Threat Protection (ATP) scanner to grant permission to healthy devices only. According to the company that these features will be publically available with the succeeding iterations of Windows 10, allowing users to benefit from these security protocols on the go.
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...