diff --git a/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png b/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png
index 6b9c37489c..f23868fdde 100644
Binary files a/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png and b/windows/keep-secure/images/threat-mitigations-pre-breach-post-breach-conceptual.png differ
diff --git a/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md b/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md
index 2220558610..0b8d3f4996 100644
--- a/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md
+++ b/windows/keep-secure/overview-of-threat-mitigations-in-windows-10.md
@@ -14,7 +14,7 @@ This topic provides an overview of software and firmware threats faced in the cu
This topic focuses on pre-breach mitigations aimed at device protection and threat resistance. These protections work with other security defenses in Windows 10, as shown in the following illustration:
-
+
**Figure 1. Device protection and threat resistance as part of the Windows 10 security defenses**