If you pay any attention to the news, you’ve most likely been exposed to a recent story about a large, well-known business that has recently been hit with a cyber attack. What probably doesn’t make the proverbial ‘front-page’ is that smaller businesses can and often are targeted for similar attacks. In fact, the annual Verizon Data Breach report in 2018 found that 58 percent of all breaches in the past year occurred at small businesses – exceeding those at large corporations.
Whether you and/or your organization have faced this fact – the threat is real and discounting the threat can lead to inadequate security protections. Hackers continuously monitor the entire market for areas of vulnerabilities and often target smaller companies precisely because they know those businesses have under-invested in cybersecurity.
Years ago, having an internet firewall, PC antivirus, and email filtering were sufficient to protect your business.
That was yesterday and this is today!
For many of us, all or some of our data resides in the cloud. This is great news for users as it provides flexibility for getting things done wherever they go. With this flexibility, however, comes risk.
More and more employees are reaching for their mobile devices to conduct work. These can easily be lost or stolen and sensitive information can end up in the wrong person’s hands. These same employees are also working over insecure networks either at home, in their local coffee shop or in an airport.
Today’s cyber criminals are using sophisticated methods to attack their victims. Email phishing is getting more and more advanced and harder to detect, ransomware twists the power of encryption against the victim and social engineering attacks take advantage of busy employees.
At the end of the day – Cyber criminals have upped their game. You need to up your game too. Do you have time to become a cybersecurity expert. If so, you probably don’t have time to STAY a cybersecurity expert because of how threats change from month to month.
Microsoft: Scaled Security Provider
Microsoft is now a serious security vendor with vast experience in this space and deal with security on a scale not seen in any other company. Their center piece is the Microsoft Intelligent Security Graph. Microsoft synthesizes a vast amount of data from a huge variety of sources. In fact, 400 billion emails get analyzed by Outlook.com and Office 365 email services every month.
Microsoft operates 200-plus global cloud, consumer, and commercial services. Everything from outlook.com to Xbox Live to Office 365 to Azure, and so on. With all of those services, they have a tremendous amount of surface area to defend.
With all of this exposure, Microsoft receives a lot of information from defending against those attacks.
1 Billion plus Azure user accounts give Microsoft tremendous insight into how people authenticate to Azure. And that, combined with the 450 billion monthly authentications that we do with Azure Active Directory and Microsoft Account, gives them tremendous insight into what is normal behavior when it comes to sign-ins and authentications, and what is abnormal behavior, and how often is it that someone has the right password, but they’re not the person they say they are. Microsoft learns a lot about defending that really important control point, the identity, by looking across that set of data.
Bing scans about 18 billion web pages every month, providing great insight into what people are doing with web scripting technologies when it comes to attacks and phishing campaigns. This provides a great way to look at that and understand how they should help customers defend based on that information.
On top of all of that Microsoft layers shared threat data that they receive from partners, researchers at Microsoft and law enforcement agencies that they partner with worldwide through their digital crimes unit. All of that intelligence makes up the Intelligent Security Graph.
And why is it a graph? It’s a graph because what’s really important is connecting these pieces of intelligence, so that these signals are not just individual points of information. The graph brings them together as something that can draw patterns. Microsoft can learn from one point of data to influence how we interpret another point of data. So, the Intelligent Security Graph is something that they are very, very heavily invested in.
Microsoft 365 Business to The Rescue!
When customers step up to Microsoft 365 Business, they can quickly implement a cloud-based security solution that stays current and protects them from the latest threats in phishing, ransomware, and malware.
Microsoft 365 Business is a single, integrated solution, that brings together the best-in-class productivity of Office 365 with advanced security to help customers with less than 300 employees securely run and grow their business. Microsoft 365 Business was built specifically for small and medium size business, and is designed to help keep company data secure, while ensuring employees are their most productive, whether in the office, or on the go.
Microsoft 365 Business gives peace of mind by helping to safeguard your business. It does this in three ways:
- First, you get protection from sophisticated external cyber threats hidden in email attachments and links, and get cutting-edge defenses against phishing and spoofing attacks, ransomware, and other advanced malware attempts.
- Second, you gain more control over your company data and documents. Protection from data leaks helping you prevent sensitive information like SSNs and customer credit card numbers from being shared outside your business, and control access to documents, even after those documents have been shared outside your company.
- Third, you can manage the apps, data, and documents on devices that access your company data. Regardless of the device type or operating system, iOS, macOS, android, or Windows. Microsoft 365 Business helps you manage these devices.
These capabilities draw upon Microsoft’s overall security investments ($1B+ annually) and are built on enterprise products like Intune and Azure Information Protection. Microsoft is continually adding capabilities and further simplifying the offering each quarter as customers provide feedback, and as the threat landscape changes. It’s one of the many key benefits of having a cloud hosted and subscription based security solution.
The Microsoft 365 Team at Oakwood is well versed in working with organizations like yours to assess and identify paths towards cloud based services like M365. We love to hear from you today! Drop us a line below to get the conversation started.
- Microsoft 365: Committed to Your Security
- A Microsoft 365 Customer Success Story: Transblue
- Oakwood: A Tier 1 Cloud Solution Provider