SlideShare a Scribd company logo
The Best Practices for Full Protection
Account Takeover
Microsoft Office 365 is transforming
the way organisations work.
As cloud adoption accelerates, many businesses are now facing the
ultimatum: adopt, migrate or risk irrelevancy. Within the past year, 70% of
Fortune 500 companies have purchased Office 365.
The biggest draw? Cost efficiency, remote access and cloud back up,
allowing employees to work effectively and collaborate in real-time with
guaranteed security – or is it?
Alongside the advantages of Office 365 come
a range of challenges and the shortfalls.
Recently, Barracuda Networks reported hackers were successful in
targeting Microsoft Office 365 accounts. 29% of organisations had their
Office 365 accounts compromised by hackers in March 2019 alone.
In light of this, and many other incidents, the US Cybersecurity and
Infrastructure Security Agency (CISA), is pleading with organisations to
implement better practices when using Office 365 across their enterprises.
UK government officials are following suit, making a similar plea to help
reduce the frequency of account takeover attacks.
In this guide, we are exploring inherent risks
within Office 365 and the best practices
to safeguard against them.
It is clear that whilst many businesses are ready to implement software
such as Office 365, they do not fully comprehend the breadth of potential
attacks or their organisation’s susceptibility to them.
Ultimately, organisations are failing to deploy the right safety measures to
protect their cloud-based data. In fact, what’s concerning is that 40% of
IT leaders believe Microsoft provides the capabilities to fully protect their
Office 365 environments.
Common Types of Attacks
There are threeThere are three
common hackingcommon hacking
techniques usedtechniques used
to gain accessto gain access
to Office 365to Office 365
accountsaccounts
Brute Force Attacks
01
Spear Phishing
02
Dark Web
03
Brute Force Attacks
01
Brute force attacks are a trial and error method used by hackers, involving an exercise
of what you could call password guessing, and executed using automation.
In attacks on Office 365 accounts, brute force techniques use an automated
software to generate consecutive guesses to unlock encrypted data.
Attackers often target specific individuals in organisations rather than the whole
organisation or multiple employees. This method is effective and successful as it
primarily reduces the chances of attack detection by the cloud service provider.
Spear Phishing
02
Spear phishing is a personalised attack, targeting organisations or individuals. Hackers
usually impersonate a well-known brand – 32% of brand impersonation attacks
impersonate Office 365 – and ask users to urgently take action.
Hackers use this technique to entice victims to click on a link which then
redirects them to a spoofed login page.
Here they are asked to provide log in credentials or other sensitive data. This login
page then allows the actor to harvest victim Office 365 credentials usually for
financial gain.
Dark Web
03
The dark web is a wild west when it comes to security.
An unimaginable amount of log-in details are available on the dark web, all of
which have been collected from years of data breaches.
Hackers purchase these details and use them to log in to accounts and take them over.
Users open themselves up to this kind of attack by using the same password across
personal and business accounts. It’s only a matter of time until a hacker purchases
your users’ passwords and attempts to take over your business accounts.
What are the best practices for
protecting your Office 365?
Being that Office 365Being that Office 365
account-takeoveraccount-takeover
attacks have become soattacks have become so
prevalent, and lucrative,prevalent, and lucrative,
it is worth talking aboutit is worth talking about
how these attackshow these attacks
happen and what can behappen and what can be
done to prevent them.done to prevent them.
The overall governance
of your Office 365
environment has less to
do with the technology
and more to do with the
practices and procedures
put in place by your
organisation.
Training and Education
Best Practice 1
Ultimately, you need to promote a culture of email security within your
company to fully combat fraud and cyber-crime.
Make email security and data protection everyone’s responsibility. Educate
your workforce and ensure they take a proactive approach to email
security.
If your workforce stays vigilant, your organisation can head off most email
threats.
To limit the impact and frequency of account takeover attacks,
you need to educate your employees.
Teach your employees about what account takeover attacks are, how
they occur, and what steps they can take to limit chances of falling victim.
