Intelligent CISO Issue 66 | Page 72

It is paramount to lead with a multi-dimensional approach . When you assess the problem , you are protecting multiple areas ; underlying data across collaboration tools , people and all communication channels .
BUSINESS SURVEILLANCE
Lastly , the power of APIs ( Application Programming Interfaces ) is a significant advantage that is hugely underestimated . Instead of applications working in silos , integrating various security technologies through APIs will enable the sharing of threat information and enhance preventive measures across network and device levels . So , leveraging APIs , ensuring visibility , optimising incident response and managing overwhelming incidents all contribute to a more robust defence against threats .
What are some of the features included within Microsoft 365 that help ensure stronger security and what are its limitations ?
Let ’ s focus on key security features . Even the basic Microsoft license now offers comprehensive protection and this will cover various risks like accidents , malicious attachments and allow Business Continuity . While this might be true , the extent to which they provide this protection is very limited . For instance , if an entrylevel scam happens on Microsoft ’ s site , we can rely on reputation databases to detect any malicious URLs and block them .

It is paramount to lead with a multi-dimensional approach . When you assess the problem , you are protecting multiple areas ; underlying data across collaboration tools , people and all communication channels .

Mimecast does the same thing but that ’ s where the similarity ends . We protect from a lot more attack vectors and not just a reputational database . True security requires more advanced techniques and this is where we specialise , using AI to better identify such threats and detect impersonation attacks .
Similarly , Microsoft ’ s impersonation protection can be configured as a policy , but its scope is limited to only about 60 users . If an organisation has as many as 1,600 users , applying this becomes complex as we would have to create hundreds of impersonation policies to protect those users . So , it ’ s not just from a technology perspective but from the ease of use , admin and maintenance headaches .
Additionally , depending solely on Microsoft for email continuity is risky as recent events have shown the system ’ s vulnerability to downtime . Aside from the technological limitations , if an attack happened and you were in the recovery process , it would be difficult
72 www . intelligentciso . com