6 Best Practices For Increasing Security In AWS In A Zero Trust World

6 Best Practices For Increasing Security In AWS In A Zero Trust World

AWS Security Best Practices Enterprises are rapidly accelerating the pace at which they’re moving workloads to Amazon Web Services (AWS) for greater cost, scale and speed advantages. And while AWS leads all others as the enterprise public cloud platform of choice, they and all Infrastructure-as-a-Service (IaaS) providers
/
David Discenza

Four Ways to Improve Cybersecurity and Ensure Business Continuity

Four Ways to Improve Cybersecurity Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? You might think that it’s large corporations and, in a way, you’d be correct. Cybercriminals
/
Kayla Matthews

40% of Organizations Are Leaving Office 365 Data Vulnerable

Office 365 Data Vulnerable

Microsoft Office 365 is a popular platform for individuals and organizations alike. But, recent research shows many organizations are apparently too dependent on Office 365 by using it as a backup service.

More specifically, a study polling more than 1,000 IT professionals, backup administrators or business executives, revealed that 40 percent of respondents didn’t have third-party backup services to secure their Office 365 data. That’s particularly worrisome considering 62 percent of people in the study said they use Office 365 currently and 6 percent plan to in the next year.

Office 365 Data Vulnerable

Most respondents said they use Office 365 for email, but OneDrive, OneNote and Teams were also among the services businesses used.

How Does Microsoft 365 Handle Information?

Regarding the 40 percent not using third-party backup services, perhaps they don’t realize that the way Microsoft 365 treats content falls far short of what an actual backup service would do to give protection.

Microsoft has a resilient software-as-a-service (SaaS) infrastructure to ensure users can access data when needed. However, the service-level agreement (SLA) does not protect information against issues including malicious intent, user error or any other activity that could destroy data.

The report from Barracuda also stressed that Microsoft 365 also likely does not meet organizational policies for handling data. As a start, it does not retain deleted data for very long or in a safe way. If a person deletes an email, it only goes to the recycle bin for a maximum of 93 days before Microsoft gets rid of it.

Within that relatively short window, an individual could realize the mistake of deleting the email and restore it. But, with SharePoint and OneDrive data, it’s not so straightforward or simple. Microsoft only keeps information related to those two services for 14 days.

And, if someone needs to retrieve it, their organization has to open a support ticket with Microsoft. Moreover, it’s not possible to recover a single deleted SharePoint or OneDrive file. Instead, the best Microsoft can do is restore an entire instance. Using Microsoft 365 as a backup solution is problematic both because of how data stored by Microsoft gets deleted quickly and that restoring data when needed is a cumbersome task.

Companies Are Not Fully On Board With the Cloud

Even though the Barracuda study showed that most companies do backup their Microsoft 365 data to the cloud, it’s cause for concern that 40 percent do not. Interestingly, the research also showed that across all businesses in the study, 36 percent do not use cloud backup services for any data collected by the respective entity.

The report does not analyze the possible reasons for that finding, but the study at large highlights how no matter which methods companies use to back up their data, they must ensure that the steps they take align with what the organization needs, and that people at the enterprise do not have incorrect assumptions about how Microsoft treats deleted data.

What Companies Can Do for Better Protection

Microsoft offers a top ten style list of things clients can do to keep their data secure. It’s worthwhile to go through the tips and implement them, but company leaders also need to assess the methods they use to back up data — whether on-site or in the cloud — and determine if the plans in place cater to the organization’s current and future requirements.

Leading cloud providers have tools intended to help clients manage data from Microsoft 365 and similar apps. By using those, companies retain more control over their data and avoid catastrophic losses.

Training a company’s employees to recognize potential attempts to compromise data is also crucial. The Avanan 2019 Global Phish Report examined more than 55.5 million emails, most of them associated with the Microsoft 365 platform. The report discovered that one in every 99 emails is a phishing email.

Additionally, 25 percent of phishing emails sent to Microsoft 365 accounts bypassed the Microsoft Exchange Online Protection (EOP) built-in security feature. The EOP marked the messages as clean even though they were phishing attempts.

That finding emphasizes why although using a spam screener tool is a smart preliminary step, it should not replace training that helps workers spot the warning signs of phishing. That type of email attack is certainly not the only risk that could cause Microsoft 365 users to lose data, but it’s something that should factor into overall Microsoft 365 vulnerability awareness.

Convenient, Cloud-Based Apps May Not Offer Ample Protection

The content here should serve as a strong reminder of why companies need to back up their app data to the cloud. It’s not adequate to rely on whatever an app provider does on the back end to keep data on its servers.

By Kayla Matthews

  • Articles
Kayla Matthews Contributor
Technology Writer

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

follow me
Ankur Laroia

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ in the human body. While ...
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which cloud" is now the center ...
Oracle News

Oracle Recognizes Top Cloud Innovators at OpenWorld

/
Accenture, Ferrari, GAP, OUTFRONT Media, and SKY Brasil among those recognized as 2019 Oracle Excellence Award Winners This week, Oracle honored a diverse set of customers and partners for outstanding ...
BBC Tech

Data on almost every Ecuadorean citizen leaked

/
Personal data about almost every Ecuadorean citizen has been found exposed online. Names, financial information and civil data about 17 million people, including 6.7 million children, was found by security company ...
Gartner

Top Trends in Blockchain Technology; inching towards Web 3.0

/
There’s no shortage of news about mega digital commerce players controlling the algorithms that guide our daily actions and thoughts.  See Amazon Changed Search Algorithms in Ways to Boost its Own ...

TRENDING | TECH NEWS