May 04,2022

How to protect your customers against 98% of attacks

Cyber Hygiene describes the practice of maintaining a good security posture to keep environments protected and data safe.

On my consultations with MPN partners, I find more than often, scenarios where a simple investment on basic cyber security hygiene would help customers and partners face the increasing sophistication of cyber threats.

The cybersecurity bell curve from the Microsoft Digital Defense Report (Oct’21) provides a very good description on how some of this basic security hygiene practices will produce an impact that can protect against 98% of the attacks:

  1. Enable multifactor authentication
    According to the latest Microsoft Cyber Signals report, only 22% of our customers are using strong authentication such as MFA (which is free and can be turned on by default).
    Reach out to our team to learn more on how Azure AD can help you protect your identities.

  2. Apply least privilege access
    Prevent attackers from spreading across the network by applying least privilege access principles, which limits user access with just-in-time and just-enough-access (JIT/JEA), risk-based adaptive polices and data protection.
    Find out how tools such as Azure AD Privileged Identity Management, Access Reviews and Conditional Access can help managing Least Privilege for the identities, and how Azure Virtual Desktop, Just-In-Time VM Access and Intune can help protect privileged access endpoints.

  3. Keep up to date
    Mitigate the risk of software vulnerabilities by ensuring your organization’s devices, infrastructure, and applications are kept up to date and correctly configured. Endpoint management solutions allow policies to be pushed to machines for correct configuration and ensure systems are running the latest versions.
    Get to know features such as Microsoft Endpoint Manager, Threat & Vulnerability Management and Defender for Cloud.

  4. Utilize Antimalware
    Stop malware attacks from executing by installing and enabling antimalware solutions on endpoints and devices. Utilize cloud-connected antimalware services for the most current and accurate detection capabilities.
    Microsoft Defender for Endpoint or Microsoft Defender for Business are key for the next-generation protection of your systems.

  5. Protect Data
    Know where your sensitive data is stored and who has access. Implement information protection best practices such as applying sensitivity labels and data loss prevention policies. If a breach does occur, it’s critical that security teams know where the most sensitive data is stored and accessed.
    Learn more about Microsoft Purview and features such as Microsoft Information Protection and Data Loss Prevention to protect your data.

Next Steps

Open a request with our team:


  • Microsoft Image
    Sr. Partner Technical Consultant - Security, Compliance & Identity

    Microsoft Partners are key for reaching our customers. I've been helping those partners to achieve more in the security & identity topics and respond to the ever-growing security challenges through cloud advisory consultations, technical presales, solution demonstrations, PoCs, design and architecture planning. As part of my continuous self-development I try to take on new challenges and keep updated on my area of expertise: Azure, Cloud Identity, Security & Compliance.