For instance, your training sessions should address how often employees
should change their passwords (and that they shouldn’t reuse passwords,
ever).
It should also hammer home that you should never click on a link that asks
you to enter your Office 365 login details – it is far better to launch your
browser and head to your account that way.
Finally, encourage your employees to stay vigilant: ask them to look out
for suspicious requests from colleagues or partners, and to report any odd
behaviour immediately.
Where organisations go wrong is regarding
employee training as a one-off box ticking exercise.
What’s needed are frequent training sessions, ensuring
the organisation is up to date with the ever-changing and
sophisticated techniques that hackers adopt.
Multi-Factor Authentication
Best Practice 2
Office 365 is designed for remote access.
In addition, targeting one employee, rather than the whole organisation
reduces the chances of detection once cybercriminals gain access, making it
easy to infiltrate from the inside.
When hackers adopt automation to make these password guesses, it’s known
as a brute force attack. As stated earlier, employees often use the same
password across multiple platforms, increasing hackers’ chances in guessing
passwords and gaining access to a plethora of information.
Unauthorised access to accounts is not often monitored
or instantly detected, making it easy for hackers
to attempt multiple logins to gain access.
After employees sign into the platform with their usual password, it allows
a second factor to further authenticate the sign in and ensure it is genuine.
This could be in the form of another password, a number-sequenced code
from an authenticator app or text message, or by using biometrics such as
a fingerprint.
Multi-factor Authentication (MFA) provides a much-needed
layer for protection to Office 365 platforms.
Leverage Artificial Intelligence
Best Practice 3
By leveraging advance technologies such as Artificial Intelligence (AI),
organisations can easily identify when accounts have been compromised,
not only alerting users but removing malicious emails sent from
compromised accounts.
By 2021, Gartner predicts that AI will create $2.9 trillion of business value
and 6.2 billion hours of worker productivity globally. Securing organisations
whilst driving transformation is an increasing challenge. The amount of
data organisations deal with is expanding at an unprecedented rate and
becoming more valuable at each turn.
Whilst threats and methods attackers use become more sophisticated,
so do flexible work cultures. Increasing security risks and warranting
organisations to do more. With AI, organisations can automate and
leverage AI capabilities, uncovering hidden insights and actively monitoring
undetectable threats.
AI can help to secure organisations against increasing threats
and the risks caused by pervasive attacks that capitalise
on increasing workplace flexibility.
Use Dedicated Administration Accounts
Best Practice 4
A quick win and sure-fire way to mitigate the risk of potential attacks is
using dedicated administration accounts. These must be role specific,
granting access to only those that need it.
What access do each of your employees need, or specifically what access
does their role require?
Ensuring when an account is breached, the malicious actor doesn’t gain
access to unnecessary resources.
Limiting access inherently protects your organisation
when a breach occurs.
Enhancing Security with
Artificial Intelligence
Best Practice 5
With account takeover attacks occurring at such a frequent rate – one in
every three Office 365 customers suffer from an account takeover attack
every month – there is only one way to enhance your security protocols
reliably: Artificial Intelligence (AI).
Products like Barracuda’s Sentinel seamlessly integrate with Office 365
APIs to detect attacks and malicious intent coming from both internal and
external sources, without IT administration. These AI solutions analyse
historical and inbound data to identify anomalies and flag fraudulent
emails. This reduces the chance of employees clicking on malicious URLs
and attachments.
Taking advantage of the ability to plug into third-party applications
to improve the security of a Microsoft Office 365 platform will
enhance the protection of critical data being stored across the
cloud service, all while allowing employees to go about their
day-to-day business without disruption.
Does your current
email security
capabilities meet
your requirements?
If not, why not
consider a third
party solution like
Barracuda Sentinel
to enhance your
Office 365 security?
Learn more about fully protecting your
network and our other solutions at
Intelligent Inbox
Visit

