<img src="https://ws.zoominfo.com/pixel/JV60JGR5LG4sEWlH3Xte" width="1" height="1" style="display: none;">

Implementing Foundational Security Controls for Every Office 365 Environment

Posted by Brian Greidanus on Aug 4, 2020

In our previous post, we provided an overview of each of the 12 Foundational Security Controls that should be implemented for every Office 365 environment to deter business email compromise (BEC), account takeover (ATO) attacks, and unauthorized data access.

Read More

Foundational Security Controls for Every Office 365 Environment

Posted by Brian Greidanus on Jun 10, 2020

As many organizations continue to adjust to an extended and potentially permanent remote workforce, dependency on cloud services has increased rapidly – as Microsoft CEO Satya Nadella stated in a recent earnings release – “We’ve seen two years worth of digital transformation in two months. The following post is intended to help organizations that may have recently begun using or have increased their usage of Office 365. 

Please note Microsoft continues to evolve their platform and these recommendations are current as of this posting.

Read More

SecureSky Cyber Threat Center Sees Greater Than 6 Times Increase In Attacks

Posted by Mike Hrabik, SecureSky CEO on Apr 2, 2020

But There’s Still a Lot of Good Things Happening In These Trying Times! One of the most staggering statistics reported recently from the SecureSky Cyber Threat Center is seeing a 6x-7x increase in fraudulent scams and BEC cases in the last 30 days, with COVID-19 themes – phishing, fake investment, charities, prevention or treatment offers and testing scams. We have seen similar trending of overall phishing volumes from multiple clients and email gateway providers, which correlates to the sharp uptick in case volume, as well as click rates.

Read More

CIS Microsoft 365 Benchmark v1.1 Released

Posted by Brandon Cox on Jan 15, 2020

I am pleased to have participated in and been named a co-editor of the most recent release (version 1.1) of the Center for Internet Security Microsoft 365 Foundations Benchmark. Sharing SecureSky’s extensive O365 incident response experience and security controls recommendations to give back to the O365 security community was a great opportunity.

Read More

Detecting BEC Attacks and Compromise - Part 5

Posted by Gary Napotnik on Nov 22, 2019

1.0 Introduction

Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection!

In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to discuss how BEC attacks work against O365 environments. In Part 3, we discussed key Office 365 (O365) configuration settings that organizations can implement to protect against BEC attacks. In Part 4, we discussed key logging and auditing capabilities in O365 that can help organizations detect BEC attacks against their environment.

Read More

Configuration of Office 365 to Protect Against BEC Attacks - Part 3

Posted by Gary Napotnik on Sep 4, 2019

In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to discuss how BEC attacks work against O365 environments. In this third entry, we will discuss a number of key Office 365 configuration settings that organizations can implement to protect against BEC attacks. 

Read More

Threat Investigation: Anatomy of A Business E-Mail Compromise Attack - Part 2

Posted by Gary Napotnik on Aug 5, 2019

The Unassuming Threat: Business E-Mail Compromise & Office 365 Vulnerabilities

Business e-mail compromise (BEC) is a class of cyber-crime that is growing rapidly. Over the past five years, BEC attacks have resulted in billions of dollars in losses from companies of all sizes across numerous industries.

This post is Part 2 of SecureSky’s multi-part blog series about BEC. In Part 1, we provided an introduction to BEC and discussed why this cyber security threat is increasing. In this post, we’ll take you through a recent SecureSky BEC investigation and explore an example of how BEC is executed against O365 environments.

Read More

The Unassuming Threat: Business E-Mail Compromise - Part 1

Posted by Gary Napotnik on Aug 4, 2019

Across the globe, companies and organizations of all sizes have faced an increasing onslaught of the cyber-crime known as business e-mail compromise (BEC). Perpetrated by organized crime groups, BEC attacks have resulted in losses of billions of dollars over the last decade. So how do you prepare and protect your organization from BEC? 

Read More