Summary
In this chapter, we covered some common threats to companies and users and discussed both internal and external threats. We also showed some ways to analyze the threats to company assets to provide a cost analysis to justify the implementation of solutions to mitigate and avoid threats from being realized. Finally, we discussed the key aspects of protecting data with encryption.
The next chapter will discuss the key principles that Microsoft adheres to for security, compliance, and privacy.