{"id":7998,"date":"2021-03-08T10:18:51","date_gmt":"2021-03-08T10:18:51","guid":{"rendered":"https:\/\/blog.cloudthat.com\/?p=7998"},"modified":"2024-06-25T11:08:45","modified_gmt":"2024-06-25T11:08:45","slug":"detecting-and-preventing-cyber-attacks-with-securethat","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/detecting-and-preventing-cyber-attacks-with-securethat","title":{"rendered":"Detecting and Preventing Cyber attacks with SecureThat"},"content":{"rendered":"<h3 style=\"text-align: center;\"><span data-contrast=\"auto\">&#8220;Security in IT is like locking your house or car \u2013 it\u00a0<\/span><span data-contrast=\"auto\">doesn\u2019t<\/span><span data-contrast=\"auto\">\u00a0stop the bad guys, but if it\u2019s good enough they may move on to an easier target.&#8221;<\/span><span data-contrast=\"auto\">\u00a0&#8211; Paul Herbka<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">62% of businesses experienced phishing and social engineering attacks in 2018.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">68% of business leaders feel their cybersecurity risks are increasing.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Only 5% of companies\u2019 folders are properly protected, on average.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">So,<\/span><span data-contrast=\"auto\">\u00a0there is no denying that security is the need of the hour.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">We can\u2019t stop attackers from attacking\u00a0<\/span><span data-contrast=\"auto\">us but what we can do<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">is take\u00a0<\/span><span data-contrast=\"auto\">proper steps to keep our organization safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"auto\">Some of the most prominent attack vectors<\/span><span data-contrast=\"auto\">\u00a0are:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Phishing<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Malware<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Spam<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Credential theft<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">There are plenty more\u00a0<\/span><span data-contrast=\"auto\">attack\u00a0<\/span><span data-contrast=\"auto\">vectors,<\/span><span data-contrast=\"auto\">\u00a0but the above ones are the most used to get into the organization<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a security admin\u00a0<\/span><span data-contrast=\"auto\">of an organization, you are accountable<\/span><span data-contrast=\"auto\">\/responsible for taking all\u00a0<\/span><span data-contrast=\"auto\">proper measures to keep your<\/span><span data-contrast=\"auto\">\u00a0company\u2019s critical resources and data safe. It includes\u00a0<\/span><span data-contrast=\"auto\">your\u00a0<\/span><span data-contrast=\"auto\">employee\u2019s<\/span><span data-contrast=\"auto\">\u00a0data, their personal information,<\/span><span data-contrast=\"auto\">\u00a0and\u00a0<\/span><span data-contrast=\"auto\">your client\u2019s data<\/span><span data-contrast=\"auto\">\/<\/span><span data-contrast=\"auto\">\u00a0your\u00a0<\/span><span data-contrast=\"auto\">Intellectual property safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Microsoft here has come to the rescue with its Microsoft 365\u00a0<\/span><span data-contrast=\"auto\">suite (<\/span><span data-contrast=\"auto\">which includes all security solutions and workspace tools).<\/span><span data-contrast=\"auto\">\u00a0Most of you might be familiar with<\/span><span data-contrast=\"auto\">\u00a0the Office suite offering of Microsoft.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Let\u2019s have a look at\u00a0<\/span><span data-contrast=\"auto\">the\u00a0<\/span><span data-contrast=\"auto\">Security<\/span><span data-contrast=\"auto\">\u00a0solutions<\/span><span data-contrast=\"auto\">\u00a0offered<\/span><span data-contrast=\"auto\">\u00a0by Microsoft:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2022\/11\/ST1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7999\" src=\"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2022\/11\/ST1.png\" alt=\"Microsoft Offerings\" width=\"667\" height=\"284\" \/><\/a><\/p>\n<p><span data-contrast=\"auto\">Microsoft has changed names for some of the tools. The new names are:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Microsoft Defender for Identity\u00a0(formerly Azure Advanced Threat Protection)\u00a0<\/strong><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong>Microsoft Defender for Office365\u00a0(formerly Office365 Advanced Threat Protection)\u00a0<\/strong><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Microsoft Defender for Endpoint\u00a0(formerly\u00a0Windows Defender Advanced Threat\u00a0protection)\u00a0<\/strong><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><strong>Azure Defender (formerly Azure Security center)\u00a0<\/strong><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">In\u00a0<\/span><span data-contrast=\"auto\">addition,<\/span><span data-contrast=\"auto\">\u00a0you also\u00a0<\/span><span data-contrast=\"auto\">get<\/span><span data-contrast=\"auto\">\u00a0features<\/span><span data-contrast=\"auto\">\u00a0like Azure Information Protection and a\u00a0<\/span><span data-contrast=\"auto\">Data loss prevention policy to keep your data safe. You also get a lot of compliance features that<\/span><span data-contrast=\"auto\">\u00a0help you meet the regulatory compliance standards.