{"id":204557,"date":"2019-03-22T10:00:48","date_gmt":"2019-03-22T09:00:48","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=204557"},"modified":"2019-03-22T10:01:09","modified_gmt":"2019-03-22T09:01:09","slug":"fa1-200-billion-reasons-why-companies-must-face-up-to-the-challenge-of-cyber-security","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en-ie\/work-productivity-en-ie\/na\/fa1-200-billion-reasons-why-companies-must-face-up-to-the-challenge-of-cyber-security\/","title":{"rendered":"200 billion reasons why companies must face up to the challenge of cyber security"},"content":{"rendered":"<p class=\"intro\">200 billion.\u00a0That\u2019s\u00a0how many\u00a0connected devices there will be worldwide by 2021. It\u2019s\u00a0an incredible\u00a0number\u00a0\u2013\u00a0and one that\u2019s\u00a0going\u00a0to have massive\u00a0implications for\u00a0the way we live\u00a0and work.<\/p>\n<p>Today, everyone is mobile. We can work from anywhere\u00a0and\u00a0share\u00a0our work and our passions\u00a0seamlessly from device to device.\u00a0The office\u00a0cubicle\u00a0is a relic;\u00a0work has never been so fluid. It\u2019s a wonderful thing \u2013 but it\u00a0creates\u00a0a big\u00a0challenge.<\/p>\n<p>Security.<\/p>\n<h2>Every\u00a039 seconds<\/h2>\n<p>That\u2019s how frequently hackers launch a new\u00a0attack.<\/p>\n<p>By\u00a0the time you\u2019ve\u00a0read this article,\u00a0hackers will have launched five attacks globally\u00a0\u2013 some\u00a0aimed at\u00a0enterprises, some at\u00a0small and medium-sized businesses.<\/p>\n<p>Big or small,\u00a0hackers\u00a0know the pay-offs\u00a0can be\u00a0enormous\u00a0if the organisation isn\u2019t\u00a0secure.<\/p>\n<p>And the damage to the bottom line can be dramatic. The average cost of a data breach <a href=\"http:\/\/cloud-platform-assets.azurewebsites.net\/intelligent-security-graph\/\" target=\"_blank\" rel=\"noopener\">is\u00a0as high as\u00a0$3.62m<\/a>\u00a0\u2013 not to mention the reputational damage that can follow a major\u00a0attack.<\/p>\n<p>The solution? Be prepared.\u00a0The increasing complexity of attacks means now is the time for a re-think on cyber-security.<\/p>\n<h2>50 percent<\/h2>\n<p>By the end of next year\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/samantharadocchia\/2018\/07\/31\/50-of-the-us-workforce-will-soon-be-remote-heres-how-founders-can-manage-flexible-working-styles\/#56a1ac405767\" target=\"_blank\" rel=\"noopener\">50% of\u00a0us\u00a0will be\u00a0mobile or working remotely<\/a>.\u00a0This\u00a0has serious implications\u00a0for cybersecurity, because the more mobile devices\u00a0used\u00a0by employees, the\u00a0more\u00a0blind spots\u00a0there are.<\/p>\n<p>It\u2019s now considered the norm\u00a0for huge amounts of company information to\u00a0live outside of onsite security perimeters \u2013 with much of it\u00a0kept on mobile devices\u00a0\u2013\u00a0and hackers are poised to exploit any weak link with increasingly sophisticated cyber-attacks.<\/p>\n<h2>3 pain points<\/h2>\n<p>Malware and phishing attacks spread by email are\u00a0increasingly\u00a0common,\u00a0with\u00a0IT companies\u00a0wasting an\u00a0average of $1.37m a year responding to malware alerts.<\/p>\n<p>Password and account security is incredibly important.\u00a0Identity\u00a0has become\u00a0the new perimeter,\u00a0and\u00a0the vast majority of successful attacks start here.<\/p>\n<p>End point attacks\u00a0can\u00a0cause\u00a0massive\u00a0damage to an organisation because of the access they give hackers,\u00a0so\u00a0companies need to be\u00a0ready\u00a0to react quickly and decisively to\u00a0this\u00a0type of breach.<\/p>\n<h2>Microsoft\u00a0365: the\u00a0solution<\/h2>\n<p>We need to rethink cybersecurity for the new world of mobile working. Microsoft\u2019s built-in security solutions take the stress out of staying secure and make it easier for\u00a0businesses to react quickly\u00a0when needed.<\/p>\n<p>Microsoft 365\u00a0uses advanced analytics to link\u00a0huge\u00a0amounts of threat intelligence and security data from Microsoft and partners to combat\u00a0cyberthreats.\u00a0You can see the full\u00a0range\u00a0and power\u00a0of insights\u00a0harnessed\u00a0with the\u00a0Intelligent Security Graph,\u00a0a connected system of continual learning\u00a0that only\u00a0Microsoft can provide.<\/p>\n<p>Advanced security features include:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RWt7MJ\">Identity and access management<\/a>\u00a0that protects users\u2019 identities\u00a0and controls access to valuable resources based on user risk level.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RWtah5\">Information protection<\/a>\u00a0allows you to protect documents and emails with encryption that travels with users as they move inside and outside of your organisation.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RWsUGi\">Threat protection<\/a>\u00a0helps you strengthen your pre-breach posture and allows you to recover quickly with automated remediation when attacked.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/videoplayer\/embed\/RWsXjI\">Security management<\/a>\u00a0provides end-to-end visibility and centralised management capabilities.<\/li>\n<li>Business-specific security features\u00a0designed for companies of\u00a0all\u00a0sizes\u00a0\u2013\u00a0with\u00a0enterprise-ready\u00a0products\u00a0like\u00a0Microsoft 365 E5, as well as\u00a0Microsoft 365 Business,\u00a0specifically designed for SMBs.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>200 billion.\u00a0That\u2019s\u00a0how many\u00a0connected devices there will be worldwide by 2021. It\u2019s\u00a0an incredible\u00a0number\u00a0\u2013\u00a0and one that\u2019s\u00a0going\u00a0to have massive\u00a0implications for\u00a0the way we live\u00a0and work. Today, everyone is mobile. We can work from anywhere\u00a0and\u00a0share\u00a0our work and our passions\u00a0seamlessly from device to device.\u00a0The office\u00a0cubicle\u00a0is a relic;\u00a0work has never been so fluid. It\u2019s a wonderful thing \u2013 but it\u00a0creates\u00a0a big\u00a0challenge. Security. [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":203612,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1830],"class_list":["post-204557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en-ie","specials-work-productivity-en-ie","stories-how-can-i-work-secure-en-ie","stories-working-secure-en-ie","businessPriorities-modern-workplace-en-ie"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/204557"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/comments?post=204557"}],"version-history":[{"count":2,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/204557\/revisions"}],"predecessor-version":[{"id":223274,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/204557\/revisions\/223274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media\/203612"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media?parent=204557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/categories?post=204557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}