{"id":717,"date":"2018-05-11T08:58:46","date_gmt":"2018-05-11T08:58:46","guid":{"rendered":"https:\/\/anakage.in\/blog\/?p=717"},"modified":"2022-07-05T15:13:49","modified_gmt":"2022-07-05T15:13:49","slug":"protect-against-phishing","status":"publish","type":"post","link":"https:\/\/www.anakage.com\/blog\/protect-against-phishing\/","title":{"rendered":"How to protect against phishing in Office 365"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-720 aligncenter\" src=\"https:\/\/anakage.com\/blog\/wp-content\/uploads\/2018\/05\/phishing.jpg\" alt=\"\" width=\"620\" height=\"349\" \/><\/p>\n<p>To Protect against phishing is one of the mandatory things which is in the priority list of any organization. We will take you through some of the top tools you can use. And how to protect your employees against phishing who happens to be a weakest link in this war against phishing by training them using various simulators.<\/p>\n<p>We were just back from <a href=\"https:\/\/www.gartner.com\/events\/apac\/data-center-india\" target=\"_blank\" rel=\"noopener\">Gartner<\/a> conference where we heard regarding security Windows 10 and Office 365.\u00a0Microsoft Office 365 adoption is going on a great pace. This along with Windows 10 and is one of the top priorities for IT department in any organisation. <a href=\"https:\/\/support.microsoft.com\/en-in\/help\/13853\/windows-lifecycle-fact-sheet\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> is ending support for fixing security problems for Windows 7 on January 14, 2020. This is also reason why organisations are rushing for Windows 10 upgrade. <a href=\"https:\/\/www.cio.com\/article\/3187503\/windows\/why-enterprises-are-upgrading-to-windows-10-faster-than-expected.html\" target=\"_blank\" rel=\"noopener\">Security<\/a> is one one of the most liked features in Windows 10.<\/p>\n<p>Yet we keep on hearing about phishing attacks through Emails.\u00a0Why does Office 365 does not protect against phishing. We put some research on what is available in market.<\/p>\n<h2>What is a phishing attack &#8211;<\/h2>\n<p>This is also known as phishing which is defined as an act of sending an email to the user in order to steal his personal information like bank account details, credit card information, login credentials, etc. Such email falsely claims to be from an established organization and makes the user surrender his private information. These confidential data are misused for identity theft. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.<\/p>\n<p>As per www.phishing.org &#8211;\u00a085% of organisations have been impacted,\u00a0100 billion spam mails are sent each day,\u00a0Damages exceeds one billion dollars. How do you protect your organisation against phishing?<\/p>\n<h2>What tools are available to protect against phishing attacks and safe guard Emails?<\/h2>\n<p>In this post, we\u2019ll review how different protection services provide holistic end-to-end protection against today\u2019s most sophisticated phishing campaigns.<\/p>\n<p>Here are the top 5 vendors to watch out for in Email security market.<\/p>\n<h4>1) Proofpoint &#8211;\u00a0<a href=\"https:\/\/www.proofpoint.com\/us\/products\/email-protection\" target=\"_blank\" rel=\"noopener\">Proofpoint enterprise email protection<\/a>.<\/h4>\n<p>Proofpoint Email Protection stops\u00a0<a href=\"https:\/\/www.proofpoint.com\/us\/threat-reference\/malware\" target=\"_blank\" rel=\"noopener\">malware<\/a>\u00a0and non-malware threats such as impostor email (also known as email fraud). Deployed as a cloud service or on-premises, it provides granular filtering to control bulk &#8220;graymail&#8221; and other unwanted email. And business continuity capabilities keep email communications flowing, even when your email server fails.<\/p>\n<p>Proofpoint enterprise email protection features<br \/>\nA) Threat Protection.<br \/>\nB) Spam Protection.<br \/>\nC) Data Loss Prevention.<br \/>\nD) Encryption.<br \/>\nE) Deployment Options.<br \/>\nF) Integrations.<\/p>\n<p>See complete data sheet <a href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/proofpoint-email-protection-data-sheet.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n<h4>2) Cisco &#8211;\u00a0<a href=\"https:\/\/www.cisco.com\/c\/en_in\/products\/security\/email-security\/index.html\" target=\"_blank\" rel=\"noopener\">Cisco Email Security<\/a>.<\/h4>\n<p>Cisco\u00ae Email Security enables users to communicate securely. It helps organizations combat business email compromise\u00a0(BEC), ransomware, advanced malware, phishing, spam, and\u00a0data loss with a multilayered approach to security.<\/p>\n<p>Cisco Email Security Appliance features.<br \/>\nA) Global threat intelligence.<br \/>\nB) Spam blocking.<br \/>\nC) Graymail detection and safe unsubscribe.<br \/>\nD) Advanced Malware Protection.<br \/>\nE) Outbreak filters.<br \/>\nF) Web interaction tracking.<br \/>\nG) Outbound message control.<br \/>\nH) Forged Email Detection.<br \/>\nI) Data Loss Prevention.<\/p>\n<p>See complete data sheet <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/email-security-appliance\/data-sheet-c78-729751.html\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n<h4>3) Microsoft &#8211;\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/jj723119(v=exchg.150).aspx\" target=\"_blank\" rel=\"noopener\">Exchange Online Protection<\/a>.