{"id":16334,"date":"2018-07-05T22:36:57","date_gmt":"2018-07-06T02:36:57","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=16334"},"modified":"2024-06-03T14:03:02","modified_gmt":"2024-06-03T18:03:02","slug":"microsoft-365-secure-office-protect","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/","title":{"rendered":"Is Microsoft 365 secure?"},"content":{"rendered":"<p class=\"p3\"><span class=\"s1\">Microsoft 365 (<a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/office-365-is-now-microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">formerly Office 365<\/a>) is one of the most used software packages in the world. Now with the latest cloud technology integrated directly within users&#8217; favorite Microsoft word processing and business apps, new features for online cloud storage\u2014including automatic backups, easy collaboration between staff and added security\u2014the Microsoft 365 productivity suite is more powerful than every before.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">However, like all new technologies, <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365<\/a> is not without its new vulnerabilities.\u00a0 Cloud-based technologies have <a href=\"https:\/\/www.sherweb.com\/blog\/security\/security-awareness-training-is-no-longer-optional\/\" target=\"_blank\" rel=\"noopener noreferrer\">unique security concerns<\/a> that need to be understood and taken into account by both IT providers and their customers, such as data being accessed from anywhere and, thanks to the cloud&#8217;s remote nature, susceptible to unauthorized access.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">A recent <a href=\"https:\/\/www.skyhighnetworks.com\/press\/skyhigh-uncovers-knockknock-a-widespread-attack-on-office-365-corporate-email-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">study<\/a> has shown that 71.4% of enterprise Microsoft 365 accounts have, at least, one compromised user each month.\u00a0 This includes accounts with unrevoked privileges (49.5%), ex-employees still having unauthorized access as well as malicious threats from outside the system. This therefore begs the question:\u00a0<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">How secure is Microsoft 365?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Very secure. Microsoft has <a href=\"https:\/\/www.businessinsider.com\/microsoft-security-from-worst-to-best-2015-11\" target=\"_blank\" rel=\"noopener noreferrer\">spent nearly a billion dollars<\/a> on securing their flagship product in the last year. Additionally, now with integrated cloud technologies, Microsoft is also providing a fleet of new security solutions, such as email encryption and threat protection. Plus, the physical data centers which store the raw data are highly secure, with biometric scanners for entry, unknown locations (but still located in the client&#8217;s region) and the workers themselves unable to access the data (known as \u2018Role Separation&#8217;).<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">As more companies take full advantage of Microsoft 365&#8217;s powerful offerings and are moving their data to the cloud, the role of an MSP (Managed Service Provider) is to <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-to-start-selling-managed-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">stay constantly informed on the key best practices<\/a> to manage the security of their 365 networks and ensure that client data remains secure.<\/span><\/p>\n<h3 class=\"p5\"><span class=\"s1\">Remove redundant account privileges<\/span><\/h3>\n<p class=\"p3\"><span class=\"s1\">As mentioned previously, 49.5% of all unauthorized access is caused by a user having account privileges that are significantly higher than what is necessary. This might be an intern having admin access to delete folders or a graphic designer being able to access financial data in the cloud. A full audit of the Microsoft 365 user base should be necessary every six months, with the highest privilege only available to the MSP.<\/span><\/p>\n<h3 class=\"p5\"><span class=\"s1\">Revoke ex-employee access<\/span><\/h3>\n<p class=\"p3\"><span class=\"s1\">When an employee has their contract suddenly terminated, there is a possibility they might (either consciously or unconsciously) sabotage files. An ex-employee might not be malicious at all, but in cleaning up their space accidentally decide to delete critical files that are shared through the cloud. They might also remove client emails, documents, calendars and more, which thanks to Microsoft 365, is synced throughout the network, to the cloud and might be critical for other departments. MSP&#8217;s and IT managers are advised to manage access for these scenarios and ensure any \u2018no longer active&#8217; accounts are archived when an employee leaves. A common mistake is that many firms may keep an old profile active \u2018just in case&#8217; they need to access the data when they should have proper processes to archive and restrict said data.