Be careful of suspicious emails and websites: Don’t open emails from unfamiliar senders or email attachments that you don’t recognize.Watch for suspicious activity on your account: The “Recent Activity” page on your Microsoft Account shows recent sign-ins and changes to your account, and allows you to let Microsoft know if you were not the person making these changes.Use a strong password and change it often: Make sure your password contains a mix of letters, numbers and symbols, isn’t a complete word and is different than the password you use on other sites.Turn on two-step verification: This makes it harder for hackers to access your account even if they guess your password because if they try to sign in on a device Microsoft doesn’t recognize, we’ll ask for an extra security code (which you can get from a special app on your phone, sent to a different email address or via SMS text message).Microsoft recommends the following actions to help increase the security of your accounts and computers: These notifications do not mean that Microsoft’s own systems have in any way been compromised.Īccording to Microsoft, this does not mean they will give is details on who is targeting our accounts however, by letting us know it is a more sophisticated type of attack, we can then take additional steps to protect our Microsoft Account and computer systems. We’re taking this additional step of specifically letting you know if we have evidence that the attacker may be “state-sponsored” because it is likely that the attack could be more sophisticated or more sustained than attacks from cybercriminals and others. In the past we never knew if these were sophisticated attacks or just random but Microsoft has now decided to let us know if they determine these attacks are coming from hackers who are working for a nation state. Microsoft already monitors those accounts, which provide the core connectivity to everything we do and access with Microsoft, to make you aware if any attempts are made to access your account. Take our Microsoft Accounts as an example. As technologies improve to help us maintain a higher level of security new methods are being developed to take advantage of those new processes.Įxpecting our security posture to be strong as we stand still when it comes to that security is a self defeating effort.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |