IT Teams Fall Short in Microsoft 365 Security Protections

IT Teams Fall Short in Microsoft 365 Security Protections

By Greg Tavarez

Remote and hybrid work environments prompted many enterprises to leverage solutions like Microsoft 365, perhaps sooner than they otherwise may have made the transition to the cloud. Across the board, digital transformation was accelerated as businesses moved to quickly adapt to new, though now familiar, work environments. The complexity of M365, with its 25 different apps and more than a dozen admin panels, paired with the skyrocketing usage made it difficult for IT teams to keep up with security monitoring and compliance.

CoreView, looking to understand what companies are doing well with M365, found that not all is as good as companies might want to think. An overwhelming majority ( 90%) of organizations have gaps in essential security protections falling into four areas: MFA, email security, password policies and failed logins.

The cause of the gaps? Common security procedures are not always followed. Even though most enterprises have strong documented security policies, CoreView’s research uncovered that most aren’t being implemented consistently due to difficulties in reporting and limited IT resources.

For example, 87% of companies have MFA disabled for some or all their admins. These are critical accounts that need protection. The research also found that most companies, a little more than 80% in fact, don’t have strong password requirements. Strong passwords, of course, are cornerstone of good security practices

The danger, of course, is these shortcomings leave the door open for cybersecurity threats.

“The role of the IT professional is more important and complex than ever. They need to stay in perfect compliance 100% of the time,” said Shawn Lankton, CEO of CoreView.

Additionally, companies face other challenges that make security and license management difficult, ultimately leading to unnecessary risks and costs. Around 22% of companies have unassigned M365 licenses – 17% have more than 10,000 licenses unassigned or inactive. These cases represent big opportunities to optimize license spend with better tools.

Inactive licenses pose a potential security risk that many IT teams may not think about. Users who left the organization might have access or may have poor password security and be easily hacked. They may also be a reflection of overpurchased licenses, where users don’t need the capabilities that were purchased.

This adds to the overall complexity for IT teams that struggle to keep up with best practices without a cohesive strategy for enforcing internal and external policies and continually ensuring compliance with these policies.

“To overcome this challenge, IT professionals require solutions that help automate compliance and delegate responsibilities to ensure security and efficiency across the business,” said Lankton.

Automating and delegating critical security, license optimization and other management tasks enable IT professionals to focus on important tasks instead of repetitive manual work.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

MSPToday Editor

SHARE THIS ARTICLE
Related Articles

Trellix Teams Up with Google Chrome Enterprise for Protection Against Insider Threats

By: Stefania Viscusi    4/23/2024

Cybersecurity firm Trellix, known for its extended detection and response (XDR) solutions, has partnered with Google Chrome Enterprise.

Read More

VulnCheck Closes Funding Round at $7.95M to Power Up Next-Generation Vulnerability Management

By: Greg Tavarez    4/23/2024

VulnCheck recently closed its seed funding round at a total of $7.95 million, with $4.75 million in new funding.

Read More

3Phase Makes the Switch: Ooma AirDial Replaces Legacy POTS for Reliable Elevator Communication

By: Greg Tavarez    4/23/2024

Ooma announced that 3Phase selected Ooma AirDial as the exclusive POTS replacement solution to recommend to its customers.

Read More

Businesses Face Security Woes in the Age of AI

By: Greg Tavarez    4/22/2024

Organizations may struggle to keep pace with evolving security landscapes, particularly in the face of AI advancements and the growing threat of softw…

Read More

ICYMI: From the MSP Market

By: Greg Tavarez    4/19/2024

Partnerships and product enhancements are on track to make waves in the MSP market.

Read More