<\/h4>\n<p>An incoming message initially passes through connection filtering, which checks the sender\u2019s reputation and inspects the message for malware. The majority of spam is stopped at this point and deleted by EOP. Messages continue through policy filtering, where messages are evaluated against custom transport rules that you create or enforce from a template. For example, you can have a rule that sends a notification to a manager when mail arrives from a specific sender. (Data loss prevention checks also occur at this point, if you have that feature; for information about feature availability, see the\u00a0<a href=\"http:\/\/go.microsoft.com\/fwlink\/p\/?LinkId=320619\" target=\"_blank\" rel=\"noopener\">Exchange Online Protection Service Description<\/a>.) Next, messages pass through content filtering, where content is checked for terminology or properties common to spam. A message determined to be spam by the content filter can be sent to a user\u2019s Junk Email folder or to the quarantine, among other options, based on your settings. After a message passes all of these protection layers successfully, it is delivered to the recipient.<\/p>\n<p>Exchange Online Protection features.<br \/>\nA) Anti-spam protection.<br \/>\nB) Spam management.<br \/>\nC) Anti-malware protection.<br \/>\nD) Mail routing and connectors.<br \/>\nE) Transport rules.<br \/>\nF) Administration.<br \/>\nG) Reporting and logging.<br \/>\nI) Service Level Agreements (SLAs) and support.<\/p>\n<h4>4) Symantec &#8211;\u00a0<a href=\"https:\/\/www.symantec.com\/products\/email-security-cloud\" target=\"_blank\" rel=\"noopener\">Symantec Email Security cloud<\/a>.<\/h4>\n<p>Symantec Email Security.cloud you can block virus, malware, spam, phishing, and targeted attacks before they reach your inbox.<\/p>\n<p>Symantec Email Security.cloud features.<br \/>\nA) Emerging threat prevention.<br \/>\nB) Phishing defense.<br \/>\nC) Malware and spam protection.<br \/>\nD) Symantec Global Intelligence Network.<br \/>\nE) Isolate.<br \/>\nF) Integrate.<br \/>\nG) Gain high operational efficiency at a low TCO.<\/p>\n<p>See complete data sheet <a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/data-sheets\/email-security-cloud-en.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n<h4>5) Mimecast &#8211;\u00a0<a href=\"https:\/\/www.mimecast.com\/products\/email-security-with-targeted-threat-protection\/secure-email-gateway\/\" target=\"_blank\" rel=\"noopener\">Secure Email Gateway<\/a><\/h4>\n<p>Mimecast Secure Email Gateway uses sophisticated, multi-layered detection engines and intelligence to protect email data and employees from malware, spam, phishing, and targeted attacks &#8211; 100% from the cloud.<\/p>\n<p>A) Always-on security.<br \/>\nB) Increased protection.<br \/>\nC) Enhanced visibility and control.<br \/>\nD) End user self-service.<\/p>\n<p>See data sheet <a href=\"https:\/\/www.mimecast.com\/resources\/datasheets\/dates\/2012\/10\/mimecast-email-security\/\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n<h2>Besides this Office 365 also has many security <a href=\"http:\/\/blog.goptg.com\/top-6-security-features-in-office-365\" target=\"_blank\" rel=\"noopener\">features<\/a>\u00a0like &#8211;<\/h2>\n<p>A) Multi-Factor Authentication.<br \/>\nB) Mobile Device Management.<br \/>\nC) Advanced Threat Protection.<br \/>\nD) Encrypted Email.<br \/>\nE) Data Loss Prevention.<br \/>\nF) Azure Identity Protection.<br \/>\nG) Privileged Identity Management.<\/p>\n<p>Read in details about what your organisation can do with built in security features to prevent phishing attacks. And what to do after it has happened in this <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/07\/how-office-365-protects-your-organization-from-modern-phishing-campaigns\/\" target=\"_blank\" rel=\"noopener\">link<\/a>.<\/p>\n<h2>Employees are weakest link in war to protect against phishing attacks so train them &#8211;<\/h2>\n<p>No system is completely effective and even with best security tools things can go wrong.\u00a0Your users are the weakest link in defending against cyber crime like phishing. They need to stay informed about the latest phishing threats and how to avoid becoming a victim to keep themselves and your organization safe.<a href=\"https:\/\/www.vadesecure.com\/en\/phishing-awareness-training-8-things-employees-understand\/\" target=\"_blank\" rel=\"noopener\">Training<\/a> your employees is one of the must do things to avoid these risks.<\/p>\n<p>Why wait for real attack. Try out internal phishing <a href=\"https:\/\/www.techrepublic.com\/article\/want-to-improve-cybersecurity-try-phishing-your-own-employees\/\" target=\"_blank\" rel=\"noopener\">exercises<\/a>. These <a href=\"http:\/\/resources.infosecinstitute.com\/top-9-free-phishing-simulators\/#gref\" target=\"_blank\" rel=\"noopener\">free<\/a> phishing simulators will help you to protect against phishing attacks by putting employees in real life situations and gauging how prepared you are.<\/p>\n<p>You can also reach us to help you in your automation journey by filling this <a href=\"http:\/\/anakage.in\/contact us.html\" target=\"_blank\" rel=\"noopener\">form<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To Protect against phishing is one of the mandatory things which is in the priority list of any organization. We [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":720,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"coauthors":[97],"class_list":["post-717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips"],"views":247,"jetpack_featured_media_url":"https:\/\/www.anakage.com\/blog\/wp-content\/uploads\/2018\/05\/phishing.jpg","jetpack_sharing_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/comments?post=717"}],"version-history":[{"count":0,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/posts\/717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/media\/720"}],"wp:attachment":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/media?parent=717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/categories?post=717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/tags?post=717"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/coauthors?post=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}