


Multifactor authentication
Multifactor authentication (MFA) strengthens security by requiring people to provide multiple forms of verification before accessing systems. Learn about the importance of MFA and explore strategies, tools, and best practices to implement it effectively.
Refine results
Topic
Products and services
Publish date
-
Learn what actions companies can take and controls they can validate in light of the current level of threats, and during any period of heightened risk.
-
How to implement Multi-Factor Authentication (MFA)
The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. -
Your password doesn’t matter—but MFA does!
Turn on MFA and start building a long-term authenticator strategy that relies on “phish proof” authenticators, such as Windows Hello and FIDO. -
Preparing your enterprise to eliminate passwords
If you’re a CIO, a CISO, or any other exec at a company who is thinking about digital security, the user name/password paradigm is more than a hassle, it’s a true security challenge, which keeps many of us up at night. -
Ovum recommends Microsoft security to safeguard your hybrid and multi cloud environments
Read why Ovum believes Microsoft 365 and Azure can protect enterprises who use multiple cloud providers. -
3 investments Microsoft is making to improve identity management
Learn how Microsoft approaches identity management with tips you can apply to your own organization—no matter your budget. -
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Step 1. Identify users: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Top 10 security steps in Microsoft 365 that political campaigns can take today
With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email. -
Practical application of artificial intelligence that can transform cybersecurity
There is tremendous opportunity to use AI—particularly machine learning—to improve the efficacy of cybersecurity, the detection of hackers, and even prevent attacks before they occur. -
Protecting user identities
This is a blog series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. -
Working towards a more diverse future in security
Last year I embarked on an exercise to examine diversity in cybersecurity.