Gone Phishing? Tips to Avoid Email Compromise

6/20/2019 - By Jason Keith, CIA

Email hacking isn’t new but for Microsoft CEO, Satya Nadella, Office 365 “O365” and it's 180 million active users and counting, it could become a crisis. With more than 4 million new users a month, the rapid corporate adoption of this platform makes it a huge target for the hacker community. According to Juniper Research, the global cost for cybercrime has the capability of reaching $2 trillion by the end of 2019. With $2 trillion you could buy the NFL franchise, the entire Apple company and still have pocket change to spend $1 million a day for over 3,000 years.

Cofense PhishMe, a security awareness and solutions company, conducted a research campaign on 1,000 of its customers and concluded that 91% of cyber-attacks are the result of phishing emails. Phishing is a fraudulent attempt to obtain sensitive information by distinguishing oneself as a trustworthy entity in the form of electronic communication. 

With phishing becoming a rapid problem, the Department of Homeland Security NCCIC released Analysis Report (AR19-133A) in May of this year that included suggestions and observations for O365 implementations. In the report the Cyber Security Infrastructure Agency (CISA) made the following five suggestions:

  • Use multi-factor authentication (suggested for administrator but should be utilized by all)
  • Enable unified audit logging (newer implementations likely do this automatically)
  • Enable mailbox auditing for users (again newer implementations likely do this automatically)
  • Ensure Azure AD password sync is configured correctly prior to user migration
  • Disable legacy email protocols  

The best suggestion from the CISA to protect your environment is to use multi-factor authentication. It isn’t perfect but it does make you less susceptible to a hack than many others. Proper authentication doesn’t always require a text to your phone at login. Consider the following actions to further harden your O365 implementation:

  • Remove remote Powershell from O365
  • Enhance your training with phishing campaigns and train on weaknesses identified
  • Know your Microsoft secure score and consider improving it by taking a closer look at the control list of actions worth improving
  • Verify that outsourced providers have taken reasonable security precautions because you don’t want to find out the hard way

Securing your email environment is possibly one of the most cost-effective ways you can prevent yourself from becoming a part of a phishing scam. Please email me or contact a member of our Information Technology team to learn more about how you can prevent a cybersecurity attack.  

About the Author | Jason Keith, CIA
Jason is a consultant in the Financial Institution Advisory Group of Saltmarsh, Cleaveland & Gund. Jason specializes in technology solutions for various practice areas within financial institutions. Over the past 18 years, he has served in financial institutions as a Compliance Officer, Internal Bank Director, Operations Officer, Credit Administration Officer, Lender, Accountant, Chief Information Officer, Internal Auditor, and Risk Officer. 

Related Posts

Saltmarsh CPA - Who We Are

Who We Are

Our professionals have the depth of experience, industry knowledge and worldwide resources to help you reach your goals. We put your success above all else as your trusted advisor.

Saltmarsh CPA - What We Do

What We Do

Saltmarsh offers a full range of professional services to accommodate your needs – from tax planning and accounting services to information technology and employee benefits consulting.

Saltmarsh CPA - Who We Serve

Who We Serve

Saltmarsh serves individuals and businesses. Personal attention, access to the right professionals and rapid response is how we serve.

Contact Us

(850) 243-6713

(407) 203-8990

(615) 661-0885

(850) 435-8300

(813) 287-1111

(800) 477-7458

Stay Connected

Sign up to receive updates and important information from Saltmarsh!