The top 10 security recommendations when working from home with Microsoft 365

The top 10 security recommendations when working from home with Microsoft 365
  1. Identity Security / MFA.
  2. Install the latest patches and updates to software and systems
  3. Change user names and passwords regularly
  4. Build real-time reports of security risks
  5. Create automated and intelligent alerts
  6. Install anti-virus software or all endpoints
  7. Secure private and business devices (+ phones)
  8. Regularly evaluate which users have access to data, devices and networks
  9. Track, change and block access for temporary projects and when employees leave the company
  10. Use information protection solutions (information management) to protect your data wherever it is processed.

1. Identity protection

1.2 million Office 365 accounts (per month) are hacked. This represents only 0.5% of all accounts in your environment. Source: theregister-co-uk

In figures:

0.5% of the accounts: 100
that is 1 account on: 200
2 accounts on: 400
4 accounts on: 800

Multi-factor authentication prevents 99.9% of all attacks

  • ActivatingMfa is easy and can be done on the basis of this article.
  • Do you want to know how many people are typing their passwords into non-secure websites today? Do this atttack simulator.
  • Risky accounts can be accessed via: risky sign-ins.
  • MFA & MAP, POP3, block in one click with automatic activation and roadmap. -> Azure-ad-security-standards
99.9% of all breached accounts do not have an MFA

2. Patching & updates

  • Make sure you have all computers and servers under control.
  • Use a tool that manages to keep an inventory of all computers.
  • Intune can help, but other solutions also exist.
Patching & updates Windows 10

3. Change passwords regularly

  • If it is not so easy to change passwords, it is best to work with MFA. This takes away the problem of the password in many cases. Documents and applications today are often in the cloud. MFA can protect Office 365 & M365.
  • In the latest security baseline Microsoft has recommended to stop changing passwords. This in combination with MFA is a good solution.

4. Build real-time reports of security risks

  • Identity risks are common and remain one of the biggest risks.
  • Easy to understand is a security assessment that you can do yourself at 2 hours.
  • There are also device risks such as malware etc. that you can check with Microsoft Defender ATP.
Image result for risky sign-ins
Security Operations MDATP

5. Create automated and intelligent alerts

  • Cloud App Security gives the possibility to act automatically after a risk. For example, you can set an alert if someone distributes 20 documents.
Cloud App Security automation

6. Install anti-virus software or all endpoints

  • MDATP, SentinelOne, Norton, Mcafee, it doesn't matter. As long as you manage to provide an antivirus at each endpoint. MDATP allows for easier integration.
  • Another aspect is to make sure that your antivirus is switched on. That is best done from this console.
Antivirus MDATP

7. Secure private and business devices (+ mobile phones)

  • We often manage to protect our fixed PCs and laptops. Mobile devices often are not. With Intune, you can isolate and segment applications without having to manage the device. The application is under management. The organisation's data is protected.
  • On the one hand, with a PIN code, fingerprint, faceID. On the other hand, you cannot copy documents to other applications, so the data remains secure.
  • This is an example of the Outlook App. protected on a BYOD.
MAM Mobile Application Management demo

8) Regularly evaluate which users have access to data, devices and networks

  • Cloud App Security shows you how the data ends up on endpoints.
  • You can pullreports from current information security to identify the movement of data flows. Document data, but also identity properties. (place, location)
Cloud App Security real dashboard

9. Track, change and block access for temporary projects and when employees leave the company

  • governance without enforcement is just good advice.
  • Make rulesand arrange it technically.
  • A microsoft Teams site for a project exists for 6 months. after that you can delete it automatically.

10. Use information protection solutions to protect your data everywhere.

  • Information protection ensures that the document is protected. Even if you "physically" lose the document. There is still the possibility of blocking it.
  • Are you able to pull a report from the current shared documents?
Unified Admin. Unified Microsoft Information Protection Policy
Retention Labelling Microsoft 365

Conclusions

It is not easy to prioritise security . I would always start with MFA and identity security. Then document and device security.

If your identity is not secure, there is no point in doing information protection. Because a 'hacker' can log into your account and access your documents.

Microsoft SecureScore

Also read

Installing Windows 11 with Microsoft's Installation Wizard
How to listen to Spotify via any web browser
These are the 10 success factors when setting up Microsoft Teams

Jasper

Jasper

Welcome to 365tips.be. On this website you can read articles and experiences about Office 365 with focus on Microsoft Teams. Feel free to ask me a question and I will answer it in a blog post. Help others by giving feedback at the bottom of the articles. This blog is made in Dutch. The multilingual website is offered with best-effort machine translation.
0 0 votes
Product review
Subscribe
Please let us know if there are
guest
0 Reactions
Inline feedbacks
See all comments
0
Would love to know your thoughts, please leave a comment.x
()
x