SlideShare a Scribd company logo
1 of 28
Download to read offline
The Best Practices for Full Protection
Account Takeover
Microsoft Office 365 is transforming
the way organisations work.
As cloud adoption accelerates, many businesses are now facing the
ultimatum: adopt, migrate or risk irrelevancy. Within the past year, 70% of
Fortune 500 companies have purchased Office 365.
The biggest draw? Cost efficiency, remote access and cloud back up,
allowing employees to work effectively and collaborate in real-time with
guaranteed security – or is it?
Alongside the advantages of Office 365 come
a range of challenges and the shortfalls.
Recently, Barracuda Networks reported hackers were successful in
targeting Microsoft Office 365 accounts. 29% of organisations had their
Office 365 accounts compromised by hackers in March 2019 alone.
In light of this, and many other incidents, the US Cybersecurity and
Infrastructure Security Agency (CISA), is pleading with organisations to
implement better practices when using Office 365 across their enterprises.
UK government officials are following suit, making a similar plea to help
reduce the frequency of account takeover attacks.
In this guide, we are exploring inherent risks
within Office 365 and the best practices
to safeguard against them.
It is clear that whilst many businesses are ready to implement software
such as Office 365, they do not fully comprehend the breadth of potential
attacks or their organisation’s susceptibility to them.
Ultimately, organisations are failing to deploy the right safety measures to
protect their cloud-based data. In fact, what’s concerning is that 40% of
IT leaders believe Microsoft provides the capabilities to fully protect their
Office 365 environments.
Common Types of Attacks
There are threeThere are three
common hackingcommon hacking
techniques usedtechniques used
to gain accessto gain access
to Office 365to Office 365
accountsaccounts
Brute Force Attacks
01
Spear Phishing
02
Dark Web
03
Brute Force Attacks
01
Brute force attacks are a trial and error method used by hackers, involving an exercise
of what you could call password guessing, and executed using automation.
In attacks on Office 365 accounts, brute force techniques use an automated
software to generate consecutive guesses to unlock encrypted data.
Attackers often target specific individuals in organisations rather than the whole
organisation or multiple employees. This method is effective and successful as it
primarily reduces the chances of attack detection by the cloud service provider.
Spear Phishing
02
Spear phishing is a personalised attack, targeting organisations or individuals. Hackers
usually impersonate a well-known brand – 32% of brand impersonation attacks
impersonate Office 365 – and ask users to urgently take action.
Hackers use this technique to entice victims to click on a link which then
redirects them to a spoofed login page.
Here they are asked to provide log in credentials or other sensitive data. This login
page then allows the actor to harvest victim Office 365 credentials usually for
financial gain.
Dark Web
03
The dark web is a wild west when it comes to security.
An unimaginable amount of log-in details are available on the dark web, all of
which have been collected from years of data breaches.
Hackers purchase these details and use them to log in to accounts and take them over.
Users open themselves up to this kind of attack by using the same password across
personal and business accounts. It’s only a matter of time until a hacker purchases
your users’ passwords and attempts to take over your business accounts.
What are the best practices for
protecting your Office 365?
Being that Office 365Being that Office 365
account-takeoveraccount-takeover
attacks have become soattacks have become so
prevalent, and lucrative,prevalent, and lucrative,
it is worth talking aboutit is worth talking about
how these attackshow these attacks
happen and what can behappen and what can be
done to prevent them.done to prevent them.
The overall governance
of your Office 365
environment has less to
do with the technology
and more to do with the
practices and procedures
put in place by your
organisation.
Training and Education
Best Practice 1
Ultimately, you need to promote a culture of email security within your
company to fully combat fraud and cyber-crime.
Make email security and data protection everyone’s responsibility. Educate
your workforce and ensure they take a proactive approach to email
security.
If your workforce stays vigilant, your organisation can head off most email
threats.
To limit the impact and frequency of account takeover attacks,
you need to educate your employees.
Teach your employees about what account takeover attacks are, how
