There are plenty of scary statistics out there to keep you awake at night.
A recent CSO article on the rise of mobile phishing attacks opened with the line: “91% of all cyberattacks start with a phishing email.”
With the same study showing phishing attempts on the rise and the average cost to mid-sized companies at a cool $1.6 million, we don’t have an option: it must be a key focus area in ThirdSpace’s cyber security strategy and our defence against malicious attackers.
Fortunately, we have ATP anti-phishing protection. A recent addition from Microsoft to its Office 365 Advanced Threat Protection toolkit.
ATP anti-phishing protection provides 3 key benefits:
With ATP anti-phishing, you can prevent up to 20 members of your organisation from being digitally imitated.
It’s a common spear phishing technique to impersonate a CEO or high-level board member with the goal of gaining information or money from someone who reports to them.
ATP anti-phishing pays special attention to these individuals and will intercept any email that looks like it could have been sent by them, but really hasn’t.
This is achieved through machine learning models together with highly intelligent impersonation detection algorithms.
It’s not just individuals you can prevent from being impersonated – but domains as well!
Another common method of tricking users to provide their credentials or carry out an action is to send an email from a domain name that looks like your own.
At a glance, microsoft.com and mircosoft.com look the same.
ATP anti-phishing will detect this and can be configured to warn the user, move the mail to their junk folder, or even block it completely before it’s delivered.
It already knows the domains you have configured in Office 365 and protects these by default, but it can be configured to protect other domains – as well as ignore those that are similar but legitimate.
In fact, whether it’s a user or domain impersonation attempt, you’ll have complete control over what happens next – from quarantining the message to providing the user with anti-phishing safety tips.
This feature is particularly advanced.
It looks at each user who has an Office 365 mailbox and learns their individual sender map. This is basically a table of who you communicate with on a frequent basis. It helps to build up a picture of legitimate relationships – for example, sister companies, customers and suppliers.
If any of these contacts are spoofed, ATP anti-phishing will inform you that you aren’t speaking to the person you think you are.
To enable ATP anti-phishing protection, you will need an Office 365 Enterprise E5 license – although you can add-on as part of a different subscription.
The true value is when you combine anti-phishing protection with the rest of the of the Office 365 ATP suite and correctly configured Exchange Online Protection policies. Once that’s in place, you’ll have gone a long way to protecting your organisation from a potentially expensive attack.
Next, watch our conditional access and MFA webinar on-demand and learn why these technologies are key to securing your organisation’s assets.
Or download ‘The business case for cyber security’ e-Guide for best practice on how to take a proactive and pre-emptive approach to tackling the issue.
Visualise your current security and privacy position, and gain an improvements roadmap.Learn more
Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.
Oxford Computer Group UK officially rebranded as ThirdSpace in the UK on 16 October. This rebrand reflects our broadening identity and security solutions, as working practices extend from the office and home into working flexibly and collaboratively from anywhere – Your "ThirdSpace".Continue to ThirdSpace
You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.