For organizations that use Microsoft 365, it’s a cornerstone of their business. Users rely on it to log in, receive and send email, and store and share sensitive data.
Microsoft 365 is also the most targeted software for cyberattacks, according to Statista.
These factors alone make Microsoft 365 a critical piece of technology to monitor. Adversaries tend to reuse techniques, tactics and procedures (TTPs) to launch their attacks — and there are some common Microsoft 365 attacks that you’ll want to watch out for. You’ll learn:
- How to detect threat actors’ favorite techniques for Microsoft 365 attacks
- Why Microsoft 365’s built-in security settings aren’t enough protection
- Easy ways to protect yourself against the rise in Microsoft 365 attacks
Matthew Warner, CTO and Co-Founder, Blumira
Matt is CTO and Co-Founder of Blumira, a leading cybersecurity provider of automated threat detection and response technology. At Blumira, he leads the security and engineering efforts to provide actionable insights into cybersecurity risks at scale. Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.