Referred Link -
https://www.linkedin.com/pulse/loyal-employees-your-most-valuable-asset-brigette-hyacinth
https://www.linkedin.com/pulse/loyal-employees-your-most-valuable-asset-brigette-hyacinth
An employee's relationship with their manager sets the tone for their level of commitment to the organization's success. Gallup research shows that a mind-boggling 70% of an employee’s motivation is influenced by his or her manager. It’s no wonder employees don’t leave companies; they leave managers. Disengaged employees can cost companies millions of dollars from lost productivity, damages from employee negligence and negative publicity due to poor customer service. Organizations know how important it is to have motivated, engaged employees, but most fail to hold managers accountable for making it happen.
7 Things a Manager can do to Improve Employee Morale:
1.Connect with staff- As a leader you should be seen. Make your presence felt. Don’t just lock yourself in your office whole day and only communicate with staff when you want something done. Get to know your employees. Find out about their interests.
2. Show employees that you genuinely care. If an employee is dealing with an issue whether personally or professionally, show Empathy. Advocate for your team. Stand up for them. Don’t throw your people under the bus when things go wrong.
3. Practice Open and Honest two-way Communication. Keep employees informed. Don’t let them have to be hear of upcoming changes through the grapevine. Listening to employees - Have an atmosphere where employees ideas and suggestions are valued. Don’t have surveys and suggestion boxes then when feedback is given, you simply ignore it.
4. Be fair and neutral. Treat everyone fairly. Don’t pick favorites. Lead by example. Be known as a person of integrity.
5. Empower Employees. Provide them with the proper tools, then give them room to get the job done. Don’t micromanage!
6. Reward and Recognition- Offer incentives. Show employees how much you value and appreciate them. Always reward staff for good work, and not only top performers include those who are improving or doing their best. Be generous with "Thank Yous."
7. Recommend employees for training and new opportunities. Staff members can interpret an employer’s unwillingness to invest in training as a disregard for their professional development. Acknowledge and encourage strengths, recognize the different skills they possess and recommend training and development opportunities.
If you believe, that employees are your most valuable asset, you will create a healthy work atmosphere and provide them with the tools and support to do their jobs effectively.
It's important that managers focus on relationship building and encourage a family atmosphere at work. Get to know your employees, meet them where they are and be flexible. Many organizations treat their employees as if they are a commodity. They use them until they can get no more out of them, and then cast them aside. This leads to poor morale, lower productivity, and higher turnover.
Loyal employees are your most valuable asset. Don't take them for granted or treat them poorly. They use your internal tools and systems and interact with customers. They are your best brand ambassadors. Loyalty is a two-way street. You can't buy loyalty, but you can certainly foster and nurture it. Employees who have been pushed to the point where they no longer care, will not go the extra mile. They will not take the initiative to solve problems. They will end up treating customers the same way you treat them. Employees are the heart beat of the company. And if the heart stops beating...What will happen?
Referred Link - https://cloudblogs.microsoft.com/microsoftsecure/2018/06/06/cybersecurity-reference-architecture-security-for-a-hybrid-enterprise/
The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it.
How to use it
We have seen this document used for several purposes by our customers and internal teams (beyond a geeky wall decoration to shock and impress your cubicle neighbors).
- Starting template for a security architecture – The most common use case we see is that organizations use the document to help define a target state for cybersecurity capabilities. Organizations find this architecture useful because it covers capabilities across the modern enterprise estate that now spans on-premise, mobile devices, many clouds, and IoT / Operational Technology.
- Comparison reference for security capabilities – We know of several organizations that have marked up a printed copy with what capabilities they already own from various Microsoft license suites (many customers don’t know they own quite a bit of this technology), which ones they already have in place (from Microsoft or partner/3rd party), and which ones are new and could fill a need.
- Learn about Microsoft capabilities – In presentation mode, each capability has a “ScreenTip” with a short description of each capability + a link to documentation on that capability to learn more.
- Learn about Microsoft’s integration investments – The architecture includes visuals of key integration points with partner capabilities (e.g. SIEM/Log integration, Security Appliances in Azure, DLP integration, and more) and within our own product capabilities among (e.g. Advanced Threat Protection, Conditional Access, and more).
- Learn about cybersecurity – We have also heard reports of folks new to cybersecurity using this as a learning tool as they prepare for their first career or a career change.
As you can see, Microsoft has been investing heavily in security for many years to secure our products and services as well as provide the capabilities our customers need to secure their assets. In many ways, this diagram reflects Microsoft massive ongoing investment into cybersecurity research and development, currently over $1 billion annually (not including acquisitions).
What has changed in the reference architecture and why
We made quite a few changes in v2 and wanted to share a few highlights on what’s changed as well as the underlying philosophy of how this document was built.
- New visual style – The most obvious change for those familiar with the first version is the simplified visual style. While some may miss the “visual assault on the senses” effect from the bold colors in v1, we think this format works better for most people.
