If you’re paying attention to the news these days, it’s hard to miss the security challenges the government is facing when it comes to our infrastructure and elections. Businesses big and small should pay attention. We’re also vulnerable, and regularly under attack. As on-premise and cloud computing increases and change speeds up, it’s more important than ever to protect your operations and data from troublesome hackers and malware.
Our team is increasingly called in to handle disaster recovery – an unfortunate specialty for us but necessary because not every company is able to prevent every attack.
If I could give advice to IT Managers, it would be to prioritize onsite and offsite security at every turn.
For the cloud, the computing platform I feel confident recommending when it comes to security is Microsoft’s Azure. The platform is reliable, simple and effective, and Microsoft goes to great lengths on security.
Microsoft’s secure foundation spans across physical, infrastructure, and operational security. Part of the operational security includes over 3,500 cybersecurity experts across different teams that are dedicated to security research and development. They even have created a Microsoft Threat Intelligence Center, a security team at that encounters and mitigates against threats across the security landscape.
This team works to identify issues such as peer to peer networking software, standard botnet and ransomware attacks, and adversary-based threats from hackers or nation state sponsored groups.
As soon as an exploit is detected, the Microsoft Threat Intelligence Center works with other teams at Microsoft to build mitigations into all Microsoft products and services.
And of course, the team mitigates attacks targeting the Azure platform. Some key benefits include the use of the Azure Security Center to get a centralized, real-time monitoring view into the security state of your hybrid cloud resources, and quickly take action against issues. You can also use Security Center’s Just-in-Time VM Access to protect against threats such as brute force attacks by reducing access to virtual machine management ports to only when it is needed. Security Center’s Investigation Path will help you explore all the entities involved an attack, such as a SQL injection, and quickly remediate against the attack.
Bedrisystems depends on Azure for cloud security, and if you’re interested in learning more how Azure can benefit your company, call me at 888-602-6170. Hopefully you call me about Azure before you call me about Disaster Recovery!
In my next blog, I’ll share some insight on on-premise security options. Stay tuned!