Tuesday, November 26, 2013

Microsoft Security Newsletter - November 2013



 
 
Trustworthy Computing | November 2013
Microsoft Security Newsletter
 
 
Welcome to November’s Security Newsletter!
This month our newsletter focuses on the top threats facing enterprise organizations. Many of the customers I talk with around the world are faced with increased business complexities combined with resource and financial constraints and are interested in learning how to prioritize their security investments to manage security risk. One of the key inputs to help prioritize security risk is threat intelligence. A few weeks ago, we published volume 15 of the Microsoft Security Intelligence Report (SIR). In the report, we list out the top 10 threats facing enterprises. Based on our research, enterprises encounter malware via three primary avenues: a) malicious or compromised websites, worms that spread through networked drives, and autorun feature abuse; b) weak passwords; or c) social engineering.

By the end of 2012, web-based attacks had surpassed traditional network worms to become the top threats facing enterprises and the latest SIR shows that this trend is continuing. In fact, during the second quarter of 2013, six out of the top 10 threats facing enterprises were associated with malicious or compromised websites. While web-based attacks have become the most common threats facing enterprises, worms cannot be ignored. In the second quarter of 2013 three out of the top ten threats facing enterprises were associated with worms. The third most common way in which enterprise organizations are encountering malware based on the latest threat intelligence is through social engineering.

The good news is that there are effective mitigations and best practices that can be used to help protect your enterprise such as keeping all software up to date, running software that was developed with a security development lifecycle, restricting web browsing, managing the security of your websites, and leveraging network security technologies. If you are interested in learning more about the top threats facing enterprises and how to take action, I encourage you to check out our recent blog post entitled, " Microsoft Cybersecurity Report: Top 10 Most Wanted Enterprise Threats."

Of course, this is just one of many key takeaways from the latest SIR. To download the complete report, which includes regional threat intelligence for 106 locations around the world, visit www.microsoft.com/sir. We hope you enjoy it and encourage you to provide feedback to our Twitter handle @MSFTSecurity.

Tim Rains Best regards,
Tim Rains, Director
Microsoft Trustworthy Computing

Have feedback on how we can improve this newsletter? Email us at secnlfb@microsoft.com and share your ideas.
 
Top Stories
 
Enhanced Mitigation Experience Toolkit 4.1 Released
The Enhanced Mitigation Experience Toolkit (EMET) helps prevent attackers from gaining access to computers, works well in the enterprise, and protects across a wide range of scenarios. Now available for download, EMET 4.1 includes updates that simplify configuration and enable faster deployment.

Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity
Pervasive use of computing and the Internet means that companies need plans in place to ensure key assets, systems and networks remain protected, while preserving the benefits that come with broad connectivity. As approaches vary country to country, Microsoft recently partnered with Oxford-Analytica to develop a downloadable report that looks at how organizations can seek to maximize the benefits of the Internet by matching their cybersecurity priorities to the needs of their citizens.

 
Security Guidance
 
Ransomware in the Enterprise
Marianne Mallen (Antivirus Researcher), Vidya Sekhar (Program Manager), Ben Hope (Technical Writer) – Microsoft Malware Protection Center
One problem affecting the enterprise space is ransomware, a type of malware designed to render a computer or its files unusable until you pay a certain amount of money to the attacker. Learn more about this threat and how to deal with a ransomware infection. For additional tips on how to protect your organization, see Ransomware: Ways to Protect Yourself & Your Business.

Security Keeps the Money Flowing: A Framework for Data Loss Prevention
Dan Griffin, Microsoft MVP – Enterprise Security and Founder of JW Secure, Inc.
The importance of protecting sensitive or important data is paramount for any business. While security technology today is amazingly advanced, so is the motivation and sophistication of the threat landscape. Explore a framework that can help you better evaluate data loss prevention (DLP) technologies for your organization.

Malware Response Guide
Download the Infrastructure Planning and Design Guide for Malware Response for help with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.

Anti-Spam and Anti-Malware Protection with Exchange Online
Microsoft Exchange Online provides built-in malware and spam filtering capabilities that help protect inbound and outbound messages from malicious software and help protect your network from spam transferred through email. Explore the filtering technologies enabled by default, then learn how to configure and customize anti-malware policies and anti-spam policies.

Malware Response Guide
Download the Infrastructure Planning and Design Guide for Malware Response for help with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.

Enhanced Protected Mode in Internet Explorer
Learn how Enhanced Protected Mode, included in Internet Explorer 10 and Internet Explorer 11, helps keep your data safe even if an attacker has exploited a vulnerability in the browser or one of its add-ons. Looking for more technical details on this feature? Read Understanding Enhanced Protected Mode.

 
Cloud Security Corner
 
A Solution for Private Cloud Security
With increasing numbers of organizations looking to create cloud-based environments or implement cloud technologies within their existing data centers, business and technology decision-makers are looking closely at the possibilities and practicalities that these changes involve. Get a comprehensive explanation of the process for designing and running security for a private cloud environment.

 
This Month's Security Bulletins
 
November 2013 Security Bulletins

Critical
 
MS13-088: 2888505 Cumulative Security Update for Internet Explorer
 
MS13-089: 2876331 Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution
 
MS13-090: 2900986 Cumulative Security Update of ActiveX Kill Bits

Important
 
MS13-091: 2885093 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
 
MS13-092: 2893986 Vulnerability in Hyper-V Could Allow Elevation of Privilege
 
MS13-093: 2875783 Vulnerability in Windows Ancillary Function Driver Could Allow Information Disclosure
 
MS13-094: 2894514 Vulnerability in Microsoft Outlook Could Allow Information Disclosure
 
MS13-095: 2868626 Vulnerability in Digital Signatures Could Allow Denial of Service
 
November 2013 Security Bulletin Resources:
 
Microsoft Security Response Center (MSRC) Blog Post
 
Security Bulletin Webcast (MP4)
 
Security Bulletin Webcast Q&A
 
Security Events and Training
 
Microsoft Webcast: Information about the December 2013 Security Bulletin Release
Wednesday, December 11, 2013
Join this webcast for a brief overview of the technical details of December’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.

Microsoft’s New Windows RMS – Advanced Information Protection
Tuesday, December 17, 2013
Learn about the major updates to Microsoft's new Rights Management Services that can provide support for non-Microsoft file formats on multiple platforms including iOS and Android, and extend those capabilities beyond your organization to business partners and individuals.

 
 
Essential Tools
 
Microsoft Security Bulletins
 
Microsoft Security Advisories
 
Security Compliance Manager
 
Microsoft Security Development Lifecycle Starter Kit
 
Enhanced Mitigation Experience Toolkit
 
Malicious Software Removal Tool
 
Microsoft Baseline Security Analyzer
Security Centers
 
Security TechCenter
 
Security Developer Center
 
Microsoft Security Response Center
 
Microsoft Malware Protection Center
 
Microsoft Privacy
 
Microsoft Security Product Solution Centers
Additional Resources
 
Trustworthy Computing Security and Privacy Blogs
 
Microsoft Security Intelligence Report
 
Microsoft Security Development Lifecycle
 
Malware Response Guide
 
Security Troubleshooting and Support Resources
 
Trustworthy Computing Careers
 
 
microsoft.com/about/twc Trustworthy Computing
 
 
This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

© 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Microsoft respects your privacy. To learn more please read our online Privacy Statement.

If you would prefer to no longer receive this newsletter, please click here.

To set your contact preferences for other Microsoft communications click here.

Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
 
 

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)