{"id":16695,"date":"2018-07-31T20:35:23","date_gmt":"2018-08-01T00:35:23","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=16695"},"modified":"2022-09-05T17:03:21","modified_gmt":"2022-09-05T21:03:21","slug":"officeprotect-tips-hackers","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/","title":{"rendered":"3 tips to secure Office 365 against hackers"},"content":{"rendered":"<p>Hacker \u2013 a word that conjures up images of a man in a baseball cap, alone in a dark room, surrounded by machines and blinking lights, out to spread chaos around the universe. While this image is often inaccurate \u2013 hackers can be anyone, anywhere, with any device \u2013 the threat is very real. You know the danger exists, but how can you protect yourself and your data from a threat that seems invisible and undetectable?<\/p>\n<p>You really can\u2019t on your own. Fortunately, if you use Office 365, the solution has three ways to protect your business from cyberattacks.<\/p>\n\n<h2><strong>Tip #1: Stop <\/strong><strong>Hackers in Their Tracks<\/strong><\/h2>\n<p>The first goal of any data security feature is to act as a strong perimeter. Office 365 is no different and has taken many measures to ensure no unverified users can get into your system.<\/p>\n<p>&nbsp;<\/p>\n<h4>Multi-Factor Authentication<\/h4>\n<p>Passwords are easily compromised. Employees might choose an easy-to-guess password that they can remember, or keep all of their files in a Word document on their desktop. Some employees might even write their password on a piece of tape and stick it to the bottom of their computer<\/p>\n<p>Multi-Factor Authentication (MFA) realizes this weakness and adds another level of security to the log-in process. In addition to having a password, a user must also verify their identity with a device they have, most commonly a mobile phone.<\/p>\n<p>This basic two-factor authentication program comes with Office 365, but if you need something even more secure for your business, they offer a higher-level plan as well.<\/p>\n<p>&nbsp;<\/p>\n<h4>Azure Identity Protection<\/h4>\n<p>Identity Protection learns your habits to flag unusual activities. For example, if you log in from a different source than usual, or try to log in multiple times, the system will send you an alert and ask for additional authentication methods.<\/p>\n<p>Most of us have experienced this when we use a different machine, or log on to a coffee shop\u2019s internet. Some find it to be a nuisance, but in reality, it is an effective method to stop hackers in their tracks. Without it, you may not know you are under attack until it is too late.<\/p>\n<p>&nbsp;<\/p>\n<h4>Ransomware Prevention<\/h4>\n<p>Unfortunately, ransomware has seen a lot of headlines in recent months. This particularly unpleasant attack usually involves a hacker accessing data and then locking the business out of their own system, demanding thousands of dollars in Bitcoin payments before they will release the data. Some larger enterprises have even encountered and endured threats of releasing private customer data online if they do not pay the ransom.<\/p>\n<p>However, this isn\u2019t just a big business problem. Office 365 has recently taken steps to prevent ransomware attacks for all of their customers.<\/p>\n<p>Their new security feature detects ransomware attacks and will send you an alert via email, desktop, or phone to let you know of a possible attack. It even walks you through the steps to restore your system to a point before it was compromised.<\/p>\n<p>&nbsp;<\/p>\n<h4>Link Checking in MS Office<\/h4>\n<p>Everyone has had a moment when you click on a link without thinking about it. Important questions like, \u201cWhat is this link\u2019s source?\u201d, \u201cIs it safe?\u201d or \u201cCould it contain a virus?\u201d often do not occur to us when we\u2019re hurried or looking through many documents. Fortunately, Office 365 thinks about this for you with advanced link checking in Word, Excel, and PowerPoint that will alert you of any suspicious links before your computer gets to the corrupted site.<\/p>\n<p>&nbsp;<\/p>\n<h4>Encrypted Email<\/h4>\n<p>This one is pretty simple &#8211; with end-to-end encryption for all email, you can ensure that no one intercepts or receives your communications except for the intended recipients.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Tip #2: Get Control Over Your Data<\/strong><\/h2>\n<p>One of the best ways to prevent hacking is to make sure you maintain control over your data at all times. Only you should determine who can access your most important assets.<\/p>\n<p>&nbsp;<\/p>\n<h4>Privileged Identity Management<\/h4>\n<p>One of the most devastating attacks is one where an administrative account is breached, so naturally, you will want to limit the number of admin accounts that are given out. However, this can create difficulties when users need an admin account to complete a particular task.<\/p>\n<p>Privileged Identity Management solves this by allowing you to create temporary admins for a designated amount of time. Users on a list of \u201celigible admins\u201d can request temporary access for certain tasks, and their admin status will be revoked after the work is completed. You can even control what sort of information these eligible admins must provide to grant access.<\/p>\n<p>&nbsp;<\/p>\n<h4>Mobile Device Management<\/h4>\n<p>The modern employee often checks email and performs other work tasks on many different devices that may or may not be company-sanctioned and controlled. Mobile Device Management gives you the ability to protect your data even on devices that are personally owned by your employees.<\/p>\n<p>&nbsp;<\/p>\n<h4>Data Sharing Prevention<\/h4>\n<p>Not all threats come from outside your organization. Office 365 has two measures to protect your data from threats inside your organization as well, whether it be accidental or malicious. Password Protected Sharing Links lets you set passwords for certain shared folders and files to prevent unauthorized access, and Prevent Forwarding allows you to restrict recipients from forwarding or copying any emails you do not want others seeing.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Tip #3: Get Better Visibility<\/strong><\/h2>\n<p>Knowledge truly is power. If you can see a hole in your perimeter, you will know where to patch it. If the hole remains undiscovered, someone can get in. Office 365 has features both to help you find gaps in your system and fix them before something can happen, and to repair your system just in case something does happen.