{"id":244159,"date":"2019-06-12T10:00:58","date_gmt":"2019-06-12T09:00:58","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=244159"},"modified":"2019-06-07T11:03:13","modified_gmt":"2019-06-07T10:03:13","slug":"fa2-whats-your-companys-cybersecurity-score","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa2-whats-your-companys-cybersecurity-score\/","title":{"rendered":"What\u2019s your company\u2019s cybersecurity score?"},"content":{"rendered":"<p class=\"intro\">It doesn\u2019t matter if you\u2019re a Fortune 500 company or a local bakery \u2013 today, cyberattacks threaten organisations of every size in every sector. And they can be costly to recover from. Attacks often damage brand reputation and cause significant disruption to productivity, which is why it\u2019s so important to protect against cybercriminals.<\/p>\n<p>But in a digital landscape that\u2019s evolving every day, cyberattacks are becoming increasingly sophisticated, and staying up-to-date on potential threats is a constant challenge. So, what\u2019s the solution?<\/p>\n<h2>The best defence? Assume the worst<\/h2>\n<p>With much of the modern workforce being mobile, taking a multi-faceted security approach that transcends traditional security perimeters is the new standard for modern companies \u2013 large organisations have an average of 75 security solutions. But it\u2019s not the number of measures that matters. It\u2019s their focus.<\/p>\n<p>Preventive measures alone are no longer sufficient. What\u2019s needed is real-time protection of all endpoints, as well as the adoption of an \u2018assume breach\u2019 posture that includes early detection mechanisms and automated protection features like <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/university-southern-denmark-higher-education-enterprise-mobility-security\" target=\"_blank\" rel=\"noopener noreferrer\">those employed by the University of Southern Denmark<\/a>. Then you can respond before the real damage happens.<\/p>\n<p>Think attack management, rather than attack prevention.<\/p>\n<h2>What\u2019s your security posture score?<\/h2>\n<p>A security posture is an organisation\u2019s approach to all aspects of security. A strong security posture not only highlights how you protect company assets, it also determines how you detect new threats and respond if the worst does happen.<\/p>\n<p>With <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/microsoft-secure-score\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Secure Score<\/a>, you can gauge exactly how robust your existing security posture is, and where it can be improved. <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/microsoft-secure-score\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Score<\/a> gives you a score based on your existing security solutions, and its centralised dashboard recommends ways to improve security across user accounts, device management, email and document protection, infrastructure, and shadow IT.<\/p>\n<p>By being able to compare your score with other companies, Secure Score gives you industry perspective on your security posture, allowing you to develop a cybersecurity strategy that fully embraces the modern way of work and aligns with the latest <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/02\/28\/microsoft-security-intelligence-report-volume-24-is-now-available\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Intelligence Report<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It doesn\u2019t matter if you\u2019re a Fortune 500 company or a local bakery \u2013 today, cyberattacks threaten organisations of every size in every sector. And they can be costly to recover from. Attacks often damage brand reputation and cause significant disruption to productivity, which is why it\u2019s so important to protect against cybercriminals. But in [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":244162,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1829],"class_list":["post-244159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en","specials-work-productivity-en","stories-how-can-i-work-secure","stories-working-secure-en","businessPriorities-modern-workplace"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/244159"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/comments?post=244159"}],"version-history":[{"count":3,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/244159\/revisions"}],"predecessor-version":[{"id":244213,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/244159\/revisions\/244213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media\/244162"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media?parent=244159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/categories?post=244159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}