Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Blu Label takes R5.2-billion Cell C hit, touts clean slate ahead

      Blu Label takes R5.2-billion Cell C hit, touts clean slate ahead

      19 February 2026
      MeerKAT detects most powerful natural radio laser ever observed

      MeerKAT detects most powerful natural radio laser ever observed

      19 February 2026
      How AI is rewriting the rules of consulting - Mark Allderman

      How AI is rewriting the rules of consulting

      19 February 2026
      Crackdown on students gambling away Nsfas money online

      Crackdown on students gambling away Nsfas money online

      19 February 2026
      Meta may launch AI-powered smartwatch in 2026

      Meta may launch AI-powered smartwatch in 2026

      19 February 2026
    • World
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
      Russia bans WhatsApp

      Russia bans WhatsApp

      12 February 2026
      EU regulators take aim at WhatsApp

      EU regulators take aim at WhatsApp

      9 February 2026
      Musk hits brakes on Mars mission

      Musk hits brakes on Mars mission

      9 February 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      A million reasons monopolies don't work - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Microsoft under fire over ‘shambolic’ security practices

    Microsoft under fire over ‘shambolic’ security practices

    The world’s largest seller of cybersecurity products has a problem with its own cybersecurity.
    By Agency Staff15 April 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Microsoft under fire over 'shambolic' security practicesThe world’s largest seller of cybersecurity products has a problem with its own cybersecurity.

    In recent years, Microsoft has been hit with a series of embarrassing hacks that have exposed corporate and government customers. Earlier this month, the US Cyber Safety Review Board issued a scathing report documenting the company’s inability to stop hackers tied to the Chinese government from pilfering the e-mail boxes of US officials. The report’s authors called on Microsoft to institute urgent reforms.

    Amid the mounting criticism, the company has pledged its most ambitious security overhaul in two decades. Among other steps, Microsoft says it will move faster to address cloud vulnerabilities, make it harder for hackers to steal credentials and automatically enforce multifactor authentication for employees.

    Amid the mounting criticism, the company has pledged its most ambitious security overhaul in two decades

    The security reboot is a major commitment, but critics question whether Microsoft has sufficient incentive to make deep and lasting changes. Because customers are so reliant on the company’s software, they can’t easily switch to other providers. Microsoft’s cybersecurity operation, meanwhile, generates more than US$20-billion in sales per year and has been among the company’s fastest growing sources of revenue. Many of the anti-hacking tools are sold as a bundle with Microsoft’s software, prompting some critics to accuse the company of anticompetitive business practices.

    Citing Microsoft’s “shambolic cybersecurity”, US senator Ron Wyden introduced draft legislation on 8 April that would require the government to set mandatory cybersecurity standards for collaboration software. The Democrat said “vendor lock-in, bundling and other anticompetitive practices” result in the government spending “vast sums” on insecure software.

    ‘Unacceptable’

    Noting the cyber review board’s assertion that Microsoft isn’t focused on security, Wyden said: “For a company that is entrusted with as much sensitive government information, particularly one generating tens of billions of dollars in cybersecurity revenue alone, that is unacceptable. Relying on government tech vendors to do the right thing out of the goodness of their own hearts has been a losing strategy for decades.”

    Microsoft declined to comment on Wyden’s draft legislation or remarks. Describing a cybersecurity landscape that has never been more challenging, the company said it has a “unique role to play in keeping the world safe”.

    In an interview at Microsoft’s Seattle-area headquarters earlier this month, security chief Charlie Bell described the company as “ground zero” for hackers working on behalf of foreign governments. In part, that’s because Microsoft dominates the market for corporate productivity and desktop operating system software.

    Read: Microsoft claims breakthrough in quantum computing

    Recent attacks have struck alarmingly close to home. Early this year, a Russian state-sponsored group was blamed for combing through the e-mail accounts of top Microsoft executives — prompting the company to reassign thousands of engineers to help mitigate the intrusion and accelerate security updates. In May, a hacking gang linked to the Chinese government was accused of stealing one of Microsoft’s access tools and used it to break into the e-mail accounts of US commerce secretary Gina Raimondo, US ambassador to China Nicholas Burns and hundreds more, prompting the cyber review board inquiry.

    “They’re incredibly good at collecting data over time, gathering and gathering more and more momentum and then figuring out how to keep parlaying that into more and more success,” Bell said. “It’s very difficult to defend against.”

    The onslaught, according to Bell, prompted executives to say: “Well, let’s step back for a moment.”

    The result, announced in November, is the Secure Future Initiative, a companywide security reboot that executives say will better position Microsoft to combat current threats as well as future ones that may be turbocharged by artificial intelligence. The effort is being led by Bret Arsenault, a vice president and chief cybersecurity advisor, who served as Microsoft’s chief information security officer for 14 years. Asked why the company didn’t address the cyber issues sooner, he said the emergence of AI and current hacking trends were among the reasons for a more comprehensive security review.

    “There are certain sorts of watershed moments or changes in the environment that make you rethink how you want to go do it,” he said, later adding that company officials are “energised and focused” on executing the initiative’s commitments, “which align to much of what the government is calling for”.

    Microsoft says it will use AI and automation to make software safer, as well as rely more on programming languages deemed more secure. The company says it’s beefing up security protocols to make it harder for hackers to use stolen credentials or access tools to pilfer data. And it vows to respond to security vulnerabilities more rapidly, including mitigating cloud-based problems 50% faster.

