{"id":622380,"date":"2022-02-03T16:45:08","date_gmt":"2022-02-03T15:45:08","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=622380"},"modified":"2022-02-03T16:45:08","modified_gmt":"2022-02-03T15:45:08","slug":"fa1-cyber-signals-defending-against-cyberthreats-with-the-latest-research-insights-and-trends","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en-ie\/technology-lifestyle-en-ie\/na\/fa1-cyber-signals-defending-against-cyberthreats-with-the-latest-research-insights-and-trends\/","title":{"rendered":"Cyber Signals: Defending against cyberthreats with the latest research, insights, and trends"},"content":{"rendered":"<p><span data-contrast=\"none\">We\u2019re excited to<\/span><span data-contrast=\"auto\">\u202fintroduce <\/span><a href=\"https:\/\/news.microsoft.com\/wp-content\/uploads\/prod\/sites\/626\/2022\/02\/Cyber-Signals-E-1.pdf\"><i><span data-contrast=\"none\">Cyber Signals<\/span><\/i><\/a> <span data-contrast=\"auto\">a cyberthreat intelligence brief\u202f<\/span><span data-contrast=\"none\">informed by the latest\u202fMicrosoft\u202f<\/span><span data-contrast=\"auto\">threat data and\u202fresearch. This\u202fcontent, which will be released\u202fquarterly, offers\u202fan expert perspective into\u202fthe current threat landscape,\u202fdiscussing\u202ftrending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.\u202fAs such, we hope it\u2019s a valuable resource to Chief Information Security Officers, Chief Information Officers, Chief Privacy Officers, and their teams, as they continue to evolve\u202ftechnologies, policies, and processes against the constantly changing threat landscape. At Microsoft, we believe that security is a team sport and that when we share what we\u2019re learning, we can all make the world a safer place.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Cyber Signals<\/span><\/i><span data-contrast=\"auto\"> aggregates insights\u202fwe\u202fsee\u202ffrom\u202four research and\u202fsecurity teams on the frontlines, including analysis from our 24 trillion security signals combined with intelligence we track by monitoring more than 40+ nation-state groups and 140+ threat groups.\u202fIn our first\u202fedition,\u202fwe unpack\u202fthe topic of\u202fidentity.\u202f<\/span><span data-contrast=\"none\">Our identities are made up of everything we say and do in our lives, recorded as data that spans across a sea of apps and services. While this has huge use, if we don\u2019t maintain good security hygiene our identities are at risk. And over the last year, we have seen identity become the battleground for security.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While threats have been rising fast over the past two years, there has been low adoption\u202fof strong identity authentication, such as multifactor authentication and\u202fpasswordless\u202fsolutions. Microsoft\u202fdata shows that\u202facross industries,\u202fonly\u202f22\u202fpercent\u202fof Microsoft\u2019s Cloud Identity Solution, Azure Active Directory (AAD), users\u202fhave\u202fimplemented strong identity authentication protection\u202fas of December 2021.\u202fMFA and passwordless solutions can go a long way in preventing a variety of threats and we&#8217;re committed to educating customers on solutions such as these to better protect themselves.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">From January\u202f2021\u202fthrough December 2021, we\u2019ve blocked\u202fmore than\u202f25.6\u202fbillion\u202fAAD brute force authentication\u202fattacks and intercepted\u202f35.7 billion phishing\u202femails\u202fwith Microsoft Defender for Office 365.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">With 8,500 security defenders protecting the <\/span><span data-contrast=\"auto\">platforms, tools, services, and endpoints <\/span><span data-contrast=\"none\">that support our online lives we\u2019re dedicated to thwarting advanced cyberattacks. Microsoft understands our role in helping to protect and defend our most valuable digital asset, our identity. To ensure people are who they say they are when they access Microsoft accounts and services, we verify their identity\u2014but relying on a single password to authenticate users creates an attractive point of failure for hackers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The most recent Irish data captured in the Microsoft Digital Defense Report shows 58% of all cyber-attacks in the last year were perpetrated by Nation States. Ireland is also number one in the world when it comes to ransomware encounters, based on size. \u202fThe report also shows that Manufacturing and Financial Services are the two most targeted industries globally, both of which\u202fhave considerable footprints in Ireland.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Online\u202fthreats\u202fare increasing in volume, velocity,\u202fand sophistication.\u202fFrom IoT to nation-state activity, new ransomware tactics to insights into the\u202fcybercriminal economy, <\/span><i><span data-contrast=\"auto\">Cyber Signals<\/span><\/i><span data-contrast=\"auto\"> provides trend analysis and practical guidance\u202fto strengthen the first line of digital defense.\u202fWith increasing numbers of people working remotely and accessing their business apps and data from multiple locations including home offices, coworking spaces, and other remote locations, individuals are realizing the importance of secure authentication. And it\u2019s not just about securi<\/span><span data-contrast=\"none\">ng enterprises, it\u2019s our personal data, devices, identities, platforms, and clouds that are also targets.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Cyber Signals<\/span><\/i><span data-contrast=\"none\"> will share trends, tactics and strategies threat actors use gain access to the\u202fhardware\u202fand software that houses one\u2019s most sensitive data and help inform the world on how collectively we can protect our most precious digital resources and our digital lives so we can build a safer world together. I hope you enjoy the first report.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re excited to\u202fintroduce Cyber Signals a cyberthreat intelligence brief\u202finformed by the latest\u202fMicrosoft\u202fthreat data and\u202fresearch. This\u202fcontent, which will be released\u202fquarterly, offers\u202fan expert perspective into\u202fthe current threat landscape,\u202fdiscussing\u202ftrending tactics, techniques, and strategies used by the world\u2019s most prolific threat actors.\u202fAs such, we hope it\u2019s a valuable resource to Chief Information Security Officers, Chief Information Officers, Chief Privacy [&hellip;]<\/p>\n","protected":false},"author":665,"featured_media":622386,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1830],"class_list":["post-622380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en-ie","specials-technology-lifestyle-en-ie","stories-how-can-i-keep-my-data-safe-en-ie","stories-how-can-i-keep-my-data-safe","stories-your-online-security-en-ie","businessPriorities-digital-transformation-en-ie"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/622380"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/comments?post=622380"}],"version-history":[{"count":2,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/622380\/revisions"}],"predecessor-version":[{"id":622434,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/622380\/revisions\/622434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media\/622386"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media?parent=622380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/categories?post=622380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}