Microsoft says the pandemic has changed the future of cybersecurity in these five ways – TechRepublic

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.
We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.
Invalid email/username and password combination supplied.
An email has been sent to you with instructions on how to reset your password.
By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy.
You will also receive a complimentary subscription to TechRepublic’s News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.
Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).
Microsoft says the pandemic has changed the future of cybersecurity in these five ways
Your email has been sent
A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses’ cybersecurity investments going forward.
Cybersecurity has shot to the top of business agendas in recent months, as the sudden shift of workforces from the office to the home highlighted a host of new threats within remote-working setups. Add to that the explosion in opportunistic cybercriminals hoping to cash in on the situation, and businesses are faced with a security minefield as the prospect of remote work looms indefinitely.
Many businesses are adapting to this new scenario, reprioritising their investments and fast tracking projects aimed at shoring up IT security. Microsoft recently conducted a survey of nearly 800 business leaders from the UK, US, Germany and India to better understand how the coronavirus pandemic will influence the cybersecurity landscape going forward, including their own plans for budgets, staffing and investments.
The bottom line is that the pandemic is accelerating the digital transformation of cybersecurity. Here are five ways COVID-19 is shaping the future of the industry, according to Microsoft.
Having entire workforces work from home meant that businesses had to quickly ensure that employees were set up with the necessary tools to work safely and effectively from home. This didn’t mean simply mean VPNs; companies have recognised that apps that promote productivity, collaboration and a positive end-user experience are a priority for creating healthy remote workforces. Microsoft calls this “digital empathy” – what it really means is ensuring that the end-user experience is inclusive.
According to Microsoft’s study, improving end-user experience and productivity for remote workers is the top priority of security business leaders (41%), and this means extending security policies so employees can use more apps for remote work. Enabling multi-factor authentication (MFA) was identified as key to beginning this journey by Microsoft’s respondents, and was also the top security investment made by businesses during the pandemic.
Zero Trust shifted from an option to a business priority in the early days of the pandemic, as business leaders sought to get a handle on the influx of new, potentially unsecured, devices logging into corporate networks from employees’ homes. In light of the growth in remote work, more than half (51%) of business leaders are speeding up the deployment of Zero Trust capabilities, Microsoft said. According to the company, this will eventually become the industry standard: 94% of companies in Microsoft’s study reported that they were in the process of deploying new Zero Trust capabilities.
SEE: Zero trust security: A cheat sheet (free PDF) (TechRepublic)  
The COVID-19 pandemic has been a breeding ground for phishing scams, skimming attacks and a host of other cybersecurity nasties seeking to exploit the unprecedented situation. According to Microsoft, 54% of security leaders reported an increase in phishing attacks since the beginning of the outbreak.
But the pandemic has also highlighted the power of cloud-based tools and datasets in tackling cybersecurity threats as they travel across the globe. Microsoft said it had tracked more than eight trillion daily threat signals using a diverse set of products, services, and feeds, combining both automated tools and human insights to identify new COVID-19-themed threats before they reached end users.
SEE: Social engineering: A cheat sheet for business professionals (free PDF) (TechRepublic)
Cybersecurity will underpin much of what businesses do, if the remote-working trend continues as expected. To ensure resiliency in this new threat landscape, businesses will need to regularly evaluate their risk and their ability to execute their cybersecurity strategies, using a combination of human efforts and technology, Microsoft said.
According to Microsoft, the cloud can make it easier for organisations to plan out cybersecurity risk scenarios and contingency plans: more than half of “cloud-forward” and hybrid companies in Microsoft’s study reported having a cyber-resilience strategy for most risk scenarios, compared to 40% of primarily on-premises organisations. Meanwhile, 19% of companies relying mainly upon on-premises technology said they didn’t plan to maintain a documented cyber-resilience plan.
Microsoft’s study revealed that successful phishing attacks were reported in significantly higher numbers from organisations that described their resources as mostly on-premises (36%) as opposed to being more cloud-based. At the same time, nearly 40% of businesses said they were prioritising investments in cloud security to reduce the risk of breaches, followed by data and information security (28%) and anti-phishing tools (26%). Taken together, Microsoft said, COVID-19 has showcased the need for integrated security spanning endpoints to the cloud, making the cloud a crucial part of any business’ future cybersecurity investments.  
Microsoft says the pandemic has changed the future of cybersecurity in these five ways
Your email has been sent
Your message has been sent
In his final TechRepublic video, Bill Detwiler reflects on his more than 20 years of working on the brand and interviews Tamara Scott about what excites her about being Managing Editor of TR.
In these training courses, you’ll learn basic Linux system administration; then, you’ll get familiar with the Linux command line and understand the foundations of how Linux works.
Replacing a desktop or laptop computer with an iPad, whether the system is a Windows machine or a Mac, is no longer a stretch. These 10 steps will make the iPad Pro migration go smoothly.
PDF Converter Pro is an all-in-one tool that allows you create or convert PDF documents into a variety of formats or from a variety of formats with ease.
Tired of Gmail and you’d rather not touch Outlook? If so, what services and/or clients can you use for email communication? Jack Wallen offers up his five favorites.
If you’re looking for an alternative office suite, there are several choices to be found. Jack Wallen offers his five favorites that aren’t Office 365 or Google Workspace.
It’s critical to plan Microsoft 365 apps and services deployments on Macs properly to avoid end-user frustrations. There are so many elements to consider that forward-thinking IT professionals should consider employing a checklist. With proper administration, IT departments can ensure important tasks aren’t overlooked, and users don’t need to return systems to the help desk …
When computer systems fail, business grinds to a halt, and that can cost your enterprise a considerable amount of money. With the help of TechRepublic Premium’s Systems Downtime Expense Calculator, you can estimate just how much each system failure is going to cost you. When to use this tool Even if the entire business does …
Results from the latest TechRepublic Premium survey suggest that businesses continue to deploy multicloud solutions, but the IT pros who support them are uncertain how they’ll change in the future. From the introduction: Heading into the third year of the COVID-19 global pandemic, industries, businesses, consumers and the information technology professionals who support them are …
This TechRepublic Premium download includes a checklist for PC and Mac migrations to minimize frustrations and improve productivity. Regardless of the process, there are several elements to track when replacing an existing computer with a new system. Whether your organization begins by imaging drives or manually configures new systems, many questions must be addressed, including: …


Leave a Reply

Your email address will not be published. Required fields are marked *