Top ten ways to protect Office 365 from cyber attacks

Many of our clients experience that Microsoft Office 365 security is being compromised. They are far from being the only ones: In March 2018 alone, Microsoft registered 23 million high-risk login attempts based on phishing, and in April that year, 350,000 accounts were compromised due to password spraying which is a type of attack where cyber criminals attempt to log in with a username and password at long intervals.

Cyber criminals have tremendous power and are difficult to track, among other things because they typically create rules that erase their tracks. They can access a wide range of programs with a username and password for Office 365, for example SharePoint Online, Skype Online, Teams, OneNote, OneDrive and VPN and thus do great harm.

However, by making a few system changes, you can avoid being compromised and quickly get an overview of the incident in case of an attack. Based on the growing problem, we have prepared ten tips to protect Office 365 from cyber attacks.

You should pay special attention to...

Spray attacks

Password spraying attacks are commonly used. This type of attack can be very difficult to detect. A spraying attack is when cyber criminals attempt to log in with a username (e-mail address) and a password from a password list at very long intervals (e.g. every 30 minutes). Typically, the attacker changes his/her own IP address after a short period and thus avoids the controls implemented by Microsoft to secure its Office 365 customers.

Phishing

Phishing can be many things, but a common feature is that an attacker attempts to lure the user to disclose personal information, such as credit card information or username and password. In terms of Office 365, users most often receive an e-mail with a link. When a user accesses the page, it looks like an Office 365 authentication message and this may trick the user into entering his/her username and password. You may be able to determine if the page is fake if there are spelling errors in the URL at the top of the browser, spelling errors on the page, or if the company signature at the bottom of the e-mail looks a little different than normal.

Ten ways to protect your company

Enable logging

We recommend that you enable mailbox audit logging. It is very limited what can be detected after an attack, if logging is not enabled. When enabling mailbox audit logging, you can tailor what is to be logged. You should, as a minimum, enable default logging. Audit logs are saved for 90 days and no additional licence is required.

Manage your legacy protocols

In Office 365, the following protocols are enabled by default: SMTP, POP3, IMAP, Exchange Web Services (EWS) and Exchange ActiveSync. Cyber criminals use the above protocols to, among other things, conduct password spraying attacks. The challenge of these protocols is that they are so old that they do not support multi-factor authentication (‘MFA’).

Microsoft recommends disabling all legacy protocols. However, before you do that, you should check whether any services are using SMTP or IMAP, etc.

Specifically, IMAP may be problematic, as this is currently the only way to access shared mailboxes via mobile phones.

SMTP is most commonly used for mail relays, and solutions that use this type of configuration may need to be changed. Note that the disablement of some of the protocols requires a newer OS on your mobile phone.

Enable multi-factor authentication (MFA)

MFA is an extra security layer which in addition to a username and password requires an additional security factor, such as a PIN. Such extra security layer can be added at no additional licence costs. We recommend that all users use MFA whenever possible.

Establish rules on conditional access

It is possible to create custom rules for condition access to either force MFA login or not to request MFA login. If the user is using a trusted enrolled device the user may not need to authenticated with MFA. But if the user e.g. logs in from another country, and detected by the ‘impossible travel’ feature then the user will be forced to login using MFA.

Impossible travel is, for instance, where the user logs in somewhere in Denmark via a Danish IP address and shortly afterwards logs in from another country to which it would be impossible for the user to travel in the time period elapsed between the first and the second login attempt. This may be a false positive. In such cases, the user will just need to login using an additional MFA login.

The conditional access function is not just for Office 365, but applies to all Microsoft Azure applications. The conditional access function requires an extra licence.

Use the Microsoft Office 365 Secure Score portal

Office 365 Secure Score is a portal where Office 365 admins can check their security score compared to other companies.

You are not supposed to strive for a top score in Secure Score. Instead, you should make efforts to reach as high a score as possible that matches your type of company. Be aware that the implementation of some of the improvements suggested will require you to purchase extra licences.

Get the right licence

We often find that many companies do not have the right licence in case of an attack. Features with the cheapest licences, for instance MFA and audit logging, will be adequate to a large extent,  however, anti-phishing functions, safe links and safe attachments are only available with certain types of licences. Also, many of the security solutions in the portal require an extra licence.

We recommend that you consider purchasing additional Office 365 security products. If you can prevent security incidents from happening, you will save a lot of time, money and problems.

It is our experience, that the possibility of solving a security incident increases if you have licences for the security products. At present, these include: Office 365 Enterprise E3/E5 and Azure AD P1/P2 licences.

Evaluate your backup solution

Evaluate the backup solution delivered by Microsoft is sufficient and supports your internal SLA. There are many other vendors who offer backup solutions for Office 365, OneDrive for Business, SharePoint Online, etc.

Implement SPF, DKIM and DMARC security measures

These security measures protect the recipient against e-mail spoofing. We recommend that you implement these security measures as they make it more difficult to perform e-mail spoofing.

Sender Policy Framework (‘SPF’) is an e-mail validation standard designed to prevent e-mail spoofing. SPF allows the company to specify which mail servers are allowed to send e-mails for the company’s domain.

DomainKeys Identified Mail (‘DKIM’) is a method to verify that e-mails between a sender and a recipient are sent from the correct source. DKIM uses a digital signature that is added to the e-mail header by the mail server from which the e-mail is sent. A DNS record is created in the company’s external DNS server which contains the public key for the digital signature in the e-mail header.

Domain Message Authentication Reporting & Conformance (‘DMARC’) checks if the sender uses both or one of the above measures, and based on the result, it is assessed what needs to be done if the e-mail cannot be verified. Based on the result of the SPF and DKIM checks, DMARC determines if the email should be delivered, quarantined or deleted, as specified in the underlying rules.

Improve awareness

We recommend that you improve your employees’ awareness in respect of e.g. phishing e-mails. It may include links to be clicked, invoices to be paid and pages that request a username and password.

Also, your employees must be instructed not to approve MFA, unless they have requested it themselves.

Learn more about awareness.

Procedures

We recommend that you make explicit agreements on the invoicing procedure. For example, e-mails forwarded by the managing director must always be followed by a phone call.

Invoices that seem different must always be controlled. For instance, VAT may be missing or incorrect, the invoice looks odd or the wording is incorrect (Google Translate).

Establish clear rules and procedures for the summer holidays, etc. In our experience, cyber criminals often take advantage of holidays when the persons who are usually involved in the payment of invoices are on holiday.

How to act in case of an attack?

If your company experiences a security incident involving personal data, you should do the following:

  • Create an overview and assess the extent of the damage.
  • If necessary, notify the supervisory authorities of the breach. Remember that notification must be made as soon as possible and within 72 hours at the latest.
  • Notify the data subjects concerned if the risk is high, and explain what happened and why.

We can assist you with legal and technical assistance; thus, we can help with notifications and ensure that the breach is effectively handled to minimise loss of revenue, customers and data. We also help with press and media management, focussing on protecting your brand and maintaining your customers’ trust.

Learn more about our incident response services

Kontakt os

Thomas Grandjean

Director, PwC Denmark

Tlf: 3945 3493

Mads Nørgaard Madsen

Partner, Head of Consulting, Direktør, PwC Denmark

Tlf: 2811 1592

Følg PwC