Best practices
Get practical guidance for building a stronger, more resilient security strategy. Learn best practices from Microsoft experts thatโll help you defend against todayโs threats.
Refine results
Topic
Products and services
Publish date
-
Cyberattacks and data breaches continue to dominate the news globally.
-
How do digital youth of the “app generation” learn, communicate, and express themselves
I recently had the opportunity to speak with Katie Davis, an assistant professor from the University of Washington Information School to discuss her role and a book she co-authored called, The App Generation: How Today’s Youth Navigate Identity, Intimacy, and Imagination in a Digital World. -
What is a trusted device?
When you try to view or edit your credit card details or other sensitive information in your Microsoft account, you might need to enter a security code first, to make sure that only you can get in to your account. -
How to sign into devices that don’t accept security codes
Two-step verification makes it more difficult for hackers to access your account, even when they have your password. -
5 ways to protect your Microsoft account
Your Microsoft account (formerly your Windows Live ID) is the combination of an email address and a password that you use to sign in to services such as Xbox LIVE and Outlook. -
5 reasons NOT to share personal information on a website
Knowing when to trust a website depends in part on who publishes it, what information they want, and what you want from the site. -
How do I get rid of all of these security warnings?
Rogue security software (also known as “scareware”) creates pop-up warnings that look like legitimate security updates. -
Is my computer up to date?
To get updates for Windows and other Microsoft programs at the same time, including updates for Microsoft Office (Word, Outlook, Excel, PowerPoint, and more), go to the Microsoft Update website. -
How do spammers get my email address?
It pays to keep your email address as private as possible, but sometimes it seems like there’s nothing you can do to keep it out of the hands of spammers. -
Writing Fuzzable Code
Adam Shostack here. One of the really exciting things about being in the Microsoft Security Engineering Center is all of the amazing collaborators we have around the company. -
Giving SQL Injection the Respect it Deserves
You may have read recently about a large number of Web servers that were compromised through a SQL injection attack. -
Training People on Threat Modeling
Adam Shostack here. Blogger Ian Grigg has an interesting response to my threat modeling blog series, and I wanted to respond to it.