New Blog Post | Microsoft security experts outline next steps after compromise recovery

%3CLINGO-SUB%20id%3D%22lingo-sub-3353344%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Microsoft%20security%20experts%20outline%20next%20steps%20after%20compromise%20recovery%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3353344%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Win17_CDOC_1533-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F370549i597B058EE6197E53%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Win17_CDOC_1533-900x360.jpg%22%20alt%3D%22Win17_CDOC_1533-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F05%2F10%2Fmicrosoft-security-experts-outline-next-steps-after-compromise-recovery%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20security%20experts%20outline%20next%20steps%20after%20compromise%20recovery%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Compromise%20Recovery%20Security%20Practice%20(CRSP)%20is%20a%20worldwide%20team%20of%20cybersecurity%20experts%20operating%20in%20most%20countries%2C%20across%20both%20public%20and%20private%20organizations%2C%20with%20deep%20expertise%20to%20secure%20an%20environment%20post-security%20breach%20and%20to%20help%20you%20prevent%20a%20breach%20in%20the%20first%20place.%20As%20a%20specialist%20team%20within%20the%20wider%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20cybersecurity%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Efunctions%2C%20we%20predominantly%20focus%20on%20reactive%20security%20projects%20for%20our%20customers.%20The%20main%20types%20of%20projects%20we%20undertake%20are%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ECompromise%20recovery%3A%20Giving%20customers%20back%20control%20of%20their%20environment%20after%20a%20compromise.%3C%2FLI%3E%0A%3CLI%3ERapid%20ransomware%20recovery%3A%20Restore%20business-critical%20applications%20and%20limit%20ransomware%20impact.%3C%2FLI%3E%0A%3CLI%20class%3D%22%22%3EAdvanced%20threat%20hunting%3A%20Proactively%20hunt%20for%20the%20presence%20of%20advanced%20threat%20actors%20within%20an%20environment.%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3353344%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Win17_CDOC_1533-900x360.jpg

Microsoft security experts outline next steps after compromise recovery - Microsoft Security Blog

 

The Microsoft Compromise Recovery Security Practice (CRSP) is a worldwide team of cybersecurity experts operating in most countries, across both public and private organizations, with deep expertise to secure an environment post-security breach and to help you prevent a breach in the first place. As a specialist team within the wider Microsoft cybersecurity functions, we predominantly focus on reactive security projects for our customers. The main types of projects we undertake are:

  • Compromise recovery: Giving customers back control of their environment after a compromise.
  • Rapid ransomware recovery: Restore business-critical applications and limit ransomware impact.
  • Advanced threat hunting: Proactively hunt for the presence of advanced threat actors within an environment.
0 Replies