{"id":47989,"date":"2022-04-14T09:26:01","date_gmt":"2022-04-14T01:26:01","guid":{"rendered":"https:\/\/version-2.com\/?p=47989"},"modified":"2022-05-30T10:42:14","modified_gmt":"2022-05-30T02:42:14","slug":"microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/04\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\/","title":{"rendered":"Microsoft Attack: How PAM enables you to reduce cyberattack risks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"47989\" class=\"elementor elementor-47989\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n<p><span style=\"font-weight:400;\">Each day more news of cyber attacks come up in the media, involving from Small and Medium Enterprises (SMEs) to large business conglomerates. These attacks can have several motivations: they can only serve as alerts for organizations to increase their cybersecurity maturity; steal the data to resell it on the Deep Web; cause harm to the organization; or carry out extortion. This is in addition to the operational and image losses that organizations can suffer, which can be incalculable. It is important to emphasize that cybersecurity risks are increasingly associated with business risks, and must be considered by senior management when defining their business strategies.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">The Lapsus$ cyber gang has been doing quite a bit of damage these past few days. Okta and Microsoft are among the targets of successful attacks by DEV-0537, as the gang is called by the developer of Windows. Do you want to understand how the attacks on Microsoft and Okta occurred, and how the attacks could be prevented or minimized? Read this article until the end and we will explain.<\/span><\/p> <p><span style=\"font-weight:400;\">Lapsus$ started its activities targeting organizations in the UK and South America. The cyber gang then expanded its actions to global targets, including government, technology, telecom, media, retail and healthcare. In both Microsoft and Okta cases, the malicious attackers used privileged credentials to carry out their attacks. According to the Verizon 2021 Data Breach Investigations Report, 61% of cyberattacks involved privileged credentials. But why are high-privilege credentials among cybercriminals\u2019 favorite targets?<\/span><\/p> <p>&nbsp;<span style=\"font-weight:400;\">Well, the main reason for the high rate of attacks through privileged credentials is because they allow the execution of a series of administrative activities in the environment. Transferring resources in an ERP system or changing the settings of a firewall or email server are some of the activities that can be performed using this type of credential. It\u2019s no wonder they\u2019re also called \u201ckeys to the kingdom\u201d: privileged credentials give you unlimited access to your organization\u2019s most critical devices, applications, and data.<\/span><\/p> <p>&nbsp;<span style=\"font-weight:400;\">It is also worth remembering that Lapsus$ uses Social Engineering as a technique to gain access to privileged credentials, as well as in 35% of cyber attacks, according to the Verizon report. Techniques used by Lapsus$ include SIM Swapping, paying employees and third parties in exchange for their credentials or configured MFAs, or Social Engineering over the phone.<\/span><\/p> <p><span style=\"font-weight:400;\">In the case of Okta, according to its CSO, the malicious attackers had access to a device of a Support engineer in a time window of six days, between January 16 and 21, 2022. Also according to the Okta executive, the cyber attack affected a low percentage of customers \u2013 approximately 2.5% or 400 customers.<\/span><\/p> <p><span style=\"font-weight:400;\">Microsoft\u2019s investigation of the incident found a compromised privileged account, which allowed access to their environment. However, the malicious attackers were not able to access personal data, such as customers, but they had access to the company\u2019s source code, although Microsoft does not consider this fact serious.<\/span><\/p>\n<p><span style=\"font-size:18px;\">To help organizations manage and protect their privileged credentials, there is Privileged Access Management, or PAM. According to Gartner, PAM solutions help organizations provide privileged access to critical assets and achieve compliance by managing and monitoring privileged accounts and access.<\/span><span style=\"font-weight:400;\"><\/span><\/p> <p><span style=\"font-weight:400;\"><\/span><\/p> <p><span style=\"font-weight:400;\">Also according to Gartner, it is impossible to manage privileged access risks without specific Privileged Access Management tools. But how can the senhasegura PAM security platform help prevent, detect and remediate cyberattacks such as those that occurred with Okta and Microsoft?<\/span><\/p> <p><span style=\"font-weight:400;\">senhasegura offers an approach based on the privileged access lifecycle: from the actions performed before, during and after access.<\/span><\/p> <p><span style=\"font-weight:400;\">Initially, senhasegura offers Credential Management features, which allow the user to view the password of a credential to access a device or application. senhasegura also allows you to configure criteria for password change, such as number of uses, specific date and time, or elapsed time.