Home » Cyber Security » Page 2

Read the latest posts on cyber security threats and protecting your business and endpoints using Microsoft Advanced Threat Protection from the 360 View Blog.

Check out these popular posts.

Protecting Your Endpoints and Infrastructure with Microsoft Defender ATP

March 25, 2022

The Risk of Doing It Yourself: DIY vs. Third-Party Cyber Risk Management Services

  The world is continually expanding digitally, and businesses are becoming more interconnected than ever. Consequently, ever the opportunists, cyberattacks criminals continue to take advantage of the chaos and, in […]
October 12, 2021

Cloud Security Audit – 5 Steps to Better Security

  It’s a common misconception that migrating one’s data, applications, and infrastructure to the cloud means never having to worry about cybersecurity again. Although it’s true that most software-as-a-service (SaaS) […]
August 11, 2021

How to Add Managed Detection and Response to Azure Sentinel and Microsoft Defender

  Businesses of all sizes worldwide have been downsizing their local data centers and moving their critical business applications, storage, and infrastructure to cloud solutions. The result has been considerable […]
July 9, 2021

How to Lower Your Cyber Insurance Premiums By Securing Your Business

  Cyber insurance is among the fastest-growing specialty insurance products, and with good reason. The costs of responding to cyberattacks and restoring affected systems and data are soaring, with ransomware leading the way. […]
May 20, 2021

What is Cyber Insurance – Your Guide to Security Compliance

  As a business owner, you have access to many types of specialty insurance products. In addition to insuring yourself against the usual risks–liability, malpractice, theft, natural disasters–you can purchase […]
January 27, 2021

Cloud Migration: What the C-Suite Needs to Know Now

  Not long ago, the idea of enterprises putting their mission-critical data and applications in “the cloud”—someone else’s servers, in someone else’s data center!—seemed preposterous.  At least, it seemed preposterous […]
November 20, 2020

How to Prevent and Monitor Impersonation Based Phishing Attacks

How to Prevent Phishing Attacks Using Microsoft 365 Defender Impersonation is where the sender or the sender’s email domain in a message looks similar to a real sender or domain. […]
October 28, 2020

Why Migrate Workloads to Microsoft Azure and Modernize Legacy Applications to the Cloud

The Path to Unprecedented Growth Goes Through the Cloud It’s time to rethink your processes. There are new ways to embrace the possibilities enabled by modern technologies. We are in […]
October 23, 2020

Microsoft’s Unique Approach to Simplify Security

  Poor security posture is often rooted in complexity. Security teams have historically struggled to keep up with threats and signals across a patchwork of poorly integrated solutions that fail […]
September 15, 2020

Microsoft Cloud App Security (MCAS)

  A Cloud Access Security Broker (CASB) is software that sits between users and cloud applications, and monitors all activity and enforces security policies. Microsoft’s CASB product, Microsoft Cloud App […]
360 Visibility