Skip to main content


Free Computer Security Tips

Find actionable guidance to help you leverage Microsoft's latest security products and technologies to better secure and protect information in your organization.




  • Ransomware in the Enterprise

    One problem affecting the enterprise space is ransomware, a type of malware designed to render a computer or its files unusable until you pay a certain amount of money to the attacker. Learn more about this threat and how to deal with a ransomware infection.

  • Threat Mitigation with EMET 4.0

    EMET 4.0 offers improvements and new features based on Microsoft customer feedback and the new attacks today's IT ecosystem has faced over the last couple years. Explore the new features and learn how to best utilize EMET 4.0 as part of your overall security toolbox.

  • Security Response Readiness Assessment

    Learn how to use Microsoft's free Security Response Readiness Assessment to help you evaluate the effectiveness of your software security response processes and identify areas for improvement.

  • How to Mitigate Against Targeted Cyber Intrusion

    Sensitive information, corporate intellectual property, financial information, and private personal data is being lost to cyber intrusions targeted at government agencies and private enterprises. Explore some effective protections that you can put in place without a new investment in technology or personnel.


  • Configuring BitLocker for Tablets

    Explore a new architectural standard called Connected Standby and learn how, with BitLocker, you can eliminate the need for pre-boot authentication in certain types of devices

  • Kicking the Virtual Tires of a Cloud Provider

    Evaluating a cloud provider needs to be done with care. Learn how to make the evaluation process simpler and easier to ensure that everyone can address the important factors of the cloud selection process.

  • Monitor Key Security Controls to Prevent Data Breach

    Learn how to use Microsoft's free Security Compliance Manager tool to help you to monitor patch status, identify changes to the administrators group, and report on the use of whitelists using the desired configuration management feature in System Center Configuration Manager.

  • DNSSEC and DNS Amplification Attacks

    Learn how, combined with source address spoofing, an attacker can direct a large volume of network traffic to a target system by initiating relatively small DNS queries so that you can better protect your network from this type of attack.

  • Threat Modeling and Agile Development Practices

    Find out how to effectively perform threat modeling for projects that demand rapid development processes.



Microsoft Security Newsletter

Sign up for a free monthly roundup of security news, bulletins, and guidance for IT pros and developers.