Top 6 email security best practices to protect against phishing attacks and business email compromise

What should IT and security teams be looking for in an email security solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture.
The post Top 6 email security best practices to protect against phishing attacks and business email compromise appeared first on Microsoft Security. READ MORE HERE…

Read more

How to prevent phishing attacks that target your customers with DMARC and Office 365

DMARC security protocol helps you take control of who can send email messages on your behalf, eliminating the ability for cybercriminals to use your domain to send their illegitimate messages.
The post How to prevent phishing attacks that target your customers with DMARC and Office 365 appeared first on Microsoft Security. READ MORE HERE…

Read more

Automated incident response in Office 365 ATP now generally available

Powerful automation capabilities help improve the effectiveness and efficiency of investigating and responding to Office 365 alerts.
The post Automated incident response in Office 365 ATP now generally available appeared first on Microsoft Security. READ MORE HERE…

Read more

The evolution of Microsoft Threat Protection—July update

Learn about the latest enhancements to Microsoft Threat Protection, the premier solution for securing the modern workplace across identities, endpoints, user data, apps, and infrastructure.
The post The evolution of Microsoft Threat Protection—July update appeared first on Microsoft Security. READ MORE HERE…

Read more

Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
The post Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability appeared first on Microsoft Security. READ MORE HERE…

Read more

Step 8. Protect your documents and email: top 10 actions to secure your environment

The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In “Step 8. Protect your documents and email,” you’ll learn how to deploy Azure Information Protection and use Office 365 Advanced Threat Protection (ATP) and Exchange Online Protection to help secure your documents and emails.
The post Step 8. Protect your documents and email: top 10 actions to secure your environment appeared first on Microsoft Security. READ MORE HERE…

Read more