{"id":3183,"date":"2020-02-18T07:42:49","date_gmt":"2020-02-18T12:42:49","guid":{"rendered":"https:\/\/www.exchangedefender.com\/blog\/?p=3183"},"modified":"2020-02-11T12:37:26","modified_gmt":"2020-02-11T17:37:26","slug":"o365-security-not-enough-leaked-files-on-the-rise","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2020\/02\/o365-security-not-enough-leaked-files-on-the-rise\/","title":{"rendered":"O365 Security Not Enough \u2013 Leaked Files on the Rise"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"935\" height=\"703\" src=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/02\/XD-FB-SS-9-1.png\" alt=\"\" class=\"wp-image-3194\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/02\/XD-FB-SS-9-1.png 935w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/02\/XD-FB-SS-9-1-300x226.png 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2020\/02\/XD-FB-SS-9-1-768x577.png 768w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The numbers are quite staggering for Microsoft \u2013 in a good way to mention, about 90% of all small business organizations use O365 as a critical application suite. The dependence on these cloud applications are great for productivity, but are not-so-great when it comes securing it. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Here are some quick facts:\n<\/strong><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>25%<\/strong> of phishing emails bypass Office 365 Security<\/p>\n\n\n\n<p><strong>55%<\/strong> of employees admit to clicking on links they don\u2019t recognize<\/p>\n\n\n\n<p><strong>58%<\/strong> of company (sensitive) data is stored in 365 documents. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Microsoft\u2019s infamous cloud\nsuite is known to have been under attack from hackers as they found O365 accounts\nto be easy targets due to the lack of security protocols. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>&#8220;<em>Researchers from Barracuda Networks have found that hackers are targeting Microsoft Office 365 accounts with a worrying degree of success.<\/em>&#8220;<br><br>Forbes 2019 | <strong><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/05\/02\/microsoft-office-365-accounts-under-attack-what-you-need-to-know\/#6ba9664d36cd\">Microsoft Office 365 Accounts Under Attack &#8212; What You Need To Know<\/a><\/strong> <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">ExchangeDefender\u2019s solution \u2013 <a href=\"https:\/\/exchangedefender.com\/cloud-security-o365\">Cloud App Security<\/a><\/h4>\n\n\n\n<p>Protect Office 365 applications with <a href=\"https:\/\/exchangedefender.com\/cloud-security-o365\">advanced multi-layered security<\/a>, and explore how our solution defends your digital workplace against cyber-threats.<\/p>\n\n\n\n<p>ExchangeDefender\u2019s enterprise-grade\nprotection works to prevent data breaches, malware, phishing attempts, and\naccount takeovers. <br>\n<br>\nOur top security features to secure cloud applications include: <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Data Security<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li> 256-Bit encryption in-transit and at-rest data security<\/li><li>Detect and control accidental and\/or malicious data leaks<\/li><li>Data loss prevention with customizable policies<\/li><li>Layered Redundancy \u2013 ensures secure email storage across multiple networks<\/li><li>Secure Servers<\/li><li>Two Factor Authentication \/ OTP<\/li><li>Pattern-based encryption<\/li><li>Multi-level Encryption policies <\/li><\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Threat Protection<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malicious Attachment Blocking<\/li><li>Anti-Phishing Policies<\/li><li>Protection against advanced malware and phishing attacks<\/li><li>Email domain, attachment, and links screening and quarantine<\/li><li>Malicious files and folders screening and quarantine<\/li><li>DMARC Domain Fraud Prevention<\/li><li>Whitelist\/Blacklist Policies<\/li><li>Automatic Signature Disclaimer<\/li><li>Network Redundancy<\/li><\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Account Monitoring<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>24\/7 U.S based support<\/li><li>Real-time Reporting<\/li><li>Receive alerts via email\/text when unusual activity is discovered<\/li><li>Full visibility into login locations, sharing and downloading activity<\/li><li>Detect and control unsanctioned applications with risky permission settings<\/li><li>Automatically prevent account takeovers with policy enforcement rules<\/li><\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>ExchangeDefender\u2019s cloud application\nsecurity is vital to the modern business, ensuring advanced protection for the\nstoring and sharing of critical data. <\/p>\n\n\n\n<p>Our zero-trust solution provides O365 users immediate protection ensuring peace of mind for organizations who need to secure O365 \u2013 the application, the users, and the data that is stored within it.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">To learn more about ExchangeDefender\u2019s Cloud App Security Solution, <a href=\"https:\/\/exchangedefender.com\/cloud-security-o365\">click here<\/a>.<\/h4>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,46],"tags":[175],"class_list":["post-3183","post","type-post","status-publish","format-standard","hentry","category-uncategorized","category-product-features","tag-o365-security"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=3183"}],"version-history":[{"count":12,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3183\/revisions"}],"predecessor-version":[{"id":3196,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/3183\/revisions\/3196"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=3183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=3183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=3183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}