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Additionally, this principle would also include having a unique login for each employee. Even large firms have been guilty of having one default password for their entire network, which an employee can easily remember before and after they leave the firm. This leads nicely to the next point about passwords\u2026<\/span><\/p>\n<h3 class=\"p5\"><span class=\"s1\">Avoid having a password file<\/span><\/h3>\n<p class=\"p3\"><span class=\"s1\">All the encryption in the world will not matter if a user has access to a password. There has been a recent increase in the number of people having all of their passwords, including their Microsoft 365 cloud passwords, in an unprotected text file on their server and computer. In some situations, the file is even called \u2018passwords&#8217;. This is the first place that a hacker will look when gaining access to your system. The easy solution is to simply not have an unencrypted password file or any file at all.<\/span><\/p>\n<h3 class=\"p5\"><span class=\"s1\">Enable multi-factor authentication<\/span><\/h3>\n<p class=\"p3\"><span class=\"s1\">A quick way to ensure better security is to enable the included <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-enable-multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication<\/a> that is provided by Microsoft 365. This service asks a user not just for a password, but to enter a special code that is sent to a mobile device (or another method nominated by the MSP). This is very popular for financial firms or when connecting to a sensitive system.<\/span><\/p>\n<h3 class=\"p5\"><span class=\"s1\">Backup sensitive data offline<\/span><\/h3>\n<p class=\"p3\"><span class=\"s1\">To prevent data from being deleted accidentally or tampered with maliciously (such as with a Ransomware virus that encrypts your data and only gives you a key to retrieve it if you pay the hackers), it&#8217;s worthwhile to have an offline <a href=\"https:\/\/www.sherweb.com\/blog\/security\/traditional-backup-not-enough-sherweb-with-acronis\/\" target=\"_blank\" rel=\"noopener noreferrer\">backup of your sensitive data<\/a>. This is a failsafe measure just in case the cloud is compromised, or a user accidentally deletes a critical project and should be a cornerstone of a data recovery plan.<\/span><\/p>\n<h3 class=\"p5\"><span class=\"s1\">Use OneDrive for Business&#8217;s per-file encryption <\/span><\/h3>\n<p class=\"p3\"><span class=\"s1\">Microsoft 365&#8217;s <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/configure-onedrive-for-business\/\" target=\"_blank\" rel=\"noopener noreferrer\">OneDrive for Business<\/a> offers per-file encryption, not just encrypting all of the files on the server with one key. This means that all data can be separately encrypted and that if a malicious actor got hold of one of the system passwords, they would not be able to access all the files (apart from one).<\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">How Office Protect can help<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">One of the best ways to protect your files, system, and access to Microsoft 365 is the use of a security platform, such as Sherweb&#8217;s in-house solution, <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-msps-can-add-value-to-their-offering-with-office-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office Protect<\/a>. Office Protect is a proactive Microsoft 365 solution that integrates into your Microsoft 365 network to prevent all the above threats and ensure simple security management for MSPs and IT managers.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office Protect<\/a> provides Microsoft 365 tenants with comprehensive, <\/span>useful features such as:<\/p>\n<ul>\n<li class=\"p3\"><span class=\"s1\">Alerts when a foreign or unknown IP access the Microsoft 365 network, so you are instantly alerted when someone unauthorized accesses the network. If the IP address is set to the office that the users work from, then any external access will be instantly noted, despite the fact that Microsoft 365 is operating from a cloud. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Admin abuse detection. This is great for finding users with unnecessary admin privileges or when a user accidentally starts deleting files. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Alerts for suspicious mailbox activities (Such as spam virus emailing the entire database). <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Proficient data logging on all accounts to monitor activity (But without compromising privacy).<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Tools to make it easy to set sweeping changes to user rights and access permissions throughout an MSPs whole Microsoft 365 network. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">A single pane dashboard to break down complex user data into simple security information, to inform and educate quickly. <\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">User access data can be exported easily to PDF or CSV for data analytics.<\/span><\/li>\n<li class=\"p3\">Reports that can be automated into a daily or weekly format, especially useful for reporting to clients or senior management teams.<\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">Thanks to Microsoft&#8217;s continued investment into data security and to <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-how-to-start-selling-data-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">solutions like Office Protect<\/a>, Microsoft 365 continues to be a preferred and secure service to use across all industries.