Skip to content
Microsoft Secure

VOTE for Microsoft Crowdsourced RSA Sessions

RSA Conference is trying something a little different this year to form a full track of sessions that are voted on directly by you. Anyone can vote, but registered delegate votes count a bit more. Microsoft has proposed seven additional sessions – so click on the title below and vote! A pragmatic approach to evaluate...

Read more

Privacy considerations in a cloudy world

Privacy considerations in a cloudy world

In today’s high tech world, individuals from around the globe can comment in real time on others social media posts and current events instantaneously. With just a few keystrokes, data, thoughts and ideas can reach around the world. In this fast paced environment, consideration of what you choose to share and to whom is more...

Read more

Microsoft

Looking Forward: Trustworthy Computing

When Bill Gates announced the Trustworthy Computing Initiative in 2002, he recognized that we needed to change both our processes and culture if we were to make fundamental changes in our products. To ensure that occurred, a centralized group was given responsibility to drive the initiative forward. At the 10 year milestone in 2012, a...

Read more

HOW TO: Report the Microsoft phone scam

(Note: Our Tech support scams FAQ page has the latest info on this type of threat, including scammer tactics, fake error messages, and the latest scammer hotlines. You can also read our latest blog, Teaming up in the war on tech support scams.)   If someone calls you from Microsoft technical support and offers to...

Read more

Questions to ask your cloud provider

When it comes to building trust with cloud services customers, there’s no substitute for transparency. A cloud provider should be able to explain in detail how it will address the security, privacy and compliance needs of its customers.  Read more >>...

Read more

5 passwords you should never use

This is part three of three posts on stronger passwords. Part 1: Create stronger passwords and protect them Part 2: Do you know your kids’ passwords? The news is filled with stories about hackers cracking passwords. You can help avoid being a victim by never, ever using these passwords: Password. Believe it or not, this...

Read more

Your email belongs to you, not us

Microsoft is committed to delivering meaningful privacy protections that build trust with our customers, and we know how much you value the contents of your email.  We believe your email belongs to you, not us, and that it should receive the same privacy protection as paper letters sent by mail–no matter where it is stored. ...

Read more

Do you know your kids’ passwords?

This is the second of two blog posts on password protection. Read Part 1: Create strong passwords and protect them. Whether or not you should know all of your kids’ passwords depends on their age, how responsible they are, and your parenting values. However, kids of any age and responsibility level need to know how...

Read more

Create stronger passwords and protect them

All week we’ll be posting our best guidance on how to create, protect, and manage your passwords. Passwords are your first line of defense against hackers. Pick passwords that are difficult to crack but easy for you to remember. What does “difficult to crack” mean? Each time cybercriminals hack into a database of passwords, they...

Read more

Why do I have to update my email account information?

We’ve noticed comments from many of you asking why we want you to verify your Microsoft security information. We’d like to explain why verifying this information is important. To help protect your email account and your personal data, we ask everyone who has a Microsoft account to make sure that the security information associated with...

Read more