A guide to boosting cybersecurity in your environment with Multi – Factor Authentication

Jeroen Jansen

Jeroen Jansen

GTM Manager Security

Read Time, 3 min.

You are the CEO of a large organization. It’s Saturday evening and you’re at home alone. When suddenly…

Your phone rings!

It’s your CISO. “Something terrible is happening,” they say. “We’re being hacked, right now!”

The attack has already paralyzed all your system and admin accounts – forcing multiple virtual machines within your Azure cloud environment to become activated and start using large amounts of data.

What do you do?

How does it start?

If you think this scenario sounds unlikely, then think twice. It’s much more common than you imagine. Cyberattacks are an increasingly ordinary occurrence in todays’ business world. They’re also often extremely easy to trigger – even a simple phishing email can cause them. Someone accidentally clicks on a link and if you or your organization haven’t taken the right measures, the attacker will have an open window to get in and take over.

 

Criminal organizations are often just as well organized as your average multinational company. One department is responsible for sending phishing emails, while another does research on people – selecting who to target based on their vulnerability. Meanwhile, there’s a specific division developing ransomware to encrypt data, and another tasked with negotiating and placing initial offers with the victim.

 

All of these are cells that work together on an outsourcing model that is highly professional and aimed at major victims. Especially lately. We’ve recently seen a major shift from hail shooting to targeted operations. Because the larger the fish, the higher the income.

 

Intruders

Hackers don’t have to hack, they just log in. Once your username and password have been stolen, the hacker is inside your network. Some criminals know a particular network even better than the system administrators themselves.

 

You don’t see them. They just stay under the radar until the moment comes to strike. As a person receiving regular emails, you should always be on your guard. You should be able to recognize a strange email as soon as you get it.

 

However, hackers are becoming more and more skilled. Sometimes it’s easy to miss something potentially malicious. They might use psychological tricks, such as time emergencies, to pressure you to click. So if you ever do click on the wrong e-mail, make sure that the impact is limited. Continuously backing up your files and data points is a proven, well-functioning defense strategy. You avoid losing everything, and at the same time you guarantee continuity.

 

The first line of threat protection starts with Multi-Factor Authentication

Endpoint protection starts with Multi-Factor Authentication (MFA). This means that every account within an organization should be protected with multiple types of identity protection. Priority should be given to Administrative and Systems accounts, which are more often targeted.

Safeguarding these accounts is your first line of defense to protect your (cloud) environment and improve your cloud security posture.

Using MFA on admin and system accounts is just one of many initiatives you can implement. It’s also important to think about the rights these accounts need. Does an admin account need access to other (public) networks? Are the rights of a system’s accounts still valid after many years?

Have you created a ‘broken glass’ account for worst case scenarios?

A lot of thinking and planning is needed when it comes to keeping your environment safe.

 

We’re here to help

At Microsoft, we understand that all this can be slightly overwhelming. But we’ve got you covered. To help you prevent data loss and secure data, we’ve created content on how to protect your environment.

The video above gives you an overview on how to enable MFA on admin accounts and on how to create broken glass accounts. We also show you how to monitor these accounts and manage non-used MFA accounts. There is also a presentation that you can download with further tips and tricks.

And, last but not least, we wrote a whitepaper about the nine basic rules you can implement to keep your environment and your users safe against hackers.

 

Protect your organization in a few simple steps.

Explore the benefits of multifactor authentication now.

Discover more related articles per industry:

Education

Government

  • Iceland runs on Trust

    How the cloud helped a small nation realise big ambitions

    In December 2015, the Icelandic government kicked off a digital infrastructure review. With more than 100 different suppliers managed by over 100 IT managers in each public institution, the brief was clear; to simplify operations and streamline IT for over 20,000 users. The solution: Fast forward two and a half years, and a decision was […]

  • a group of people performing on stage in front of a crowd

    City of Liège: Facilitating decision making in difficult times

    For many organizations, social-distancing measures brought about by COVID-19 have drastically slowed day-to-day operations – and for some, even stopped them altogether. But for local governments across Europe, like the Belgian city of Liège, slowing down hasn’t been an option.  From supporting citizens and businesses to protecting frontline workers, Liège city had to quickly provide stability during this crisis and ensure important decisions could still be made in a democratic […]

