Trace Id is missing
Skip to main content
Microsoft Security

Cyber Resilience

Discover the resilience success factors every organization should adopt as digital threats increase.

Many cyberattacks are successful simply because basic security hygiene has not been followed

80%
of security incidents can be traced to a few missing elements that could be addressed through modern security approaches.
900
password attacks per second defended against by Microsoft.
90%+
of accounts compromised were not protected with strong authentication.

Developing a holistic approach to cyber resiliency

As we develop new capabilities for a hyperconnected world, we must manage the threats posed by legacy systems. A modernized approach can help organizations protect themselves.
A diagram outlining key issues impacting cyber resiliency

This chart shows the percentage of impacted customers missing basic security controls which are critical to increasing organizational cyber resilience. Findings are based on Microsoft engagements over the past year.

The cyber resilience bell curve

As we have seen, many cyberattacks are successful simply because basic security hygiene has not been followed. We recommend five minimum standards which every organization should adopt.
A diagram showing the cyber resilience bell curve

Explore other critical focus areas

The State of Cybercrime

Cybercrime continues to rise, driven by increases in both random and targeted attacks. Attack methods have evolved to create increasingly diverse threats.

Nation State Threats

Nation state actors are launching increasingly sophisticated cyberattacks to evade detection and further their strategic priorities.

Devices and Infrastructure

As organizations harness advances in computing capability and entities digitize to thrive, the attack surface of the digital world is exponentially increasing.

Cyber Influence Operations

Today’s foreign influence operations utilize new methods and technologies, making their campaigns designed to erode trust more efficient and effective.

Read the report and connect with us

Follow Microsoft Security