Lessons Learned: How Hackers Breach Networks
If you had the chance to read the Microsoft Red Team whitepaper, you know that Microsoft Azure and the rest of the Microsoft cloud focuses on preventing and detecting breaches. Preventing breaches is what we’ve all been doing for decades, and we should continue to do the things we’ve been doing to make it harder for attackers to gain access to our systems and data.
With that said, we realize that trying to prevent breaches is not enough. You know that, and we know that – all you need to do is read a newspaper (or visit a news site) and see the “breach of the day”. Microsoft understands that while we can do all we can think of to prevent breaches, it’s possible that they will occur and therefore we need to assume that a breach is extant or imminent and define security policies, procedures, and response and remediation plans so that we can minimize the attacker’s lateral movement through the system and contain the breach before the attacker can do damage or steal data.
Microsoft spends a lot of time, money and effort to understand how attackers breach networks and data and we use that knowledge to help us detect potential compromise and eject the threat. We think you might find that information useful too, so I’d like to invite you to view a webinar put together by our Enterprise Cloud Security Group titled Anatomy of a breach: How hackers break in.
In this webinar you’ll learn:
- Common ways hackers get into your network, including phishing scams and targeted search results
- How hackers set up and manage long-term attacks
- Things you can do today to help prevent an attack
- The key response phases, including incident response, tactical recovery and strategic recovery
- Tips for developing an effective communications plan that won’t compromise your data’s security
I hope you enjoy Anatomy of a breach: How hackers break in and we look forward to discussing the presentation with you on this blog.