Microsoft M365 is a popular application thanks to its variety of features that make remote collaborative work simple and accessible. However, despite hundreds of configuration settings in each M365 tenancy, by default Microsoft does not apply the majority of security settings leaving users vulnerable and open to attack.
Navigating each configuration setting in M365 and determining if it needs to be configured can be a daunting prospect. If a setting is not in place or has been misconfigured, then full access could be provided for anyone to view and delete private emails and documents. Keeping businesses secure and their data protected requires making use of the intelligent built-in Microsoft security features which are often not used to their full potential.
At CSA we understand what it takes to keep your private data private. We begin the assessment by taking a look at a company’s M365 instance and ensuring it has all the necessary security controls correctly configured to appropriately protect emails and documents. Following the assessment, CSA compiles a report on the findings, as well as a technical assessment on the specific controls that need to be changed (each control to be changed will be based on the criticality of exposure). We can also assist in implementing and amending the required controls on a company’s M365 tenancy for added peace of mind. The assessment is flexible to cater to any kind of company, from small businesses with less than 50 M365 accounts to large scale multinational companies.
Since Microsoft introduces new features and services regularly, we recommend that our M365 Security Assessment is performed at least every 6 months to ensure any new features have not impacted the security posture of the M365 service. Cybercriminals are always on the lookout for new weak spots, but regular reviews of security status make sure the opportunity for an attack is limited.
For our BorderPoint customers, the assessments will integrate into our existing service, providing additional security assurance to our already extensive offering. With BorderPoint you can remain confidently secure thanks to real-time monitoring on both your endpoint and M365 account. Any suspicious or malicious activity is analysed and reported to our team of Cyber Analysts, who will respond and advise as required.