Are You Cyber Safe? Protect Your Microsoft 365 Products from Online Threats – Part 1 

October 5, 2023

Be cyber safe: Anti Phishing and spoofing

Microsoft 365 is a cloud-based productivity suite that offers various applications and services for businesses. With Microsoft 365 being a cloud platform, you can work virtually anywhere with an internet connection. However, using Microsoft 365 also comes with certain security challenges and risks, such as data breaches, ransomware attacks, phishing scams, and identity theft. In this 2-part blog series, we are going to provide some tips and best practices to help safeguard your organization’s Microsoft 365 investment and sensitive data from increased risk of cyber threats: 

  • Use multi-factor authentication (MFA).  
    This is the best mitigation technique to protect against credential theft for Microsoft 365 administrators and users. MFA requires users to provide an additional factor of verification, such as a code sent to their phone or a biometric scan, in addition to their password. This way, even if a hacker obtains your password, they will not be able to access your account without the second factor. You can enable MFA for your Microsoft 365 users in the Entra ID portal. 
  • Train your organization’s employees. 
    Human error is one of the main causes of security incidents in Microsoft 365. Therefore, you should educate your employees with cyber security awareness training. This will teach them how to recognize and avoid phishing emails and other malicious messages that may try to trick them into revealing their credentials, downloading malware, or clicking malicious links. They should also know to use strong passwords, report suspicious activities, and follow your organization’s security policies. Your organization cannot be cyber safe if your employees are not aware of organizational safety practices.
  • Protect global admins from compromise and use the principle of “least privilege”. 
    Global admins are the most powerful users in your Microsoft 365 environment, as they have access to all settings and data. Therefore, you should limit the number of global admins in your organization and protect them with MFA and strong passwords. You should also follow the principle of “least privilege,” which grants users the minimum level of access they need to perform their tasks. This way, you can reduce the attack surface and the potential impact of a breach. You can manage user roles and permissions in the Microsoft 365 admin Centre, but I prefer to use the Privileged Identity Management feature in the Entra ID Portal for even better control over role assignments 
  • Enable unified audit logging in the Security and Compliance Centre.  
    Unified audit logging allows you to track and monitor user and admin activities across your Microsoft 365 services, such as Exchange Online, SharePoint Online, OneDrive for Business, Teams, and more. This can help you detect and investigate suspicious or malicious actions, such as unauthorized access, data exfiltration, or configuration changes. You can enable unified audit logging in the Security and Compliance Centre. 
  • Enable alerting capabilities of the Security and Compliance Centers.  
    Alerting capabilities allow you to receive notifications when certain events or conditions occur in your Microsoft 365 environment, such as malware detection, sign-in failures, or policy violations. This can help you respond quickly and take appropriate actions to mitigate or prevent threats. You can configure alerts in the Security and Compliance Centre or the Microsoft 365 Defender portal. 
  • Consider Microsoft Defender for Office 365 Plan 1 or Plan 2 for additional protection. 
    Microsoft Defender for Office 365 is an advanced email protection solution that provides additional layers of security, control, and investigation for your Microsoft 365 email. Depending on your subscription plan, you can enable features such as Safe Attachments, Safe Links, anti-phishing policies, anti-spoofing policies, attack simulator, threat explorer, threat trackers, automated investigation and response (AIR), and more. These features can help you prevent, detect, and respond to sophisticated email attacks that may bypass the basic protection of EOP. You can enable Microsoft Defender for Office 365 features in the Security and Compliance Centre or the Microsoft 365 Defender portal. 

We hope the following suggestions have provided you with additional methods to safeguard your organization’s online information. Being cyber safe is crucial to the well-being of any organization. We will be releasing Part 2 of our cyber safety series next week. Make sure to follow our blog and subscribe to our newsletter so you don’t miss out.  

Roy Polvorosa is an expert in Microsoft 365 products, and how to implement them so your organization will be cyber safe.

Discover More

Anti Phishing and spoofing

Unmasking the Threat: Phishing & Spoofed Emails

Darwin MagpayoMay 24, 20236 min read

With the evolution of technologies today, there have been many incidents of users falling for spoofing and phishing emails. According to phishing email statistics, approximately 3.4 billion spam emails are…

Microsoft CoPilot visual

Microsoft Copilot for Power BI 

Kyle ThorburnMay 17, 20234 min read

CoPilot is the ultimate Power BI companion. It helps you quickly and easily create stunning visuals, analyze data, and share insights with your team. With CoPilot, you can take your…

AI low code development

How to Utilize AI-Infused, Low-Code Development Tools in Microsoft Power Apps and Power Automate 

Stephan AlexanderMay 4, 20236 min read

Power Apps and Automate are the perfect tools for low-code development. With AI-infused features, you can quickly create custom apps and automate processes with minimal effort. Get started today and…

Let’s build something amazing together

From concept to handoff, we’d love to learn more about what you are working on.
Send us a message below or call us at 1-800-989-6022.