Microsoft offers more free security tools amidst criticism

In response to recent security concerns and criticism, Microsoft takes a decisive step to provide advanced security tools free of charge to all its customers. The move comes after a high-profile cyberattack that targeted senior U.S. officials and highlighted the importance of robust digital auditing measures.
Job for IT professionalsMicrosoft’s newly enhanced suite of security tools, known as Microsoft Purview, will be made available to all customers over the next few months, Microsoft said in a blog post on Wednesday.

The company’s previous practice of charging for advanced versions of these cyber security tools faced widespread backlash, particularly following the discovery of a major hack affecting the U.S. State and Commerce Departments. The breach, later attributed to coding flaws, underscored the necessity for comprehensive security solutions in safeguarding sensitive data.

By offering these advanced features at no cost, Microsoft aims to empower organizations in detecting and mitigating cyber threats effectively. Digital auditing tools play a crucial role in identifying potential intrusions, tracing the origin of attacks, and devising strategies to expel unauthorized access from networks.

The decision to provide free security tools was met with praise from Cybersecurity and Infrastructure Security Agency (CISA) official, Eric Goldstein. He emphasized that such a move is beneficial for everyone involved, as it increases visibility into investigating cybersecurity incidents, ultimately bolstering overall security measures.

Eric Goldstein in a statement released alongside Microsoft’s blog post said that everyone wins when security tools are provided free of charge.

As cyber threats continue to evolve, Microsoft’s commitment to enhancing cybersecurity and providing accessible tools marks a significant step forward in the fight against malicious actors seeking to exploit vulnerabilities. With these improvements, customers can better protect themselves and their valuable information from potential breaches and unauthorized access.