mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
Updates
This commit is contained in:
@ -56,7 +56,7 @@ Enhanced:
|
||||
|
||||
||Details|
|
||||
|-|-|
|
||||
|**<sup><a name="footnote1"></a>1</sup>**|*2023 Data Breach Investigations Report* - Verizon, 2023.|
|
||||
|**<sup><a name="footnote1"></a>1</sup>**|*Microsoft digital defense report, CISO executive summary, October 2023.|
|
||||
|**<sup><a name="footnote2"></a>2</sup>**|*Microsoft Digital Defense Report 2022* - Microsoft, 2022.|
|
||||
|**<sup><a name="footnote3"></a>3</sup>**| Compared to Windows 10 devices. *Improve your day-to-day experience with Windows 11 Pro laptops* - Principled Technologies, February 2023.|
|
||||
|**<sup><a name="footnote4"></a>4</sup>**| Based on Monthly Active Device data. *Earnings Release FY23 Q3* - Microsoft, April 2023.|
|
||||
|
@ -11,11 +11,11 @@ ms.date: 09/06/2024
|
||||
|
||||
## Introduction
|
||||
|
||||
Emerging technologies and evolving business trends bring new opportunities and challenges for organizations of all sizes. As technology and workstyles transform, so does the threat landscape with growing numbers of increasingly sophisticated attacks on organizations and users.
|
||||
Today’s organizations face a world of accelerated change, from marketplace fluctuation and sociopolitical events to the rapid adoption of new AI technologies. However, as organizations and industries innovate, so do increasingly sophisticated cybercriminals. Research shows that employees, including their devices, services, and identities, are at the center of attacks on businesses of all sizes. Some leading threats include identity attacks, ransomware, targeted phishing attempts, and business email compromise. <sup>[\[1\]](conclusion.md#footnote1)</sup>.
|
||||
|
||||
To thrive, organizations need security to work anywhere. [Microsoft's 2022 Work Trend Index][LINK-1] shows *cybersecurity issues and risks* are top concerns for business decision-makers. Business decision-makers worry about malware, stolen credentials, devices that lack security updates, and physical attacks on lost or stolen devices.
|
||||
|
||||
In the past, a corporate network and software-based security were the first lines of defense. With an increasingly distributed and mobile workforce, attention shifted to hardware-based endpoint security. People are now the top target for cybercriminals, with 74% of all breaches due to human error, privilege misuses, stolen credentials, or social engineering. Most attacks are financially motivated, and credential theft, phishing, and exploitation of vulnerabilities are the primary attack vectors. Credential theft is the most prevalent attack vector, accounting for 50% of breaches<sup>[\[1\]](conclusion.md#footnote1)</sup>.
|
||||
In the past, a corporate network and software-based security were the first lines of defense. With an increasingly distributed and mobile workforce, attention shifted to hardware-based endpoint security. People are now the top target for cybercriminals, with 74% of all breaches due to human error, privilege misuses, stolen credentials, or social engineering. Most attacks are financially motivated, and credential theft, phishing, and exploitation of vulnerabilities are the primary attack vectors. Credential theft is the most prevalent attack vector, accounting for 50% of breaches.
|
||||
|
||||
At Microsoft, we work hard to help organizations evolve and stay agile while protecting against modern threats. We help businesses and their users get secure, and stay secure. We [synthesize 43 trillion signals daily][LINK-2] to understand and protect against digital threats. We have more than 8,500 dedicated security professionals across 77 countries and over 15,000 partners in our security ecosystem striving to increase resilience for our customers<sup>[\[2\]](conclusion.md#footnote2)</sup>.
|
||||
|
||||
|
Reference in New Issue
Block a user