Attack surface
![Ominous red spheres representing potential threats surround a laptop and mobile device.](https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/08/375x234_MSFTInsider_Article_Hero_Mobile_Resilience_Cyber_Hygiene_Guide@2x.png)
Basic cyber hygiene prevents 99% of attacks
08/31/2023
Basic cyber hygiene remains the best way to defend an organization’s identities, devices, data, apps, infrastructure, and networks against 99% of all cyber threats. Discover practical tips in a comprehensive guide.
Learn more![](https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/06/375x234_MSFTInsider_Article_Hero_Mobile_DustinDuran@2x.png)
Expert Profile: Dustin Duran
06/20/2023
Threat intelligence expert Dustin Duran explains how his team adopts a threat actor mindset to better understand their adversaries and help keep customer organizations and security centers safe.
Learn more![](https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/05/Anatomy_of_an_External_Attack375x234.png)
Anatomy of a modern attack surface
05/02/2023
Managing a modern attack surface requires the right threat intelligence. This report can help tilt the playing field in favor of cyber security defenders
Learn more![ilustration](https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2022/08/Article-Headers-MBCyberthreatminute-1.jpg)
Cyberthreat Minute: The scale of worldwide cybercrime
08/01/2022
Within a 60-second window cybercrime can consist of password, attacks, DDoS attacks, ransomware, IoT attacks and phishing leading to lost revenue.
Learn more![Understanding the anatomy of an external surface attack](https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2022/04/MSFT_Security_03-Anatomy-of-an-external-attack-surface_375x234@2x.png)
Anatomy of an external attack surface
04/09/2022
Learn about threats to organizations’ external attack surface and how to help stay protected with Zero Trust.
Learn more