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Office 365 is one of the most used software packages in the world, with 27 million acti","protected":false},"author":177,"featured_media":21935,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[751],"tags":[717,826,919,921],"class_list":["post-16334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-365","tag-microsoft-365","tag-office-protect","tag-cybersecurity","tag-microsoft-365-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is Microsoft 365 secure? Here&#039;s how to be certain<\/title>\n<meta name=\"description\" content=\"Is Microsoft 365 secure? How secure is it, exactly? What you need to know about how Microsoft protects its users and what you can do to boost security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Microsoft 365 secure? Here&#039;s how to be certain\" \/>\n<meta property=\"og:description\" content=\"Is Microsoft 365 secure? How secure is it, exactly? What you need to know about how Microsoft protects its users and what you can do to boost security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-06T02:36:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T18:03:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/IsMicrosoft365secure-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Is Microsoft 365 secure?\",\"datePublished\":\"2018-07-06T02:36:57+00:00\",\"dateModified\":\"2024-06-03T18:03:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/\"},\"wordCount\":1140,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/IsMicrosoft365secure-1200x480@2x.png\",\"keywords\":[\"Microsoft 365\",\"Office Protect\",\"Cybersecurity\",\"Microsoft 365 security\"],\"articleSection\":[\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/\",\"name\":\"Is Microsoft 365 secure? Here's how to be certain\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/IsMicrosoft365secure-1200x480@2x.png\",\"datePublished\":\"2018-07-06T02:36:57+00:00\",\"dateModified\":\"2024-06-03T18:03:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Is Microsoft 365 secure? How secure is it, exactly? What you need to know about how Microsoft protects its users and what you can do to boost security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/IsMicrosoft365secure-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/IsMicrosoft365secure-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-secure-office-protect\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Ecosystem\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft 365\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/office-365\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Is Microsoft 365 secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Microsoft 365 secure? Here's how to be certain","description":"Is Microsoft 365 secure? How secure is it, exactly? What you need to know about how Microsoft protects its users and what you can do to boost security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/","og_locale":"en_US","og_type":"article","og_title":"Is Microsoft 365 secure? Here's how to be certain","og_description":"Is Microsoft 365 secure? How secure is it, exactly? What you need to know about how Microsoft protects its users and what you can do to boost security.","og_url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2018-07-06T02:36:57+00:00","article_modified_time":"2024-06-03T18:03:02+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/IsMicrosoft365secure-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Is Microsoft 365 secure?","datePublished":"2018-07-06T02:36:57+00:00","dateModified":"2024-06-03T18:03:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/"},"wordCount":1140,"commentCount":3,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/IsMicrosoft365secure-1200x480@2x.png","keywords":["Microsoft 365","Office Protect","Cybersecurity","Microsoft 365 security"],"articleSection":["Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/","url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/","name":"Is Microsoft 365 secure? Here's how to be certain","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/IsMicrosoft365secure-1200x480@2x.png","datePublished":"2018-07-06T02:36:57+00:00","dateModified":"2024-06-03T18:03:02+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Is Microsoft 365 secure? How secure is it, exactly? What you need to know about how Microsoft protects its users and what you can do to boost security.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#primaryimage","url":"\/blog\/wp-content\/uploads\/IsMicrosoft365secure-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/IsMicrosoft365secure-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-secure-office-protect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Ecosystem","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/"},{"@type":"ListItem","position":3,"name":"Microsoft 365","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/office-365\/"},{"@type":"ListItem","position":4,"name":"Is Microsoft 365 secure?"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Microsoft 365","Office Protect","Cybersecurity","Microsoft 365 security"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=16334"}],"version-history":[{"count":26,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16334\/revisions"}],"predecessor-version":[{"id":24808,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16334\/revisions\/24808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/21935"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=16334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=16334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=16334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}