Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft 365

CVE-2023-21716: Microsoft Word RCE Vulnerability

In the February 2023 Patch Tuesday, Microsoft fixed a remote code execution vulnerability in Microsoft Word, tracked as CVE-2023-21716. The vulnerability is critical, having a CVSS score of 9.8 out of 10, and could allow an attacker to execute code with the same privileges as the victim through rich text format (RTF) documents.

Best Practice Tips for Better SharePoint Site Security

Microsoft SharePoint is one of the most popular platforms for collaboration and content sharing within internal teams and even with external users. Therefore, ensuring SharePoint security is vital to helping your company avoid costly data breaches and business disruptions. This article details the key best practices for protecting your SharePoint sites, whether you are using on-prem SharePoint Server or SharePoint Online version.

SharePoint Security: 8 Most Common Vulnerabilities

Once written off as a failed CMS incapable of generating a significant user base, Microsoft’s SharePoint has continually defied expectations to become one of the most widely-used ECM and Collaboration products ever. It caters to over 200 million users and 250,000 organizations, including 85% of Fortune 500 companies. SharePoint is a user-friendly intranet portal and provides a consolidated center for document sharing, tracking, and overall project management.

External Sharing in SharePoint: Tips for Wise Implementation

Microsoft SharePoint enables users to share files with coworkers in just a few clicks. However, external sharing is just as easy— which puts the security of your sensitive data at risk. To help you control external sharing of files and folders without interfering with legitimate collaboration, this article details the external sharing settings available in the Microsoft administrative interfaces and offers best practices for configuring them.

Office 365 Backups - Sufficiently Protected. Readily Accessible. Reliably Stored.

In today's world, data is the backbone of any business, and the need for data protection is crucial. This video covers everything you need to know about Office 365 backups, including how we protect your data, ensuring it's always accessible and reliably stored.

Office365 Security Audit: Automate, Remediate, Repeat

Over the last two decades, the M365 service capabilities have developed rapidly and have evolved into a more complex version. In addition, the Security & Compliance Centre has rapidly expanded in response to the rising sophisticated attacks. Office 365 user numbers have reached approximately a whopping 345 million," broadly aligning with the 17% y-o-y increase in commercial revenue.

Octiga X Brigantia Launch Webinar 2023

Octiga presenting its solution to partners from Newcastle. Exciting presentation delivered by our Director, Dr Robert McFeely, to demonstrate how Octiga will help UK MSPs in solving frequent #M365 security management challenges for multiple clients. Looking forward to giving confidence to UK MSPs to deliver Office 365 security rapidly.

How to tackle Microsoft 365 account compromise and credential theft

A lot has changed since Sumo Logic last gave our two cents on how to secure Office 365. In the meantime, Office 365 has become Microsoft 365 (M365), and Sumo has continued evolving and expanding its security offering. Today’s threat actor is adept at compromising M365 accounts through various methods. Stealing credentials through phishing email campaigns and brute-force attacks has become commonplace.

How Microsoft 365 - E5 Can Help Protect Your Organization Against Phishing Attacks

Microsoft 365 E5 is an enterprise cloud-based suite of Microsoft Office productivity apps combined with advanced voice, analytics, security, and compliance services. It is an upgrade over lower tiers E1 and E3. Though threat protection features are included in all Microsoft or Office 365 subscriptions, an E5 license provides some advanced features.

Delivering Continuous Office365 Security Audits

Native auditing tools often lack the ability to customise security according to each organisation’s individual needs. It also lacks continuous auditing automation and easy-to-follow remediation. Octiga gets all these features on a single multi-tenant dashboard, freeing MSPs from the once-off ad hoc audits that go unnoticed.#m365 #office365 #mspartner #managedserviceprovider