Skip to main content

What Is Microsoft Defender for Individuals & What Does It Do?

When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a hybrid world. One made up of several connected “mini-offices” located in employee homes.

The outsourcing market has also contributed to the change in company networks. Freelancers are often contracted to work the same hours as employees. This means less overhead and taxes to pay. Approximately 68% of large consumer products companies outsource a part of their workforce.

What we’re getting at is that the need for home devices and network security has never been greater. Company data is now at the mercy of employee devices, situated in homes across the globe.

55% of employees use their own devices and software to work from home.

Microsoft has been at the forefront of this huge shift in the work environment. Its latest release is another example of how it has positioned its products to address new needs.

The latest security offering by Microsoft is not for business plans. It’s for Personal and Family users of Microsoft 365. The company announced Microsoft Defender for Individuals on June 16, 2022. This is a brand-new digital home security tool.

The Basics of Microsoft Defender for Individuals

Microsoft Defender is a new app that Microsoft 365 subscribers can download. Anyone with a Personal or Family plan can access it for no extra cost.

According to Microsoft, there was a main driver for offering Microsoft Defender. It was to protect the digital life of small businesses and families. Small companies will often use consumer Microsoft 365 plans. This is because they are less expensive than the business plans.

This app brings many digital protections together into one dashboard. These include the following.

Online Security Visibility

Most families have several devices connected to their network. This includes computers, tablets, and smartphones. It can be hard to know which are vulnerable before a hacked device infects the others.

Microsoft Defender gives you visibility into the security status of your devices. It does this in a single place. So, you could see if that new phone of Sally’s has antivirus enabled. You can also easily add or remove devices.

Device Safeguards

The app includes extra protections from online threats. These are in the form of help from antivirus and anti-phishing protection.

You can use it to continually scan devices for threats, both new and existing. You also gain control of scanning customization. For example, you can note certain apps as safe and tell Microsoft Defender what to scan.

Real-Time Alerts & Recommendations

Hackers use automation and AI to unleash their attacks and help them spread. This means that it’s often a race against the clock to stop a breach from getting worse.

To react fast, you need to know something is wrong. Microsoft Defender helps you by giving you real-time alerts. These also come with recommended actions. So, you not only know something is wrong, but you also know what to do about it.

What Else Should You Know?

Here are a few other important things you should know about using Microsoft Defender for Individuals.

Where Can You Download It?

You can download Microsoft Defender for Individuals from Microsoft here. You need to have a Microsoft 365 subscription to either the Personal or Family plan.

What Devices Can Use It?

You can use Defender to secure and monitor the following devices:

  • Windows: Windows 10 version 19041.0 and higher
  • Mac: Intel Macs from Catalina 10.15 and higher, and Apple silicon-based devices from 11.2.3 and up
  • iPhone: iOS 13.0 or later
  • Android: Android OS 6.0 or later

How Many Devices Can You Add?

Microsoft Defender allows you to watch the security of many of your home or work devices. The M365 plan you have will dictate how many.

  • If you have Microsoft 365 Personal plan, you can receive protection on up to 5 devices at the same time.
  • If you have Microsoft 365 Family plan, you can receive protection on up to 30 devices at the same time. (5 devices per person, 6 people total)

What Are the Key Differences Between the Personal & Family Plans?

Both plans can access the many different Office and other Microsoft applications. The main difference is how many people and devices can use the Microsoft 365 services.

  • Microsoft 365 Personal: $69.99 US/year, 1 person, 5 devices
  • Microsoft 365 Family: $99.99 US/year, 6 people, 5 devices per person

So, if you want to sign up even 2 people, you’re saving quite a bit with the Family plan. Even more, if you have six people total using the service.

What’s the Difference Between Microsoft Security on Windows & Microsoft Defender?

Most Windows users are already familiar with the Microsoft Security app. It comes pre-installed on Windows. Microsoft Defender differs from this app in several ways.

Microsoft Defender:

  • Is not pre-installed on Windows. You must download it.
  • It’s a cross-device application used on many different devices
  • It includes features for online security
  • It includes alerts and security tips

Learn More About Defender & Microsoft 365 Today

Are you looking to get more from your Microsoft 365 subscription? We can help! Reach out today to schedule a technology consultation with our M365 experts.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code.