<\/span><\/p> <p>&nbsp;<span style=\"font-weight:400;\">senhasegura also offers Remote Session Management functionality, which further increases security in relation to pure credential management. In this case, senhasegura records and stores all remote sessions carried out through the solution.<\/span><\/p> <p><span style=\"font-weight:400;\">senhasegura\u2019s Threat and Behavior Analysis allows the identification and response to any change in behavior patterns and user access profiles. In case of detection of suspicious access, the LiveStream functionality allows the Information Security team to monitor all actions performed by the user, being possible to block or interrupt the session in case of suspicious behavior.<\/span><\/p> <p>&nbsp;<span style=\"font-weight:400;\">All actions performed by users through remote sessions on senhasegura are logged. In this case, the Security team is able to search for specific commands performed by the user, allowing them to easily find potentially malicious ones.<\/span><\/p> <p>&nbsp;<span style=\"font-weight:400;\">Finally, senhasegura offers senhasegura Domum, which provides secure remote access for employees and third parties, providing Zero Trust-based access without the need for additional configuration, such as VPN, or access to the PAM solution. All of this with all the security features already offered by the PAM platform.<\/span><\/p> <p>&nbsp;<span style=\"font-weight:400;\">We have seen that when it comes to cybersecurity, the question is not \u201cif\u201d the attack will occur, but when. Many of these cyberattacks involve privileged credentials, also called \u201ckeys to the kingdom\u201d. According to Gartner, it is impossible to manage the risks associated with privileged access without specific tools. senhasegura offers a complete PAM platform, which covers the entire privileged access lifecycle. In this way, it is possible to quickly detect potentially malicious actions, thus allowing the reduction of operational costs in addition to compliance with regulatory requirements and security policies.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Each day more news of cyber attacks come up in the medi [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-47989","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Attack: How PAM enables you to reduce cyberattack risks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Attack: How PAM enables you to reduce cyberattack risks - Version 2\" \/>\n<meta property=\"og:description\" content=\"Each day more news of cyber attacks come up in the medi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-14T01:26:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Microsoft Attack: How PAM enables you to reduce cyberattack risks\",\"datePublished\":\"2022-04-14T01:26:01+00:00\",\"dateModified\":\"2022-05-30T02:42:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\\\/\"},\"wordCount\":917,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/\",\"name\":\"Microsoft Attack: How PAM enables you to reduce cyberattack risks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg\",\"datePublished\":\"2022-04-14T01:26:01+00:00\",\"dateModified\":\"2022-05-30T02:42:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Attack: How PAM enables you to reduce cyberattack risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Attack: How PAM enables you to reduce cyberattack risks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Attack: How PAM enables you to reduce cyberattack risks - Version 2","og_description":"Each day more news of cyber attacks come up in the medi [&hellip;]","og_url":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/","og_site_name":"Version 2","article_published_time":"2022-04-14T01:26:01+00:00","article_modified_time":"2022-05-30T02:42:14+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Microsoft Attack: How PAM enables you to reduce cyberattack risks","datePublished":"2022-04-14T01:26:01+00:00","dateModified":"2022-05-30T02:42:14+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\/"},"wordCount":917,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/microsoft-attack-how-pam-enables-you-to-reduce-cyberattack-risks\/","url":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/","name":"Microsoft Attack: How PAM enables you to reduce cyberattack risks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg","datePublished":"2022-04-14T01:26:01+00:00","dateModified":"2022-05-30T02:42:14+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Microsoft-Attack-How-PAM-Can-Reduce-Cyber-Attack-Risks-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Microsoft Attack: How PAM enables you to reduce cyberattack risks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-cu1","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/47989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=47989"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/47989\/revisions"}],"predecessor-version":[{"id":47993,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/47989\/revisions\/47993"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=47989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=47989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=47989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}