Skip to content
    April 11, 2022

    Defending Against Common Microsoft 365 Attacks

    For organizations that use Microsoft 365, it’s a cornerstone of their business. Users rely on it to log in, receive and send email, and store and share sensitive data.

    Microsoft 365 is also the most targeted software for cyberattacks, according to Statista. 

    These factors alone make Microsoft 365 a critical piece of technology to monitor. Adversaries tend to reuse techniques, tactics and procedures (TTPs) to launch their attacks — and there are some common Microsoft 365 attacks that you’ll want to watch out for. You’ll learn:

    • How to detect threat actors’ favorite techniques for Microsoft 365 attacks
    • Why Microsoft 365’s built-in security settings aren’t enough protection
    • Easy ways to protect yourself against the rise in Microsoft 365 attacks

    This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.

    Participants

    Matthew Warner, CTO and Co-Founder, Blumira

    Matt is CTO and Co-Founder of Blumira, a leading cybersecurity provider of automated threat detection and response technology. At Blumira, he leads the security and engineering efforts to provide actionable insights into cybersecurity risks at scale. Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.

    Watch On-Demand: Defending Against Common Microsoft 365 Attacks

     

    Erica Mixon

    Erica is an award-winning writer, editor and journalist with over ten years of experience in the digital publishing industry. She holds a Bachelor’s degree in writing, literature and publishing from Emerson College. Her foray into technology began at TechTarget, where she provided editorial coverage on a wide variety...

    More from the blog

    View All Posts