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To understand your\u00a0<\/span><span data-contrast=\"auto\">current security posture in terms of Microsoft<\/span><span data-contrast=\"auto\">365\u00a0<\/span><span data-contrast=\"auto\">you can have a look\u00a0<\/span><span data-contrast=\"auto\">at the security score available at the<\/span><strong>\u00a0<a href=\"http:\/\/security.microsoft.com\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>365\u00a0Security center<\/strong><span data-contrast=\"auto\">. You have similar scores for your compliance posture and\u00a0<\/span><span data-contrast=\"auto\">azure resources which are available on the Microsoft365\u00a0<\/span><span data-contrast=\"auto\">compliance center and Azure Defender center.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To manage\u00a0<\/span><span data-contrast=\"auto\">all these, you have a variety of portals.\u00a0<\/span><span data-contrast=\"auto\">Some of the are<\/span><span data-contrast=\"auto\">\u00a0Office365 security and compliance center, Intune portal<\/span><span data-contrast=\"auto\">, Endpoint manager portal, Microsoft Defender portal<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After reading all this you might have a lot\u00a0<\/span><span data-contrast=\"auto\">of questions. How to start? Where to start? Which portal to use? What configurations to change?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nothing to worry about. We at\u00a0<\/span><b><span data-contrast=\"auto\">SecureThat<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">are a group of Microsoft365 experts who can help you out. We can help you with the following services:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Make the most of the lic<\/span><span data-contrast=\"auto\">enses you have<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Help\u00a0<\/span><span data-contrast=\"auto\">you\u00a0<\/span><span data-contrast=\"auto\">with solutions and\u00a0<\/span><span data-contrast=\"auto\">options<\/span><span data-contrast=\"auto\">\u00a0(for licenses)<\/span><span data-contrast=\"auto\">\u00a0according to your security posture and requirements<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">All around the management of your Microsoft365 workspace<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Help you create a SOC\u00a0<\/span><span data-contrast=\"auto\">environment and SOAR setup<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Help you build a dashboard to give\u00a0<\/span><span data-contrast=\"auto\">the admins (also your executive leaders) a graphical representation of security events happening in your\u00a0<\/span><span data-contrast=\"auto\">organization<\/span><span data-contrast=\"auto\">.\u00a0<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2022\/11\/ST2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8000\" src=\"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2022\/11\/ST2.png\" alt=\"Dashboard\" width=\"739\" height=\"292\" \/><\/a><\/p>\n<p><span class=\"TextRun SCXW252400270 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW252400270 BCX0\">Your dashboard will look something like the picture below:\u00a0<\/span><\/span><\/p>\n<p><a href=\"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2022\/11\/ST3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8001\" src=\"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2022\/11\/ST3.png\" alt=\"Dashboard\" width=\"645\" height=\"370\" \/><\/a><\/p>\n<p><span data-contrast=\"auto\">For any queries feel free to contact us at\u00a0<\/span><strong><a href=\"mailto:sales@cloudthat.in\" target=\"_blank\" rel=\"noopener\">sales@cloudthat.in<\/a><\/strong><span data-contrast=\"auto\"><strong>\u00a0<\/strong>or you can fill the form with your requirements and we will connect with you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=97JdgToej0OL3eVd6CWt7kBwNFrBSbxMq6yg9q07wTxUOE9WV0NOWTA4UUlTN1RNU1VMVVlZTlpOUS4u\" target=\"_blank\" rel=\"noopener\"><strong>Click here to access the form.\u00a0<\/strong><\/a><\/p>\n<p><span data-contrast=\"auto\">Check out my upcoming blog on different Microsoft portals and how can they be useful to you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"author":219,"featured_media":8073,"parent":0,"comment_status":"open","ping_status":"open","template":"","blog_category":[4459],"user_email":"prarthitm@cloudthat.com","published_by":"1","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/7998"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=7998"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/7998\/revisions"}],"predecessor-version":[{"id":56892,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/7998\/revisions\/56892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=7998"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=7998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}