Many cyberattacks are successful simply because basic security hygiene has not been followed
80%
of security incidents can be traced to a few missing elements that could be addressed through modern security approaches.
of security incidents can be traced to a few missing elements that could be addressed through modern security approaches.
900
password attacks per second defended against by Microsoft.
password attacks per second defended against by Microsoft.
90%+
of accounts compromised were not protected with strong authentication.
of accounts compromised were not protected with strong authentication.
Developing a holistic approach to cyber resiliency
As we develop new capabilities for a hyperconnected world, we must manage the threats posed by legacy systems. A modernized approach can help organizations protect themselves.
This chart shows the percentage of impacted customers missing basic security controls which are critical to increasing organizational cyber resilience. Findings are based on Microsoft engagements over the past year.
The cyber resilience bell curve
As we have seen, many cyberattacks are successful simply because basic security hygiene has not been followed. We recommend five minimum standards which every organization should adopt.
Explore other critical focus areas
The State of Cybercrime
Cybercrime continues to rise, driven by increases in both random and targeted attacks. Attack methods have evolved to create increasingly diverse threats.
Nation State Threats
Nation state actors are launching increasingly sophisticated cyberattacks to evade detection and further their strategic priorities.
Devices and Infrastructure
As organizations harness advances in computing capability and entities digitize to thrive, the attack surface of the digital world is exponentially increasing.
Cyber Influence Operations
Today’s foreign influence operations utilize new methods and technologies, making their campaigns designed to erode trust more efficient and effective.
Follow Microsoft