they occur, and what steps they can take to limit chances of falling victim.
For instance, your training sessions should address how often employees
should change their passwords (and that they shouldn’t reuse passwords,
ever).
It should also hammer home that you should never click on a link that asks
you to enter your Office 365 login details – it is far better to launch your
browser and head to your account that way.
Finally, encourage your employees to stay vigilant: ask them to look out
for suspicious requests from colleagues or partners, and to report any odd
behaviour immediately.
Where organisations go wrong is regarding
employee training as a one-off box ticking exercise.
What’s needed are frequent training sessions, ensuring
the organisation is up to date with the ever-changing and
sophisticated techniques that hackers adopt.
Multi-Factor Authentication
Best Practice 2
Office 365 is designed for remote access.
In addition, targeting one employee, rather than the whole organisation
reduces the chances of detection once cybercriminals gain access, making it
easy to infiltrate from the inside.
When hackers adopt automation to make these password guesses, it’s known
as a brute force attack. As stated earlier, employees often use the same
password across multiple platforms, increasing hackers’ chances in guessing
passwords and gaining access to a plethora of information.
Unauthorised access to accounts is not often monitored
or instantly detected, making it easy for hackers
to attempt multiple logins to gain access.
After employees sign into the platform with their usual password, it allows
a second factor to further authenticate the sign in and ensure it is genuine.
This could be in the form of another password, a number-sequenced code
from an authenticator app or text message, or by using biometrics such as
a fingerprint.
Multi-factor Authentication (MFA) provides a much-needed
layer for protection to Office 365 platforms.
Leverage Artificial Intelligence
Best Practice 3
By leveraging advance technologies such as Artificial Intelligence (AI),
organisations can easily identify when accounts have been compromised,
not only alerting users but removing malicious emails sent from
compromised accounts.
By 2021, Gartner predicts that AI will create $2.9 trillion of business value
and 6.2 billion hours of worker productivity globally. Securing organisations
whilst driving transformation is an increasing challenge. The amount of
data organisations deal with is expanding at an unprecedented rate and
becoming more valuable at each turn.
Whilst threats and methods attackers use become more sophisticated,
so do flexible work cultures. Increasing security risks and warranting
organisations to do more. With AI, organisations can automate and
leverage AI capabilities, uncovering hidden insights and actively monitoring
undetectable threats.
AI can help to secure organisations against increasing threats
and the risks caused by pervasive attacks that capitalise
on increasing workplace flexibility.
Use Dedicated Administration Accounts
Best Practice 4
A quick win and sure-fire way to mitigate the risk of potential attacks is
using dedicated administration accounts. These must be role specific,
granting access to only those that need it.
What access do each of your employees need, or specifically what access
does their role require?
Ensuring when an account is breached, the malicious actor doesn’t gain
access to unnecessary resources.
Limiting access inherently protects your organisation
when a breach occurs.
Enhancing Security with
Artificial Intelligence
Best Practice 5
With account takeover attacks occurring at such a frequent rate – one in
every three Office 365 customers suffer from an account takeover attack
every month – there is only one way to enhance your security protocols
reliably: Artificial Intelligence (AI).
Products like Barracuda’s Sentinel seamlessly integrate with Office 365
APIs to detect attacks and malicious intent coming from both internal and
external sources, without IT administration. These AI solutions analyse
historical and inbound data to identify anomalies and flag fraudulent
emails. This reduces the chance of employees clicking on malicious URLs
and attachments.
Taking advantage of the ability to plug into third-party applications
to improve the security of a Microsoft Office 365 platform will
enhance the protection of critical data being stored across the
cloud service, all while allowing employees to go about their
day-to-day business without disruption.
Does your current
email security
capabilities meet
your requirements?
If not, why not
consider a third
party solution like
Barracuda Sentinel
to enhance your
Office 365 security?
Learn more about fully protecting your
network and our other solutions at
Intelligent Inbox
Visit

