{"id":39,"date":"2012-01-25T15:34:04","date_gmt":"2012-01-25T15:34:04","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=39"},"modified":"2018-06-26T12:05:08","modified_gmt":"2018-06-26T17:05:08","slug":"will-a-real-time-threat-feed-limit-damage-from-cyber-crimes","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/","title":{"rendered":"Will a real-time threat feed limit damage from cyber crimes"},"content":{"rendered":"<div class=\"posterous_autopost\">\n<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Live-Help.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1637\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Live-Help-300x200.jpg\" alt=\"chicago IT support\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Live-Help-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/03\/Live-Help-1024x682.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Cyber crimes happen everyday, and everyday IT <a title=\"The Importance of Data Security\" href=\"http:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\" target=\"_blank\">security<\/a> companies track and record details around these attacks. Microsoft is upping its game and releasing a real-time threat feed so that its fellow partners can study current threats it finds and learn the best steps to proactively take against them.<\/p>\n<p><a title=\"Will Windows Phone Change the Way We View Microsoft\" href=\"http:\/\/www.stratospherenetworks.com\/blog\/will-windows-phone-change-the-way-we-view-microsoft\/\" target=\"_blank\">Microsoft<\/a> presently has a process in place to take down dangerous botnets. Microsoft \u201cswallows\u201d the botnets and lets them infect accounts that are highly controlled by Microsoft\u2019s team. After the botnets infect the accounts, Microsoft learns how they work and removes them as a threat.<\/p>\n<p>This collected data is now shared with ISPs, private and government organizations, &amp; CERTs. While real-time data may not decrease the number of attacks by malicious code, the impact of sharing this data will most likely be quite extraordinary. IT security companies will be able to respond more speedily to these threats and therefore be able to decrease the amount of damage they can cause.<\/p>\n<p>Microsoft&#8217;s live threat feed could have a far more important impact: It could lead the information security industry to share more data. For too long, companies have hesitated to discuss important security information that they fear could lead to a copycat attack. This is a mistaken belief as cyber criminals are already swapping information amongst themselves. It&#8217;s a good idea, therefore, for security professionals to also share real-time information.<\/p>\n<p>Let\u2019s hope that security professionals soon understand that sharing information is more useful than secrecy. And let\u2019s hope that Microsoft\u2019s move is a first step in this change of attitude.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber crimes happen everyday, and everyday IT security companies track and record details around these attacks. Microsoft is upping its game and releasing a real-time threat feed so that its fellow partners can study current threats it finds and learn &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-39","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base"],"yoast_head":"<title>Will a real-time threat feed limit damage from cyber crimes - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Will a real-time threat feed limit damage from cyber crimes - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"og:description\" content=\"Cyber crimes happen everyday, and everyday IT security companies track and record details around these attacks. Microsoft is upping its game and releasing a real-time threat feed so that its fellow partners can study current threats it finds and learn &hellip; Read more &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2012-01-25T15:34:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:05:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Will a real-time threat feed limit damage from cyber crimes\",\"datePublished\":\"2012-01-25T15:34:04+00:00\",\"dateModified\":\"2018-06-26T17:05:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\"},\"wordCount\":271,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Knowledge Base\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\",\"name\":\"Will a real-time threat feed limit damage from cyber crimes - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2012-01-25T15:34:04+00:00\",\"dateModified\":\"2018-06-26T17:05:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Will a real-time threat feed limit damage from cyber crimes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Will a real-time threat feed limit damage from cyber crimes - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/","og_locale":"en_US","og_type":"article","og_title":"Will a real-time threat feed limit damage from cyber crimes - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","og_description":"Cyber crimes happen everyday, and everyday IT security companies track and record details around these attacks. Microsoft is upping its game and releasing a real-time threat feed so that its fellow partners can study current threats it finds and learn &hellip; Read more >","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2012-01-25T15:34:04+00:00","article_modified_time":"2018-06-26T17:05:08+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Will a real-time threat feed limit damage from cyber crimes","datePublished":"2012-01-25T15:34:04+00:00","dateModified":"2018-06-26T17:05:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/"},"wordCount":271,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Knowledge Base"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/","name":"Will a real-time threat feed limit damage from cyber crimes - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2012-01-25T15:34:04+00:00","dateModified":"2018-06-26T17:05:08+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Will a real-time threat feed limit damage from cyber crimes"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":7,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":1767,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39\/revisions\/1767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}