Proofpoint
flow-image

Microsoft Office 365 Security Vulnerabilities: How Cyber Criminals Exploit Email, File-Sharing, and Identity

Published by Proofpoint

In the digital era, Microsoft 365 is an essential tool for getting work done. Unfortunately, its popularity has made it a prime target for cyber criminals. Every year, people-centric Microsoft 365 attacks cost organisations millions of dollars and cause frustration for security teams and users alike. This e-book explores five types of people-centric attacks that give cyber criminals a foot in the door—and are difficult to detect with Microsoft 365 capabilities alone. You’ll learn:

  • Why business email compromise (BEC) is so hard to detect
  • How telephone-oriented attacks work
  • What trusted cloud services are being used to host malicious files
  • How attackers are bypassing multifactor authentication (MFA)
  • Why Microsoft’s native email security capabilities can’t detect compromised suppliers

Download your copy now.

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories System Security, Breach and Attack Simulation, Deception technology, Digital Forensics, Incident Response, IoT Security, Malware Analysis, Managed Detection and Response, OT Secure Remote Access, Secure Information and Event management (SIEM), Security Orchestration, Automation and Response (SOAR), Threat Intelligence

More resources from Proofpoint