More Related Content

What's hot

ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_readingseadeloitte
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud SchemeEcommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud SchemeDigital Shadows
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021Bruce Ma
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析Jordan Pan
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationDigital Shadows
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 

What's hot (20)

ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud SchemeEcommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud Scheme
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
50120130406020
5012013040602050120130406020
50120130406020
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets Organization
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Similar to Account Takeover: The Best Practices for Full Protection

Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfEnterprise Insider
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfgokuforhelp
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftAppsian
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docxArindamGhosal6
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxArindamGhosal6
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfGroovy Web
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxjaggernaoma
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 

Similar to Account Takeover: The Best Practices for Full Protection (20)

Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 

Recently uploaded

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 

Recently uploaded (20)

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 

Account Takeover: The Best Practices for Full Protection

  • 1. The Best Practices for Full Protection Account Takeover
  • 2. Microsoft Office 365 is transforming the way organisations work. As cloud adoption accelerates, many businesses are now facing the ultimatum: adopt, migrate or risk irrelevancy. Within the past year, 70% of Fortune 500 companies have purchased Office 365. The biggest draw? Cost efficiency, remote access and cloud back up, allowing employees to work effectively and collaborate in real-time with guaranteed security – or is it?
  • 3. Alongside the advantages of Office 365 come a range of challenges and the shortfalls. Recently, Barracuda Networks reported hackers were successful in targeting Microsoft Office 365 accounts. 29% of organisations had their Office 365 accounts compromised by hackers in March 2019 alone. In light of this, and many other incidents, the US Cybersecurity and Infrastructure Security Agency (CISA), is pleading with organisations to implement better practices when using Office 365 across their enterprises. UK government officials are following suit, making a similar plea to help reduce the frequency of account takeover attacks.
  • 4. In this guide, we are exploring inherent risks within Office 365 and the best practices to safeguard against them. It is clear that whilst many businesses are ready to implement software such as Office 365, they do not fully comprehend the breadth of potential attacks or their organisation’s susceptibility to them. Ultimately, organisations are failing to deploy the right safety measures to protect their cloud-based data. In fact, what’s concerning is that 40% of IT leaders believe Microsoft provides the capabilities to fully protect their Office 365 environments.
  • 5. Common Types of Attacks
  • 6. There are threeThere are three common hackingcommon hacking techniques usedtechniques used to gain accessto gain access to Office 365to Office 365 accountsaccounts Brute Force Attacks 01 Spear Phishing 02 Dark Web 03
  • 7. Brute Force Attacks 01 Brute force attacks are a trial and error method used by hackers, involving an exercise of what you could call password guessing, and executed using automation. In attacks on Office 365 accounts, brute force techniques use an automated software to generate consecutive guesses to unlock encrypted data. Attackers often target specific individuals in organisations rather than the whole organisation or multiple employees. This method is effective and successful as it primarily reduces the chances of attack detection by the cloud service provider.
  • 8. Spear Phishing 02 Spear phishing is a personalised attack, targeting organisations or individuals. Hackers usually impersonate a well-known brand – 32% of brand impersonation attacks impersonate Office 365 – and ask users to urgently take action. Hackers use this technique to entice victims to click on a link which then redirects them to a spoofed login page. Here they are asked to provide log in credentials or other sensitive data. This login page then allows the actor to harvest victim Office 365 credentials usually for financial gain.
  • 9. Dark Web 03 The dark web is a wild west when it comes to security. An unimaginable amount of log-in details are available on the dark web, all of which have been collected from years of data breaches. Hackers purchase these details and use them to log in to accounts and take them over. Users open themselves up to this kind of attack by using the same password across personal and business accounts. It’s only a matter of time until a hacker purchases your users’ passwords and attempts to take over your business accounts.
  • 10. What are the best practices for protecting your Office 365?
