Sign in to confirm you’re not a bot
This helps protect our community. Learn more
These chapters are auto-generated

Microsoft Security

0:00

Background

5:21

Table stakes

10:48

The 2 main ways are...

13:15

What is the best way for bad guys to get your data?

13:32

What do Bad Actors do with 15,000,000,000 Records?

20:16

Lightning review - phishing signs

22:01

To-don't List

32:32

How do we lock up stuff in cyberspace?

37:22

Lost your house key? What do you do?

41:50

Password hall of shame

44:23

Good password managers

47:49

How else can you use a password manager?

51:10

Demos

53:42

Two-factor authentication

54:23

Use an app or token for 2FA, because... Text messaging is not secure

56:32

Go-Do's Review

58:08

Resources

59:40
Microsoft Cybersecurity Basics: Securing Yourself
72Likes
5,091Views
2020Nov 3
To ensure you hear about future Microsoft Cybersecurity webinars and other developments, make sure you join our community by going to https://aka.ms/SecurityCommunity Deck shared during the webinar can be accessed on https://aka.ms/SecurityWebinars below the recordings section.

Follow along using the transcript.

Microsoft Security Community

33.7K subscribers