Posted by: Brendon Lynch, Chief Privacy Officer
As we increasingly rely on technology for many aspects of our lives, the amount of data created continues to grow at an exponential rate. An important challenge for organizations is to provide privacy statements describing the collection, use and protection of data that are straightforward, yet comprehensive. Clarity and simplicity are key for time-pressed consumers, but large enterprises, governments, and other high-tech savvy individuals often need highly detailed information to use online services with confidence.
With each of these audiences in mind, we are unveiling initial improvements to the look and feel of many of our online privacy statements. We believe the changes enhance the appearance and functionality of our privacy statements, and enable us to more effectively layer important information. Our hope is that the changes will make privacy information easier to locate and use for many consumers.
By Scott Charney, Corporate Vice President, Trustworthy ComputingIn the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy. Most recently, I visited both the University of Washington and Stanford University, the former to teach a course on cybersecurity and cybercrime; the latter to connect with students and faculty on security, privacy, and big data. See more >>
By Adrienne Hall, General Manager, Trustworthy Computing
In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet their business needs.
The aggregate data from the survey have also provided some interesting insights, and we’ll be sharing some of those findings in a four-part blog series beginning today. We’ll take a closer look at four specific industries – financial services, healthcare, retail and public sector (government), and examine how cloud adoption could reduce security risks in those industries. See more >>
Our customers do business in almost every industry and country around the world. Many of them need to meet regulatory compliance and certification requirements. When they trust a cloud service provider to manage infrastructure, applications, or data for them, that service provider becomes a partner that they trust to help meet and maintain their compliance and certification requirements. Read more>>
By David Bills, Chief Reliability Strategist
Reliability continues to be top of mind for everyone involved with online services. Today we are publishing an updated version of our whitepaper “Introduction to Designing Reliable Cloud Services”.
The paper describes fundamental reliability concepts and a reliability design-time process for organizations that create, deploy, and/or consume cloud services. It is designed to help decision makers understand the factors and processes that make cloud services more reliable. Read more >>
By Brendon Lynch, Chief Privacy Officer, MicrosoftFor organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with customer expectations. Read more >>
By David Bills, Chief Reliability Strategist, Trustworthy ComputingWhenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer, you want to be able to do things online, at a time convenient to you. As an organization – or a provider of a service – you want your customers to carry out the tasks they want to, whenever they want to do so.This article is the first in a four-part series on building a resilient service. In my first two posts, I will discuss the topic as it relates to business strategy, and then we'll dive deeper into the technical details. See more >>
In Part 1 of this series, we looked at survey data from financial services organizations and discussed some potential benefits for those that adopt cloud computing. The data are derived from the Cloud Security Readiness Tool (CSRT), which helps organizations evaluate whether cloud adoption will meet their business needs. In today’s post, I want to focus on cloud security trends in the healthcare industry. See more>>
In the first three posts in this series, we examined data from the financial services, healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series with a look at cloud security trends in the public sector. Read more >>
By Tim Rains, Director, Trustworthy Computing
I want to draw your attention to a type of malicious software that has been emerging in increasing numbers in several parts of the world. “Ransomware” is a type of malware that is designed to render a computer or its files unusable until a ransom is paid to the attackers. Ransomware often masquerades as an official-looking warning from a well-known law enforcement agency, such as the U.S. Federal Bureau of Investigation (FBI) or the Metropolitan Police Service of London.
It’s important for small and medium sized businesses to be aware of this type of threat and take precautions to defend themselves from it, because if attackers successfully lock the business out of their systems or encrypt their files, it could have a devastating impact on their business. The good news is that it is fairly easy to help protect yourself from this type of threat. See more >>