  • 11. Being that Office 365Being that Office 365 account-takeoveraccount-takeover attacks have become soattacks have become so prevalent, and lucrative,prevalent, and lucrative, it is worth talking aboutit is worth talking about how these attackshow these attacks happen and what can behappen and what can be done to prevent them.done to prevent them. The overall governance of your Office 365 environment has less to do with the technology and more to do with the practices and procedures put in place by your organisation.
  • 13. Ultimately, you need to promote a culture of email security within your company to fully combat fraud and cyber-crime. Make email security and data protection everyone’s responsibility. Educate your workforce and ensure they take a proactive approach to email security. If your workforce stays vigilant, your organisation can head off most email threats. To limit the impact and frequency of account takeover attacks, you need to educate your employees.
  • 14. Teach your employees about what account takeover attacks are, how they occur, and what steps they can take to limit chances of falling victim. For instance, your training sessions should address how often employees should change their passwords (and that they shouldn’t reuse passwords, ever). It should also hammer home that you should never click on a link that asks you to enter your Office 365 login details – it is far better to launch your browser and head to your account that way. Finally, encourage your employees to stay vigilant: ask them to look out for suspicious requests from colleagues or partners, and to report any odd behaviour immediately.
  • 15. Where organisations go wrong is regarding employee training as a one-off box ticking exercise. What’s needed are frequent training sessions, ensuring the organisation is up to date with the ever-changing and sophisticated techniques that hackers adopt.
  • 17. Office 365 is designed for remote access. In addition, targeting one employee, rather than the whole organisation reduces the chances of detection once cybercriminals gain access, making it easy to infiltrate from the inside. When hackers adopt automation to make these password guesses, it’s known as a brute force attack. As stated earlier, employees often use the same password across multiple platforms, increasing hackers’ chances in guessing passwords and gaining access to a plethora of information. Unauthorised access to accounts is not often monitored or instantly detected, making it easy for hackers to attempt multiple logins to gain access.
  • 18. After employees sign into the platform with their usual password, it allows a second factor to further authenticate the sign in and ensure it is genuine. This could be in the form of another password, a number-sequenced code from an authenticator app or text message, or by using biometrics such as a fingerprint. Multi-factor Authentication (MFA) provides a much-needed layer for protection to Office 365 platforms.
  • 20. By leveraging advance technologies such as Artificial Intelligence (AI), organisations can easily identify when accounts have been compromised, not only alerting users but removing malicious emails sent from compromised accounts. By 2021, Gartner predicts that AI will create $2.9 trillion of business value and 6.2 billion hours of worker productivity globally. Securing organisations whilst driving transformation is an increasing challenge. The amount of data organisations deal with is expanding at an unprecedented rate and becoming more valuable at each turn.
  • 21. Whilst threats and methods attackers use become more sophisticated, so do flexible work cultures. Increasing security risks and warranting organisations to do more. With AI, organisations can automate and leverage AI capabilities, uncovering hidden insights and actively monitoring undetectable threats. AI can help to secure organisations against increasing threats and the risks caused by pervasive attacks that capitalise on increasing workplace flexibility.
  • 22. Use Dedicated Administration Accounts Best Practice 4
  • 23. A quick win and sure-fire way to mitigate the risk of potential attacks is using dedicated administration accounts. These must be role specific, granting access to only those that need it. What access do each of your employees need, or specifically what access does their role require? Ensuring when an account is breached, the malicious actor doesn’t gain access to unnecessary resources. Limiting access inherently protects your organisation when a breach occurs.
  • 24. Enhancing Security with Artificial Intelligence Best Practice 5
  • 25. With account takeover attacks occurring at such a frequent rate – one in every three Office 365 customers suffer from an account takeover attack every month – there is only one way to enhance your security protocols reliably: Artificial Intelligence (AI). Products like Barracuda’s Sentinel seamlessly integrate with Office 365 APIs to detect attacks and malicious intent coming from both internal and external sources, without IT administration. These AI solutions analyse historical and inbound data to identify anomalies and flag fraudulent emails. This reduces the chance of employees clicking on malicious URLs and attachments.
  • 26. Taking advantage of the ability to plug into third-party applications to improve the security of a Microsoft Office 365 platform will enhance the protection of critical data being stored across the cloud service, all while allowing employees to go about their day-to-day business without disruption.
  • 27. Does your current email security capabilities meet your requirements? If not, why not consider a third party solution like Barracuda Sentinel to enhance your Office 365 security?
  • 28. Learn more about fully protecting your network and our other solutions at Intelligent Inbox Visit