The Cost of Microsoft Office 365 Security AND Compliance

Executive Summary So your organisation has decided to migrate to Microsoft Office 365. While you’ll likely benefit from its cloud collaboration capabilities, you might want to ask more about what Office 365 means for security, compliance and e-discovery. It sounds hard to turn down the promise of advanced threat protection, data protection and an online archive designed to meet privacy, compliance and data-retention requirements especially when it’s all included with your Office 365 deployment. Why spend more money on third-party email security or archiving when it comes as part of your Microsoft license? Aren’t all email security and compliance solutions pretty much the same? The answers to those questions aren’t that simple. While Microsoft security might be fine for some purposes, it could also lead to problems and cost more than you expect. Not all advanced threat, email security, or compliance archiving solutions are created equal. Think about it like the differences between a camping tent and a house. Both can keep you dry during a sudden rain shower. But in a winter storm with gale-force winds, only one of them will make a good shelter. In the same way, an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment. Why email security for Office 365 must be a top priority It’s no surprise that 91% of targeted attacks start with email.1 From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Phishing In the 20-plus years since it was first identified as a threat, phishing has morphed into a highly sophisticated technique for stealing credentials, funds and valuable information. Today’s phishing is multi-layered and evades many conventional defences. Attacks can be broad-based or highly targeted. Many use malware, but others don’t. Cybercriminals even deliver phishing emails through legitimate marketing services to evade spam filters and other defences. Whatever their tactics, phishing attacks are highly successful. According to Verizon’s 2016 Data Breach Investigations Report, users last year opened 30% of phishing messages, up from 23% in the prior year.2 And the SANS Institute reports that 95% of network attacks result from spear phishing.3 The Cost of Microsoft Office 365 Security and Compliance | report Proven Success at Leading Enterprises “Proofpoint has given us protection from standard bulk campaigns in Office 365 emails, giving us our time back to find more evil things. —CISO, Global 500 Manufacturer “Using Proofpoint to secure our Office 365 email has saved us time and money that would have otherwise been spent on rebuilding compromised systems.” —CSO, Fortune 500 Banking Company “Customer service and support has been excellent. The product works very well and has kept us phish-free for a year now.” —Kenneth Brown, CIO, Whitworth University “Office 365 allowed too many legitimate phishing messages through. We had users fall victim, despite all the end user training to not click and enter credentials. With Proofpoint, efficacy has greatly improved to the point where I can’t recall the last time it happened.” —Network Administrator, Private University 3 Malware Today’s creative attackers use automated tools to mine information about their targets from social media profiles, which are often public. That means attackers know where you work. They know your role, interests, hobbies, marital status, employment history and more. Attackers use these details to craft convincing email messages enticing you to click on a malicious URL or attachment. Once you click, a malicious payload drops onto your system. Business Email Compromise cybercriminals know that people use email more than any other communication tool Beyond these tactics, another technique has emerged as a new and serious threat: business email compromise (BEC). BEC attacks are spoofed emails from someone posing as an authority figure. For example, an email that appears to come from the CEO might ask a staff accountant to wire funds. Instead, the money goes straight to the cybercriminal impostor. BEC doesn’t stop at fraudulent transfers, either: attackers may also trick recipients into sending personally identifiable information, payroll details and more. These threats can have a big impact on your bottom line. Today, the average total cost of a data breach stands at $4 million, 29% more than the average in 2013, according to a 2016 IBM report.4 How does all of this relate to your Office 365 migration? The heart of Office 365 is Microsoft Exchange Online email. The built-in security, compliance and archiving capabilities that come with this simply don’t meet the needs of enterprise-class organisations. Too little email protection can lead to costly breaches that taint your brand, damage your reputation and hurt your bottom line. That’s why it’s important to enhance your Office 365 email defences. Attacks target people More attacks come in via email than through any other vector. That’s because cybercriminals know people use email more than any other communication tool. The bad guys typically target individuals in HR, IT, or finance with access to funds or high-value data. They use social engineering tactics to lure users into opening infected attachments, visiting malicious sites, or giving up assets (such as credentials or financial data). Once they gain entry to a user’s system with malware or stolen credentials, cybercriminals can penetrate corporate networks and exfiltrate treasure troves of sensitive information and valuable assets. So it’s no wonder that security has evolved into a boardroom challenge. Deploying a secure email gateway is clearly a business-critical decision. You can’t respond to what you can’t see To discover and respond to indicators of compromise (IoCs) effectively, you need the right insights. Unless you have an email gateway that provides you with deep, detailed reporting, you’ll be left searching for the proverbial needle in the haystack. Blocking threats using an email gateway has two critical advantages. First, you gain understanding about the whole attack, not just the final stages of it, after it has reached your network. Second, by catching threats at the gateway, you can stop them before they compromise your environment. Siloed security is not sustainable In the ever-evolving threat landscape, hackers coordinate attacks across multiple vectors. A well-orchestrated defence is vital to a good security posture. Protecting Office 365 is a top priority. But an effective solution must also integrate with the rest of your security ecosystem. From your firewall to your security management platform, smart and automated coordination can help you effectively prioritise and contain the impact of threats. 4 The Cost of Microsoft Office 365 Security and
Please complete the form to gain access to this content