Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
Menu
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
  1. Home
  2. News
  3. Microsoft advises organizations to take holistic approach to fighting cybercrime – onmsft.com

Microsoft advises organizations to take holistic approach to fighting cybercrime – onmsft.com

Fahad Al-Riyami Fahad Al-Riyami
November 20, 2014
1 min read

Microsoft advises organizations to take a more holistic approach to fighting cybercrime

\

In a mobile-first, cloud-first world, cyber crime is rampant and malicious attackers have taken the opportunity to steal high-value data from a large number of digital resource pools. Unfortunately, it can be so easy for cyber criminals to get their hands on sensitive information, that the methods they use to obtain it doesn’t involve any form of hacking at all.

\

\

\

\

\

Microsoft insists that a good first step to combating cyber crime is to understand its current landscape before formulating strategies to fight it. The motivation behind such attacks, particularly the ones that target large organizations, is not usually just for the fun of it; perpetrators are usually seeking high-value company assets such as credit card numbers and identification information that can then be sold to other criminals for rather large sums of money.

\

Microsoft advises organizations to take a more holistic approach to fighting cybercrime

\

The first set of precautions Microsoft advises organizations (government or private) take is to be on the lookout for phishing scams, and poor system hygiene. Phishing is one of those scams that doesn’t involve hacking, and instead relies on tricking users to provide information such as network credentials and passwords. An attacker would then use that information to gain unauthorized access to a computer or the network that computer is connected to. Other ways attackers may gain access to that information is by utilizing a system vulnerability, be it a vulnerability in the operating system or one of the applications that it is running. Microsoft’s advice is to ensure that all system updates are installed, and in a timely fashion, to ensure attackers do not take advantage of outdated systems and software.

\

\

\

\

\

\

The software giant also emphasizes the need to have least privilege principles enabled in a network, as it can thwart attackers from swiftly moving across a network in their attempts to steal information and compromise systems. Organizations should also identify their “crown jewels”, or high-value assets, isolate, and add additional security measures to protect them from cyber criminals. Additionally, organizations that hold information including card swipe data, pin input data, data in flight and data in storage, should not only be isolated, but encrypted too. It’s rather worrying that this even needs to be said.

\

Protecting administrator credentials is another important step that organizations should take, particularly to fight off an attack called “pass-the-hash”, which attackers have used successfully on numerous documented occasions. The attack is designed to harvest as many stolen credentials as possible and remain undetected for as long as possible. It’s a horrible one, and Microsoft has released a number of papers that detail how the attack works against Windows operating systems, and what security measures can be taken to fight it.

\

Microsoft advises organizations to take a more holistic approach to fighting cybercrime

\

Microsoft also advises that organizations take a more holistic approach to protecting data, rather than just focusing on the protection and recovery stages. Companies need to be prepared to take the appropriate measures of fighting cyber crimes when an attack occurs to swiftly lock them out, rather than relying on third-parties such as law enforcement and application providers to sort the issue out. Organizations should instead establish an effective, ongoing and continuous strategy to monitor for imminent attacks, detect when an attack has occurred, manage it, and restore operational control. 

\

\

\

\

\

Share This Post:

Share this article:
Tags:
Cybersecurity Security
Previous Article Microsoft introduces OneDrive for Business Information Rights Management – onmsft.com Next Article Windows 10 Consumer Preview: Here’s what Windows Insiders can expect in 2015 – onmsft.com

Related Articles

Nvidia CEO Jensen Huang says demand for Blackwell and Rubin AI chips could reach $1 trillion as AI infrastructure spending grows rapidly.

Nvidia CEO Jensen Huang sees $1 trillion demand for Blackwell and Rubin AI chips

March 16, 2026
Nvidia introduces DLSS 5 to improve game realism with generative AI

Nvidia introduces DLSS 5 to improve game realism with generative AI

March 16, 2026
Dictionary Publisher Files Copyright Lawsuit Against OpenAI

Dictionary Publisher Files Copyright Lawsuit Against OpenAI

March 16, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Nvidia CEO Jensen Huang sees $1 trillion demand for Blackwell and Rubin AI chips
  • Nvidia introduces DLSS 5 to improve game realism with generative AI
  • Dictionary Publisher Files Copyright Lawsuit Against OpenAI
  • Shopify exec says AI shopping agents are the future of e-commerce
  • WhatsApp beta introduces guest chats for messaging without an account

Recent Comments

No comments to show.
OnMSFT.com

The Tech News Site

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • Nvidia CEO Jensen Huang sees $1 trillion demand for Blackwell and Rubin AI chips
  • Nvidia introduces DLSS 5 to improve game realism with generative AI
  • Dictionary Publisher Files Copyright Lawsuit Against OpenAI
  • Shopify exec says AI shopping agents are the future of e-commerce
  • WhatsApp beta introduces guest chats for messaging without an account

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
  • Privacy Policy
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFTPrivacy Policy