{"id":746462,"date":"2022-10-20T12:16:37","date_gmt":"2022-10-20T11:16:37","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=746462"},"modified":"2022-10-21T09:37:20","modified_gmt":"2022-10-21T08:37:20","slug":"fa2-a-guide-to-boosting-cybersecurity-in-your-environment-with-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa2-a-guide-to-boosting-cybersecurity-in-your-environment-with-multi-factor-authentication\/","title":{"rendered":"A guide to boosting cybersecurity in your environment with Multi &#8211; Factor Authentication"},"content":{"rendered":"<p>You are the CEO of a large organization. It\u2019s Saturday evening and you\u2019re at home alone. When suddenly\u2026<\/p>\n<p>Your phone rings!<\/p>\n<p>It\u2019s your CISO. \u201cSomething terrible is happening,\u201d they say. \u201cWe\u2019re being hacked, right now!\u201d<\/p>\n<p>The attack has already paralyzed all your system and admin accounts \u2013 forcing multiple virtual machines within your Azure cloud environment to become activated and start using large amounts of data.<\/p>\n<p>What do you do?<\/p>\n<h2><\/h2>\n<h2><strong>How does it start?<\/strong><\/h2>\n<p>If you think this scenario sounds unlikely, then think twice. It\u2019s much more common than you imagine. Cyberattacks are an increasingly ordinary occurrence in todays\u2019 business world. They\u2019re also often extremely easy to trigger \u2013 even a simple phishing email can cause them. Someone accidentally clicks on a link and if you or your organization haven\u2019t taken the right measures, the attacker will have an open window to get in and take over.<\/p>\n<p>&nbsp;<\/p>\n<p>Criminal organizations are often just as well organized as your average multinational company. One department is responsible for sending phishing emails, while another does research on people \u2013 selecting who to target based on their vulnerability. Meanwhile, there\u2019s a specific division developing ransomware to encrypt data, and another tasked with negotiating and placing initial offers with the victim.<\/p>\n<p>&nbsp;<\/p>\n<p>All of these are cells that work together on an outsourcing model that is highly professional and aimed at major victims. Especially lately. We&#8217;ve recently seen a major shift from hail shooting to targeted operations. Because the larger the fish, the higher the income.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Intruders<\/strong><\/h2>\n<p>Hackers don&#8217;t have to hack, they just log in. Once your username and password have been stolen, the hacker is inside your network. Some criminals know a particular network even better than the system administrators themselves.<\/p>\n<p>&nbsp;<\/p>\n<p>You don&#8217;t see them. They just stay under the radar until the moment comes to strike. As a person receiving regular emails, you should always be on your guard. You should be able to recognize a strange email as soon as you get it.<\/p>\n<p>&nbsp;<\/p>\n<p>However, hackers are becoming more and more skilled. Sometimes it\u2019s easy to miss something potentially malicious. They might use psychological tricks, such as time emergencies, to pressure you to click. So if you ever do click on the wrong e-mail, make sure that the impact is limited. Continuously backing up your files and data points is a proven, well-functioning defense strategy. You avoid losing everything, and at the same time you guarantee continuity.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The first line of threat protection starts with Multi-Factor Authentication <\/strong><\/h2>\n<p>Endpoint protection starts with Multi-Factor Authentication (MFA). This means that every account within an organization should be protected with multiple types of identity protection. Priority should be given to Administrative and Systems accounts, which are more often targeted.<\/p>\n<p>Safeguarding these accounts is your first line of defense to protect your (cloud) environment and improve your cloud security posture.<\/p>\n<p>Using MFA on admin and system accounts is just one of many initiatives you can implement. It\u2019s also important to think about the rights these accounts need. Does an admin account need access to other (public) networks? Are the rights of a system\u2019s accounts still valid after many years?<\/p>\n<p>Have you created a \u2018broken glass\u2019 account for worst case scenarios?<\/p>\n<p>A lot of thinking and planning is needed when it comes to keeping your environment safe.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Protect your Environment with MFA and Breaking Glass Accounts\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/2OELa_3RnT8?feature=oembed&#038;enablejsapi=1&#038;origin=https:%2F%2Fpulse.microsoft.com\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h2><strong>We\u2019re here to help<\/strong><\/h2>\n<p>At Microsoft, we understand that all this can be slightly overwhelming. But we\u2019ve got you covered. To help you prevent data loss and secure data, we\u2019ve created content on how to protect your environment.<\/p>\n<p>The video above gives you an overview on how to enable MFA on admin accounts and on how to create broken glass accounts. We also show you how to monitor these accounts and manage non-used MFA accounts. There is also a presentation that you can download with further tips and tricks.<\/p>\n<p>And, last but not least, we wrote a whitepaper about the nine basic rules you can implement to keep your environment and your users safe against hackers.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You are the CEO of a large organization. It\u2019s Saturday evening and you\u2019re at home alone. When suddenly\u2026 Your phone rings! It\u2019s your CISO. \u201cSomething terrible is happening,\u201d they say. \u201cWe\u2019re being hacked, right now!\u201d The attack has already paralyzed all your system and admin accounts \u2013 forcing multiple virtual machines within your Azure cloud [&hellip;]<\/p>\n","protected":false},"author":665,"featured_media":746466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"class_list":["post-746462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","specials-work-productivity-en","stories-how-can-i-work-secure","stories-working-secure-en","businessPriorities-modern-workplace"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/746462"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/comments?post=746462"}],"version-history":[{"count":5,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/746462\/revisions"}],"predecessor-version":[{"id":746809,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/746462\/revisions\/746809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media\/746466"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media?parent=746462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/categories?post=746462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}