Security in Microsoft 365 (part 1 of 3)
Threat Vectors & Data Breaches
The Workplace & Threat Landscape
As today's world is cloud-centric, the organizations have to face the unregulated (like files on cloud storage services) and the unknown (like advanced threats targeting users' email) which is more difficult to protect as the data is now stored everywhere - it's on-premises, on PCs, on phones, and in the cloud. Microsoft is clearly invested in addressing these problems and in helping the organizations to be more secure by protecting against, detecting, as well as responding to a variety of threat vectors.
Phishing
- Virus- It's a type of malicious software program, or "malware" which when introduced to the system, replicates itself by modifying the other computer programs and inserting its own code, infecting files or even the boot sector of the hard drive.
- Trojan Horse- They typically acts as a backdoor that allows a hacker to control or use the infected computer to their advantage. Trojans can perform many tasks like blocking an anti-virus software or the installation of applications, stealing passwords as well as credit card numbers, and infecting other computers and devices connected to the same network.
- Rootkit- It's a type of malware designed to provide a hacker with an administrative access to a computer that too without even being detected. Rootkit can offer a hacker with full access to the computer which can lead to stealing or falsifying documents, the ability to conceal other malware like password-stealing key loggers and viruses, and using the computer for attacks on the other computers.
- Spyware- As the name suggests, it's often used to collect information about internet activity, keystrokes, passwords, and the other sensitive data. Spyware can also be used as an adware, where the software delivers pop-up ads besides tracking a user's behavior.
Spear phishing or whaling is a type of attack directed towards specific individuals generally targeting senior executives and other high-profile individuals, often for financial gain. As explained earlier, it usually masquerade itself as a legitimate email compelling the users to respond with sensitive information or to click a link that installs a malware to infect the user's computer with some type of payload.
Spoofing
Spam & Malware
Spam and bulk email are considered as nuisance, but they often don't carry a payload that can cause harm to a user's system, rather, they are an unwanted email that gets in the way of a user's productivity. Whereas malware which is a short form of Malicious Software and is often received in email as either attachment or an embedded link to a malicious website or file, can cause great harm to an organization.
Malware typically works in following two stages:
- Stage 1 is the attachment or website you visit that's infected. The malware then uses a code to exploit a user's computer using macros and JavaScript to plant a payload like Trojan Horse.
- Stage 2 is delivering this payload.
Comments
Post a Comment