Healthcare

  • a person preparing food in a kitchen

    Humanitas-DMH: empowering key workers with a secure digital support

    “Our goal is to create an environment where people with mental disabilities can feel safe, secure and happy.” Marcella van Kraaij, Digital Transformation Advisor at Dutch healthcare provider Humanitas-DMH, is discussing her organization’s key objectives – and how the technology her team recently adopted is helping it to achieve them. Every day, the carers and […]

  • Two female nurses having a virtual conversation through Microsoft Teams

    Belfast Trust: Reimagining patient care

    “There have been many heroic actions by our staff but we’re not heroes for what we’ve done – I’m just glad we could do our bit to help.” Paul Duffy, Co-Director of IT and Telecommunications at Belfast Trust, is talking about the monumental impact COVID-19 has had on the healthcare sector and how virtual consultations […]

Manufacturing

  • Mais on a sunny day

    COFCO International: How cloud technologies ensured business continuity during challenging times

    “I have worked at COFCO for 12 years, always in an office. But I have spent the last 63 days working from home.” Marcus Seelbach, Chief HR Officer at global agribusiness COFCO International, is talking from his home via video call about the transition he and all his colleagues have undergone since COVID-19 led to the closure of the company’s offices worldwide. “But thanks to the preparation and […]

  • Etex

    Etex uses modern tools to unite its business and better focus on customers

    When it comes to construction, all components must come together in a timely manner in order to produce the optimum product. While Etex, a Belgian building solution manufacturing company, helps make this a reality on a day-to-day basis, it wanted to find a way to enhance productivity and collaboration internally. With locations across more than […]

Retail

  • HeadBrands is ready for the future with Microsoft 365 Business

    HeadBrands is ready for the future with Microsoft 365 Business

    Since its creation in 2010, HeadBrands has continued to grow, rapidly becoming the leading retailer of hairdressing products in Scandinavia. HeadBrands needed a modern IT solution to increase its business productivity and improve collaboration, both within the company and externally. Its response to this challenge was to replace most of its previous services with Microsoft […]

  • GDPR and Retail: Four GDPR requirements and how Microsoft can help

    GDPR and Retail: Four GDPR requirements and how Microsoft can help

    Learn how we can help you meet GDPR requirements with solutions available today: Assessing your current risk profile “How do I understand where I am already compliant and where I need to focus next?” This is one of the most common questions from retailers in regard to the GDPR. It’s also one of the hardest to […]

Discover more related articles per dossier:

Customer Stories

  • Etex

    Etex uses modern tools to unite its business and better focus on customers

    When it comes to construction, all components must come together in a timely manner in order to produce the optimum product. While Etex, a Belgian building solution manufacturing company, helps make this a reality on a day-to-day basis, it wanted to find a way to enhance productivity and collaboration internally. With locations across more than […]

Digital Transformation

  • a group of people performing on stage in front of a crowd

    City of Liège: Facilitating decision making in difficult times

    For many organizations, social-distancing measures brought about by COVID-19 have drastically slowed day-to-day operations – and for some, even stopped them altogether. But for local governments across Europe, like the Belgian city of Liège, slowing down hasn’t been an option.  From supporting citizens and businesses to protecting frontline workers, Liège city had to quickly provide stability during this crisis and ensure important decisions could still be made in a democratic […]

Security & Privacy

  • logo

    Why trust is the essential ingredient in healthcare digital transformation.

    My phone had scarcely stopped ringing for weeks. Now it was ringing again. “Veronica,” said the voice at the other end, “we have an idea!” Immediately, I recognized who it was. I’ve known Carlo Tacchetti for almost as long as I’ve been at Microsoft. He’s a professor at the Vita-Salute San Raffaele University and the […]

Tips

  • a man in a striped shirt and looking at the camera

    The top 9 ways Microsoft IT is helping its employees to work from home

    From Milan to Puget Sound, tens of thousands of Microsoft employees have begun working from home as a result of the COVID-19 outbreak. Many of our customers have asked us to share the details of how we enable collaboration and remote working for such a large workforce. Here are the nine most important factors from a compliance […]