The developer issues a patch to fix the vulnerability. But it’s not long before a new feature update causes more. It’s like a game of “whack-a-mole” to keep your systems secure.

Keeping up with new vulnerabilities is one of the top priorities of IT management firms. It’s important to know which software and operating systems are being attacked.

Without ongoing patch and update management, company networks are vulnerable. And these attacks are completely avoidable. 82% of U.S. cyberattacks in Q1 of 2022 were due to exploiting patchable vulnerabilities. This is a global problem.

What new vulnerabilities are lurking in products from Microsoft, Google, Adobe, and others? We’ll go through several. These were recently noted in a warning by the Cybersecurity and Infrastructure Security Agency (CISA).

Make Sure to Patch Any of These Vulnerabilities in Your Systems

Microsoft Vulnerabilities

Microsoft vulnerabilities include those in three of its products. Internet Explorer (IE) is one of them. Microsoft discontinued IE in June of 2022. You should remove this from any computers that still have it installed.

You’ll see the acronym “CVE” used in the vulnerability names. This is an industry-standard naming structure. It stands for Common Vulnerabilities and Exposures.

Here is a rundown of these vulnerabilities and what a hacker can do:

  • CVE-2012-4969: This Internet Explorer vulnerability allows the remote execution of code. This is a “critical” vulnerability because of the damage it enables. Hackers can release this via a website. Thus, formerly safe sites can become phishing sites when hackers exploit this loophole.
  • CVE-2013-1331: This is a flaw in the code for Microsoft Office 2003 and Office 2011 for Mac. It enables hackers to launch remote attacks. It exploits a vulnerability in Microsoft’s buffer overflow function. This allows hackers to execute dangerous code remotely.
  • CVE-2012-0151: This issue impacts the Authenticode Signature Verification function of Windows. It allows user-assisted attackers to execute remote code on a system. “User-assisted” means that they need the user to assist in the attack. Such as by opening a malicious file attachment in a phishing email.

Google Vulnerabilities

Google Chrome and applications built using Google’s Chromium V8 Engine are also on the list. These applications are targets of the following vulnerabilities.

  • CVE-2016-1646 & CVE-2016-518: These both allow attackers to conduct denial of service attacks. They do this against websites through remote control. This means they can flood a site with so much traffic that it crashes.
  • Those aren’t the only two code flaws that allow hackers to crash sites this way. Two others, CVE-2018-17463 and CVE-2017-5070 both do the same thing. And like all these others, have patches already issued that users can install to fix these holes.

Adobe Vulnerabilities

People use Adobe Acrobat Reader widely to share documents. It makes it easy to share them across different platforms and operating systems. But it’s also a tool that’s on this list of popular vulnerabilities.

  • CVE-2009-4324: This is a flaw in Acrobat Reader that allows hackers to execute remote code via a PDF file. This is why you can’t trust that a PDF attachment is going to be safer than other file types. Remember this when receiving unfamiliar emails.
  • CVE-2010-1297: This memory corruption vulnerability. It allows remote execution and denial of service attacks through Adobe Flash Player. Like IE, the developer retired Flash Player. It no longer receives support or security updates. You should uninstall this from all PCs and websites.

Netgear Vulnerability

Netgear is a popular brand of wireless router. The company also sells other internet-connected devices. These are also vulnerable, due to the following flaws.

  • CVE-2017-6862: This flaw allows a hacker to execute code remotely. It also enables bypassing any needed password authentication. It’s present in many different Netgear products.

Cisco Vulnerability

  • CVE-2019-15271: This is a vulnerability in the buffer overflow process of Cisco RV series routers. It gives a hacker “root” privileges. This means they can basically do anything with your device and execute any code they like.

Patch & Update Regularly!

These are a few of the security vulnerabilities listed on the CISA list. You can see all 36 that were added here.

How do you keep your network safe from these and other vulnerabilities? You should patch and update regularly. Work with a trusted IT professional to manage your device and software updates. This ensures you don’t have a breach waiting to happen lurking in your network.

Automate Your Cybersecurity Today

Patch and update management is just one way that we can automate your cybersecurity. Learn how else we can help by scheduling a consultation today.


Featured Image Credit

This Article has been Republished with Permission from The Technology Press.

Blog