    You have a whole bunch of things out there that have to be cleaned up. And that’s growing over time

    It’s a daunting task given Microsoft’s size and the complexity of its product portfolio. The company offers Windows, Office, Exchange e-mail and other products via the cloud, but continues to provide them to customers with their own servers. In the latter instance, Microsoft offers “patches” for flaws in so-called legacy systems and relies on customers to install them and maintain security protocols. Customers don’t always follow through, and efforts to end support for outdated operating systems like Windows XP or Windows 7 created an uproar because many were embedded in ATMs, hospital hardware and other critical systems.

    “You have a whole bunch of things out there that have to be cleaned up,” Bell said. “And that’s growing over time.”

    Microsoft is accelerating efforts to remove old or unused accounts as well as applications that are no longer supported by software updates or meet new security standards. So far, the company has removed more than 1.7 million identities tied to aged or unused accounts and 730 000 apps that were out of date or not meeting security standards, though it wasn’t clear how many identities and apps overall might fit that description.

    Crisis 2.0

    Microsoft is also beefing up its use of multifactor authentication, automatically enforcing it for more than a million accounts within the company, including those used for development, testing, demos and production, Arsenault said.

    The company now requires a video call between managers and employees or vendors who are creating digital IDs and is issuing short-lived credentials to new workers or vendors — steps designed to make it harder for attackers to impersonate someone or steal their ID. Even users with high-level administrator privileges can no longer turn off multifactor authentication when creating new accounts, Arsenault said.

    Read: Microsoft to face competition probe in South Africa

    If Microsoft’s current woes sound familiar, it’s because the company went through a similar crisis in the early 2000s. At the time, computer worms were disrupting computers running Windows. In January 2002, co-founder Bill Gates issued his “trustworthy computing” memo urging software developers to prioritise security.

    “So now, when we face a choice between adding features and resolving security issues, we need to choose security,” Gates wrote. “Our products should emphasise security right out of the box.”

    Microsoft halted the development of new Windows features for months to fix the flaws and attempted to create a more security-minded culture among its software engineers.

    Microsoft co-founder and former CEO Bill Gates

    Looking back on that period, Arsenault says it was a simpler time. Because Microsoft was releasing a version of Windows every few years, a pause was possible. That’s no longer the case because Microsoft and its rivals update software multiple times a day in the cloud. “It’s just a different company,” Arsenault said.

    In the following years, Microsoft also fell behind Google in search, Apple in mobile devices and Amazon in cloud-based services. The pressure to catch up prompted the company to prioritise speed over security. Microsoft wasn’t alone. Many tech companies — keen to cash in on Silicon Valley’s explosive growth — embraced an ethos epitomised by the then Facebook slogan: “Move fast and break things.”

    Microsoft’s belated shift to the cloud began about 2010. The move let the company fix security flaws directly, rather than asking customers to install patches. But cloud services presented new security challenges, as the recent breaches have made clear.

    Given the sophistication and resources of nation-backed hackers, it may be impossible to completely stop them

    Given the sophistication and resources of nation-backed hackers, it may be impossible to completely stop them. Microsoft’s security overhaul will help, but critics say the company should again slow down the release of new products to ensure better resilience going forward. Last week, the cyber board urged Microsoft to “deprioritise feature developments across the company’s cloud infrastructure and product suite until substantial security improvements have been made”.

    In fact, Microsoft is racing to capitalise on its early advantage in generative artificial intelligence. Already customers are asking how they’ll protect all the new AI programs, Bell said. He’s got an answer for them: buy more Microsoft security software.

    Even the cybersecurity unit has caught the AI bug — launching an assistant for security professionals that helps detect and thwart hacking attempts. In the past few weeks, executives have been traversing the US showing off the tool, called Copilot for Security. Early customer feedback for the AI assistant has been overwhelmingly positive, according to Vasu Jakkal, a vice president in Microsoft’s security division.

    “I have never seen interest like that in any security tool,” she said.  — Andrew Martin and Dina Bass, (c) 2024 Bloomberg LP

    Get breaking news alerts from TechCentral on WhatsApp



    Bill Gates Charlie Bell Microsoft Ron Wyden
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleHow industrial IoT could help fight rampant electricity theft in South Africa
    Next Article Bloody nose for MultiChoice in sports fight with eMedia

    Related Posts

    From stocks to crypto, markets reel as AI doubts grow

    From stocks to crypto, markets reel as AI doubts grow

    6 February 2026
    SABC Plus to flight Microsoft AI training videos

    SABC Plus to flight Microsoft AI training videos

    30 January 2026
    Cloud adoption the weak link in SA's digital government push: Microsoft - Vukani Mngxati

    Cloud adoption the weak link in SA’s digital government push: Microsoft

    29 January 2026
    Company News
    Customers have new expectations. Is your CX ready? 1Stream

    Customers have new expectations. Is your CX ready?

    19 February 2026
    South Africa's cybersecurity challenge is not a tool problem - Nicholas Applewhite, Trinexia South Africa

    South Africa’s cybersecurity challenge is not a tool problem

    19 February 2026
    The quiet infrastructure powering AI: why long-life IOT networks matter more than ever - Sigfox South Africa

    The quiet infrastructure powering AI: why long-life IoT networks matter more than ever

    18 February 2026
    Opinion
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Blu Label takes R5.2-billion Cell C hit, touts clean slate ahead

    Blu Label takes R5.2-billion Cell C hit, touts clean slate ahead

    19 February 2026
    MeerKAT detects most powerful natural radio laser ever observed

    MeerKAT detects most powerful natural radio laser ever observed

    19 February 2026
    How AI is rewriting the rules of consulting - Mark Allderman

    How AI is rewriting the rules of consulting

    19 February 2026
    Crackdown on students gambling away Nsfas money online

    Crackdown on students gambling away Nsfas money online

    19 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}