More Related Content

What's hot

ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
seadeloitte
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
seadeloitte
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
EMC
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
EMC
 
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud SchemeEcommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Digital Shadows
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
Bruce Ma
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
Blue Cross Blue Shield of Michigan
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
EMC
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
AM Publications,India
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
Jordan Pan
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets Organization
Digital Shadows
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
Proofpoint
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
Nathan CAVRIL
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Seqrite
 

What's hot (20)

ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud SchemeEcommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud Scheme
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
50120130406020
5012013040602050120130406020
50120130406020
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets Organization
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Similar to Account Takeover: The Best Practices for Full Protection

Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
Enterprise Insider
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
SOCVault
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
Arun Chinnaraju MBA, PMP, CSM, CSPO, SA
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
gokuforhelp
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
Appsian
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber security professional services- Detox techno
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
BurCom Consulting Ltd.
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
ArindamGhosal6
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
ArindamGhosal6
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
Caroline Johnson
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
Groovy Web
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
David X Martin
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
saivarun91
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
jaggernaoma
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 

Similar to Account Takeover: The Best Practices for Full Protection (20)

Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 

Recently uploaded

Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 

Recently uploaded (20)

Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 

Account Takeover: The Best Practices for Full Protection

  • 1. The Best Practices for Full Protection Account Takeover
  • 2. Microsoft Office 365 is transforming the way organisations work. As cloud adoption accelerates, many businesses are now facing the ultimatum: adopt, migrate or risk irrelevancy. Within the past year, 70% of Fortune 500 companies have purchased Office 365. The biggest draw? Cost efficiency, remote access and cloud back up, allowing employees to work effectively and collaborate in real-time with guaranteed security – or is it?
  • 3. Alongside the advantages of Office 365 come a range of challenges and the shortfalls. Recently, Barracuda Networks reported hackers were successful in targeting Microsoft Office 365 accounts. 29% of organisations had their Office 365 accounts compromised by hackers in March 2019 alone. In light of this, and many other incidents, the US Cybersecurity and Infrastructure Security Agency (CISA), is pleading with organisations to implement better practices when using Office 365 across their enterprises. UK government officials are following suit, making a similar plea to help reduce the frequency of account takeover attacks.
  • 4. In this guide, we are exploring inherent risks within Office 365 and the best practices to safeguard against them. It is clear that whilst many businesses are ready to implement software such as Office 365, they do not fully comprehend the breadth of potential attacks or their organisation’s susceptibility to them. Ultimately, organisations are failing to deploy the right safety measures to protect their cloud-based data. In fact, what’s concerning is that 40% of IT leaders believe Microsoft provides the capabilities to fully protect their Office 365 environments.
  • 5. Common Types of Attacks
  • 6. There are threeThere are three common hackingcommon hacking techniques usedtechniques used to gain accessto gain access to Office 365to Office 365 accountsaccounts Brute Force Attacks 01 Spear Phishing 02 Dark Web 03
  • 7. Brute Force Attacks 01 Brute force attacks are a trial and error method used by hackers, involving an exercise of what you could call password guessing, and executed using automation. In attacks on Office 365 accounts, brute force techniques use an automated software to generate consecutive guesses to unlock encrypted data. Attackers often target specific individuals in organisations rather than the whole organisation or multiple employees. This method is effective and successful as it primarily reduces the chances of attack detection by the cloud service provider.
  • 8. Spear Phishing 02 Spear phishing is a personalised attack, targeting organisations or individuals. Hackers usually impersonate a well-known brand – 32% of brand impersonation attacks impersonate Office 365 – and ask users to urgently take action. Hackers use this technique to entice victims to click on a link which then redirects them to a spoofed login page. Here they are asked to provide log in credentials or other sensitive data. This login page then allows the actor to harvest victim Office 365 credentials usually for financial gain.