<\/p>\n<p>&nbsp;<\/p>\n<h4>Secure Score Check<\/h4>\n<p>This feature allows you to get an overall view of how secure your data is with just a click of a button. Office 365 will assess what security features you are and are not using, find weak links in your system, and suggest ways to improve your overall security score.<\/p>\n<p>&nbsp;<\/p>\n<h4>File Restore<\/h4>\n<p>But what if all of this is not enough? Nothing is entirely hacker-proof, right? This is an unfortunate truth of the technological age. Knowing this, Office 365 has a full file restore feature so even if someone destroys, deletes, or locks you out of your data, or even in the event of a natural disaster, all your data can be restored and your business can stay up and running.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How Office Protect Can Help You<\/strong><\/h2>\n<p>Does all of this sound like a lot to keep up with? You definitely want to keep your business secure, but keeping track of all of these features can be challenging. How would you even know if something happened?<\/p>\n<p><a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">Office Protect<\/a> is here to help. You can manage everything from one pane of glass in an easy to understand interface. Any unusual activity will trigger an alert that you can investigate, and it even generates reports for you to examine and gain valuable insight into the security of your organization.<\/p>\n<p>Want to know more about how Office Protect can keep security simple? Contact your Sherweb representative today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacker \u2013 a word that conjures up images of a man in a baseball cap, alone in a dark room, surro","protected":false},"author":177,"featured_media":16582,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[826],"class_list":["post-16695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-office-protect"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to secure Office 365 against hackers<\/title>\n<meta name=\"description\" content=\"Office 365 is increasingly being targeted by hackers. How can you make sure your instance is secure? Find out in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure Office 365 against hackers\" \/>\n<meta property=\"og:description\" content=\"Office 365 is increasingly being targeted by hackers. How can you make sure your instance is secure? Find out in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-01T00:35:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-05T21:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/08-Microsoft-Azure-Reserved-Instances-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"469\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"3 tips to secure Office 365 against hackers\",\"datePublished\":\"2018-08-01T00:35:23+00:00\",\"dateModified\":\"2022-09-05T21:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/\"},\"wordCount\":1252,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/08-Microsoft-Azure-Reserved-Instances-1.png\",\"keywords\":[\"Office Protect\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/\",\"name\":\"How to secure Office 365 against hackers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/08-Microsoft-Azure-Reserved-Instances-1.png\",\"datePublished\":\"2018-08-01T00:35:23+00:00\",\"dateModified\":\"2022-09-05T21:03:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Office 365 is increasingly being targeted by hackers. How can you make sure your instance is secure? Find out in this article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/08-Microsoft-Azure-Reserved-Instances-1.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/08-Microsoft-Azure-Reserved-Instances-1.png\",\"width\":1200,\"height\":469},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/officeprotect-tips-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"3 tips to secure Office 365 against hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to secure Office 365 against hackers","description":"Office 365 is increasingly being targeted by hackers. How can you make sure your instance is secure? Find out in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/","og_locale":"en_US","og_type":"article","og_title":"How to secure Office 365 against hackers","og_description":"Office 365 is increasingly being targeted by hackers. How can you make sure your instance is secure? Find out in this article.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2018-08-01T00:35:23+00:00","article_modified_time":"2022-09-05T21:03:21+00:00","og_image":[{"width":1200,"height":469,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/08-Microsoft-Azure-Reserved-Instances-1.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"3 tips to secure Office 365 against hackers","datePublished":"2018-08-01T00:35:23+00:00","dateModified":"2022-09-05T21:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/"},"wordCount":1252,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/08-Microsoft-Azure-Reserved-Instances-1.png","keywords":["Office Protect"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/","url":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/","name":"How to secure Office 365 against hackers","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/08-Microsoft-Azure-Reserved-Instances-1.png","datePublished":"2018-08-01T00:35:23+00:00","dateModified":"2022-09-05T21:03:21+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Office 365 is increasingly being targeted by hackers. How can you make sure your instance is secure? Find out in this article.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#primaryimage","url":"\/blog\/wp-content\/uploads\/08-Microsoft-Azure-Reserved-Instances-1.png","contentUrl":"\/blog\/wp-content\/uploads\/08-Microsoft-Azure-Reserved-Instances-1.png","width":1200,"height":469},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/officeprotect-tips-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"3 tips to secure Office 365 against hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Office Protect"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=16695"}],"version-history":[{"count":17,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16695\/revisions"}],"predecessor-version":[{"id":24001,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16695\/revisions\/24001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/16582"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=16695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=16695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=16695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}