Small businesses are not immune to cyber threats, and, unfortunately, with them often not having the budgets to rival bigger organisations, it is essential that every resource available is utilised to its full potential. We have explored why your Microsoft 365 should be secure and just some of the many ways that cyber criminals can target and attack your system.
Throughout the blog we will explore what would happen if your accounts were breached, and some of the ways you can ensure security to avoid it happening.
Depending on the goals of the cyber criminal the outcomes of a breach may vary. At the most severe, these could include the following:
Microsoft, despite being a SaaS (Software-as-a-Service) solution (which means it has its own security and compliance features as a part of the infrastructure defences provided by Microsoft as part of the service you are paying for), the front-end user aspects - within your own control and outside of Microsoft’s, must be protected.
There are two areas that must be addressed in order to reduce your risk of becoming a victim of a cyber attack.
There are many ways to secure 365, but the main two areas to address are:
Technical defences exist within Microsoft 365 to overcome a variety of different security threats, including:
The users are the most important consideration when it comes to security, as the users of a system have the power to be either the cause of a breach or the most effective and last line of defence. Your system is fragile - it is as simple as a user clicking a link in the wrong email for the entire system to be jeopardized.
There are a number of risks posed by the way users access and interact with Microsoft 365 that depend upon:
Login security
The risks
Users often have accounts that are being secured with very basic common password formats. You must reduce the risk of individual user accounts being breached as a result of exposed credentials on the dark web.
Overcome the risks –
The defaults within Microsoft 365 are designed to direct you, the user, to employ a complex password. As it sounds, a complex password is one that cannot be easily guessed, is long, and is a random mixture of letters, numbers, and special characters.
The traditional approach to password practice has changed. The old practice was to enforce users to change passwords on a cycle of so many days or weeks, and in some cases enforcing passwords of ever greater length and complexity as and when you change. The recent approach has been rethought, enforcing longer passwords alongside a regular password renewal cycle which forces users to use old passwords with minute changes simply to be sure they remember them. This makes the whole process redundant as the account is no more secure than when they started the process.
The new approach, Multi-Factor Authentication (MFA)
MFA is the better approach. MFA is a second authentication step that takes place after a user has entered their password. Accounts are further secured by requesting the user input a code, which changes on a cycle – usually every few seconds or a couple of minutes – the code being provided to the user via their mobile device through text message or by accessing an authentication app. This method is constantly layering the security offered by needing multiple devices to gain access. This means the cyber criminal can have your password (although you must avoid this at all costs) and they still won’t be able to gain access.
MFA, among other login security best practices, can be enforced for your tenancy through Microsoft 365 security defaults.
To define security parameters that apply globally across all of your users, you can activate security defaults that enforce a number of policies automatically.
Security defaults are available to all users of Microsoft 365 at no extra cost, provided you are an organisation that utilises at least the free tier of the Azure Active Directory service.
Security defaults include:
How to implement security defaults on Microsoft 365?
In the next - and final - blog in the series we will explore other security measures you can take to ensure that your organisation’s cyber security is up to standard and capable of defending your systems against anything a cyber criminal can throw at it.
.
Our team of specialists at 1-Fix offer a range of business IT services ranging from desktop to server management, to network design and cyber security assistance. Our experts want to become a vital member of your team and help you strengthen the security of your Microsoft 365 ecosystem.
We can help you achieve a level of security that allows you to feel confident 100% of the time that you are not going to be a victim of a cyber attack. Please do not hesitate to contact the 1-Fix team for a conversation on any aspect of your IT.
All sign-ups are handled inline with our privacy policy and can unsubscribe at any time.
Thank you for contacting us.
We will get back to you as soon as possible.
Oops, there was an error sending your message.
Please try again later.
Company Registration Number: 06543233
Registered address:
1-Fix Limited
1F02 Arena Business Centre, 100 Berkshire Place, Winnersh Triangle, Wokingham, Berkshire RG41 5RD