By Peter Cullen, General Manager, Trustworthy ComputingMore and more, we are becoming a data-driven society, in which governments and industry have access to increasing volumes of information through consumer interactions online. A recent White House report on “Big Data” demonstrates the broad recognition of related privacy concerns which, if not managed correctly, may outweigh the benefits we can derive from this wealth of information. Read more >>
By Adrienne Hall, General Manager, Trustworthy Computing
Cloud security is often better than customers expect it to be. I’ve blogged about that trend before, including the Cloud Trust Study (commissioned by Microsoft and conducted by comScore) showing high percentages of small to mid-sized businesses (SMBs) seeing improved security after moving to the cloud.
Two recent studies add further evidence that security apprehensions persist -- but prove unwarranted for many cloud customers after rolling out the cloud service. See more >>
By Steve Lipner, Partner Director of Software Security, Microsoft Corporation
For more than a decade, we’ve made significant investments in securing our devices and services. What people may not know is that we’ve also been involved in cross-platform activities for some time. See more >>
By Tim Rains, Director, Trustworthy Computing
I want to draw your attention to a type of malicious software that has been emerging in increasing numbers in several parts of the world. “Ransomware” is a type of malware that is designed to render a computer or its files unusable until a ransom is paid to the attackers. Ransomware often masquerades as an official-looking warning from a well-known law enforcement agency, such as the U.S. Federal Bureau of Investigation (FBI) or the Metropolitan Police Service of London.
It’s important for small and medium sized businesses to be aware of this type of threat and take precautions to defend themselves from it, because if attackers successfully lock the business out of their systems or encrypt their files, it could have a devastating impact on their business. The good news is that it is fairly easy to help protect yourself from this type of threat. See more >>
Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud providers for an article in Security Week and I thought I’d expand a bit more on those and share them with you.
Let’s start with Suggested Resolution #1: Reinforce that security is a shared responsibility.
See more >>
By David Bills, Chief Reliability Strategist, Trustworthy ComputingOnline services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping to improve the reliability of our services is by investing in resilience modeling and analysis (RMA) as a way for online service engineering teams to incorporate robust resilience design into the development lifecycle. See more>>
Those of you that are still running Windows XP are likely aware that support from Microsoft will end on April 8, 2014. Many of the enterprise customers I have talked with have been planning for the transition and are already completed or are in process of completing their migrations to a modern operating system. However, there are some small to mid sized businesses that don’t plan to replace their Windows XP systems even after support for these systems ends in April. For those in that situation, you may find this information to be of value. See more >>
By Brendon Lynch, Chief Privacy Officer, MicrosoftMicrosoft understands that a customer’s willingness to use a particular cloud computing service depends on their ability to trust that the privacy of their information will be protected, and that their data will only be used in a manner consistent with customer expectations. But even the best designed and implemented services can only protect customer data if they are deployed in a secured environment. See more >>
Data classification is one of the most basic ways for organizations to determine and assign relative values to the data they possess. By separating data into categories based on sensitivity (high, medium or low, for example), an organization can set protections and procedures for managing that data accordingly. This process can yield significant benefits, such as compliance efficiencies, improved resource management, and facilitation of migration to the cloud. Read more >>
By Brendon Lynch, Chief Privacy Officer
For more than a decade, Microsoft has invested in a comprehensive privacy program that sets the foundation for our efforts to responsibly manage our customers’ data. An important part of our privacy commitment is that we evolve our policies and practices to address the changes in technology and customer expectations. Earlier today, Microsoft General Counsel Brad Smith announced a change to Microsoft’s privacy practices to further enhance our privacy commitments. Read more >>