- Interactivity instructions – Many people did not notice that each capability on the architecture has a quick description and link to more information, so we added instructions to call that out (and updated the descriptions themselves).
- Complementary content – Microsoft has invested in creating cybersecurity reference strategies (success criteria, recommended approaches, how our technology maps to them) as well as prescriptive guidance for addressing top customer challenges like Petya/WannaCrypt, Securing Privileged Access, and Securing Office 365. This content is now easier to find with links at the top of the document.
- Added section headers for each grouping of technology areas to make it easier to navigate, understand, and discuss as a focus area.
- Added foundational elements – We added descriptions of some core foundational capabilities that are deeply integrated into how we secure our cloud services and build our cybersecurity capabilities that have been added to the bottom. These include:
- Trust Center – This is where describe how we secure our cloud and includes links to various compliance documents such as 3rd party auditor reports.
- Compliance Manager is a powerful (new) capability to help you report on your compliance status for Azure, Office 365, and Dynamics 365 for General Data Protection Regulation (GDPR), NIST 800-53 and 800-171, ISO 27001 and 27018, and others.
- Intelligent Security Graph is Microsoft threat intelligence system that we use to protect our cloud, our IT environment, and our customers. The graph is composed of trillions of signals, advanced analytics, and teams of experts hunting for malicious activities and is integrated into our threat detection and response capabilities.
- Security Development Lifecycle (SDL) is foundational to how we develop software at Microsoft and has been published to help you secure your applications. Because of our early and deep commitment to secure development, we were able to quickly conform to ISO 27034 after it was released.
- Moved Devices/Clients together – As device form factors and operating systems continue to expand and evolve, we are seeing security organizations view devices through the lens of trustworthiness/integrity vs. any other attribute.
- We reorganized the Windows 10 and Windows Defender ATP capabilities around outcomes vs. feature names for clarity.
- We also reorganized windows security icons and text to reflect that Windows Defender ATP describes all the platform capabilities working together to prevent, detect, and (automatically) respond and recover to attacks. We added icons to show the cross-platform support for Endpoint Detection and Response (EDR) capabilities that now extend across Windows 10, Windows 7/8.1, Windows Server, Mac OS, Linux, iOS, and Android platforms.
- We faded the intranet border around these devices because of the ongoing success of phishing, watering hole, and other techniques that have weakened the network boundary.
- Updated SOC section – We moved several capabilities from their previous locations around the architecture into the Security Operations Center (SOC) as this is where they are primarily used. This move enabled us to show a clearer vision of a modern SOC that can monitor and protect the hybrid of everything estate. We also added the Graph Security API (in public preview) as this API is designed to help you integrate existing SOC components and Microsoft capabilities.
- Simplified server/datacenter view – We simplified the datacenter section to recover the space being taken up by duplicate server icons. We retained the visual of extranets and intranets spanning on-premises datacenters and multiple cloud provider(s). Organizations see Infrastructure as a Service (IaaS) cloud providers as another datacenter for the intranet generation of applications, though they find Azure is much easier to manage and secure than physical datacenters. We also added Azure Stack capability that allows customers to securely operate Azure services in their datacenter.
- New IoT/OT section – IoT is on the rise on many enterprises due to digital transformation initiatives. While the attacks and defenses for this area are still evolving quickly, Microsoft continues to invest deeply to provide security for existing and new deployments of Internet of Things (IoT) and Operational Technology (OT). Microsoft has announced $5 billion of investment over the next four years for IoT and has also recently announced an end to end certification for a secure IoT platform from MCU to the cloud called Azure Sphere.
- Updated Azure Security Center – Azure Security Center grew to protect Windows and Linux operating system across Azure, on-premises datacenters, and other IaaS providers. Security Center has also added powerful new features like Just in Time access to VMs and applied machine learning to creating application whitelisting rules and North-South Network Security Group (NSG) network rules.
- Added Azure capabilities including Azure Policy, Confidential Computing, and the new DDoS protection options.
- Added Azure AD B2B and B2C – Many Security departments have found these capabilities useful in reducing risk by moving partner and customer accounts out of enterprise identity systems to leverage existing enterprise and consumer identity providers.
- Added information protection capabilities for Office 365 as well as SQL Information Protection (preview).
- Updated integration points – Microsoft invests heavily to integrate our capabilities together as well as to ensure use our technology with your existing security capabilities. This is a quick summary of some key integration points depicted in the reference architecture:
- Conditional Access connecting info protection and threat protection with identity to ensure that authentications are coming from a secure/compliant device before accessing sensitive data.
- Advanced Threat Protection integration across our SOC capabilities to streamline detection and response processes across Devices, Office 365, Azure, SaaS applications, and on Premises Active Directory.
- Azure Information Protection discovering and protecting data on SaaS applications via Cloud App Security.
- Data Loss Protection (DLP) integration with Cloud App Security to leverage existing DLP engines and with Azure Information Protection to consume labels on sensitive data.
- Alert and Log Integration across Microsoft capabilities to help integrate with existing Security Information and Event Management (SIEM) solution investments.