  • 9. Dark Web 03 The dark web is a wild west when it comes to security. An unimaginable amount of log-in details are available on the dark web, all of which have been collected from years of data breaches. Hackers purchase these details and use them to log in to accounts and take them over. Users open themselves up to this kind of attack by using the same password across personal and business accounts. It’s only a matter of time until a hacker purchases your users’ passwords and attempts to take over your business accounts.
  • 10. What are the best practices for protecting your Office 365?
  • 11. Being that Office 365Being that Office 365 account-takeoveraccount-takeover attacks have become soattacks have become so prevalent, and lucrative,prevalent, and lucrative, it is worth talking aboutit is worth talking about how these attackshow these attacks happen and what can behappen and what can be done to prevent them.done to prevent them. The overall governance of your Office 365 environment has less to do with the technology and more to do with the practices and procedures put in place by your organisation.
  • 13. Ultimately, you need to promote a culture of email security within your company to fully combat fraud and cyber-crime. Make email security and data protection everyone’s responsibility. Educate your workforce and ensure they take a proactive approach to email security. If your workforce stays vigilant, your organisation can head off most email threats. To limit the impact and frequency of account takeover attacks, you need to educate your employees.
  • 14. Teach your employees about what account takeover attacks are, how they occur, and what steps they can take to limit chances of falling victim. For instance, your training sessions should address how often employees should change their passwords (and that they shouldn’t reuse passwords, ever). It should also hammer home that you should never click on a link that asks you to enter your Office 365 login details – it is far better to launch your browser and head to your account that way. Finally, encourage your employees to stay vigilant: ask them to look out for suspicious requests from colleagues or partners, and to report any odd behaviour immediately.
  • 15. Where organisations go wrong is regarding employee training as a one-off box ticking exercise. What’s needed are frequent training sessions, ensuring the organisation is up to date with the ever-changing and sophisticated techniques that hackers adopt.
  • 17. Office 365 is designed for remote access. In addition, targeting one employee, rather than the whole organisation reduces the chances of detection once cybercriminals gain access, making it easy to infiltrate from the inside. When hackers adopt automation to make these password guesses, it’s known as a brute force attack. As stated earlier, employees often use the same password across multiple platforms, increasing hackers’ chances in guessing passwords and gaining access to a plethora of information. Unauthorised access to accounts is not often monitored or instantly detected, making it easy for hackers to attempt multiple logins to gain access.
  • 18. After employees sign into the platform with their usual password, it allows a second factor to further authenticate the sign in and ensure it is genuine. This could be in the form of another password, a number-sequenced code from an authenticator app or text message, or by using biometrics such as a fingerprint. Multi-factor Authentication (MFA) provides a much-needed layer for protection to Office 365 platforms.
  • 20. By leveraging advance technologies such as Artificial Intelligence (AI), organisations can easily identify when accounts have been compromised, not only alerting users but removing malicious emails sent from compromised accounts. By 2021, Gartner predicts that AI will create $2.9 trillion of business value and 6.2 billion hours of worker productivity globally. Securing organisations whilst driving transformation is an increasing challenge. The amount of data organisations deal with is expanding at an unprecedented rate and becoming more valuable at each turn.
  • 21. Whilst threats and methods attackers use become more sophisticated, so do flexible work cultures. Increasing security risks and warranting organisations to do more. With AI, organisations can automate and leverage AI capabilities, uncovering hidden insights and actively monitoring undetectable threats. AI can help to secure organisations against increasing threats and the risks caused by pervasive attacks that capitalise on increasing workplace flexibility.
  • 22. Use Dedicated Administration Accounts Best Practice 4
  • 23. A quick win and sure-fire way to mitigate the risk of potential attacks is using dedicated administration accounts. These must be role specific, granting access to only those that need it. What access do each of your employees need, or specifically what access does their role require? Ensuring when an account is breached, the malicious actor doesn’t gain access to unnecessary resources. Limiting access inherently protects your organisation when a breach occurs.
  • 24. Enhancing Security with Artificial Intelligence Best Practice 5
  • 25. With account takeover attacks occurring at such a frequent rate – one in every three Office 365 customers suffer from an account takeover attack every month – there is only one way to enhance your security protocols reliably: Artificial Intelligence (AI). Products like Barracuda’s Sentinel seamlessly integrate with Office 365 APIs to detect attacks and malicious intent coming from both internal and external sources, without IT administration. These AI solutions analyse historical and inbound data to identify anomalies and flag fraudulent emails. This reduces the chance of employees clicking on malicious URLs and attachments.
  • 26. Taking advantage of the ability to plug into third-party applications to improve the security of a Microsoft Office 365 platform will enhance the protection of critical data being stored across the cloud service, all while allowing employees to go about their day-to-day business without disruption.
  • 27. Does your current email security capabilities meet your requirements? If not, why not consider a third party solution like Barracuda Sentinel to enhance your Office 365 security?
  • 28. Learn more about fully protecting your network and our other solutions at Intelligent Inbox Visit