Securing Your Organisation’s Office 365 Environment

The number of cyber-attacks targeting Office 365 (O365) are on the rise. However, despite warnings from the UK’s National Cyber Security Centre, many organisations aren’t fully aware of the risks or struggle to know how to best defend their business against them. By Chester Avey

If your business uses O365 or is considering migrating to the service, then here’s some top tips to help keep your business secure.

Enforce multi-factor authentication 
It is often the smallest things that make the biggest difference to your cyber security – and one of the best, and simplest, ways to secure O365 is through the use of multi-factor authentication (MFA). With MFA enabled, all your organisation’s O365 users will be sent a code to their mobile phone when they try to log in to their account; meaning that in the event that a criminal is able to obtain a user’s password, the person will not be able to access to the account.

It is actually very easy to set up multi-factor authentication in O365 and while it elongates the procedure of logging in, it is certainly worth it due to the extra layer of security it provides. 

Manage from dedicated admin accounts
Some businesses make the mistake of using a single account to administrator O365. While this is often more convenient way of working it actually significantly increases overall cyber security risk. If an administrator account is compromised, criminals will likely obtain access to the whole environment.

It is a much better idea then, to keep administrative accounts separate to the ones used on a day-to-day basis. To reduce the risk of an admin falling foul of a phishing, it’s also advisable that these accounts are not set up with a licensed mailbox. 

Use full mailbox audit logging
Another way to improve O365 security is to activate full audit logging – which will help to improve visibility of user actions across your whole environment. This includes visibility of which users are logging in and from where. 
You can then use network and endpoint monitoring systems like SIEM in order to help detect threats and respond to them by improving the effectiveness of the identification of tactics and techniques used by cybercriminals.  

Provide staff with training
One of the most valuable things that any organisation can do to improve the security of O365, is to provide cyber awareness training to staff. People continue to be the weak link in the cyber security chain so improving knowledge can be an extremely valuable thing to do. 

Of course, it is essential that this training is regularly updated to recognise the latest security risks, such as phishing attacks against O365 users. 

Disable email auto forwarding
In the event that a hacker is able to gain access to a user’s O365 account and mailbox, a common tactic is to send copies of any incoming emails to another address. This allows them to continue to eavesdrop on communications should they lose access to the account.

Nevertheless, this kind of attack could mean the loss of sensitive data. Thankfully this type of action can easily be prevented by the creation of a mail transport rule in the O365 admin centre to block users from being able to auto-forward emails to external accounts. 

Check Cloud Solution Provider access

If your organisation bought its O365 subscription through a Cloud Solution Provider (CSP), check to see whether that partner has access to the environment. Many CSPs receive access by default and are now being targeted by cyber criminals for this reason.  One recent example is an attack on PSM, a US cloud company.

Additional steps to take

Before you decide upon whether to invest in supplementary technology from Microsoft to further improve the security of O365, it is worth evaluating the many third-party tools available. To help you do this, consider consulting with cloud management and monitoring specialists who can provide the extra technology, support and expertise you need to further enhance your organisation’s security.

It could also be hugely beneficial to commission penetration testing to help detect and address vulnerabilities such as those relating to insecure network and system configurations.

Chester Avey is an independent business consultant:     

You Might Also Read: 

Dealing With Malicious Emails:

 

 

« Cyber Crime In Britain
Psycho-Cyberchology »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.