{"id":89223,"date":"2019-04-03T12:00:32","date_gmt":"2019-04-03T19:00:32","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89223"},"modified":"2023-05-15T23:09:07","modified_gmt":"2023-05-16T06:09:07","slug":"secure-access-microsoft-365-enterprise-e5","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/","title":{"rendered":"Secure access to your enterprise with Microsoft 365"},"content":{"rendered":"
Most lessons in cybersecurity are born out of necessity. In this case, it was my need for a haircut.<\/p>\n
Last weekend, I was reminded why it\u2019s time to rethink the conventional wisdom about secure passwords and user access. I was making an appointment online and at the very end of the process, the website asked me to sign in to complete the transaction. The problem? I had forgotten my password. I was prompted to answer security questions and then reset my password with a new eight-character word that includes at least one capital letter, one lowercase letter, a number, and a symbol. The thing that bothers me is that I considered re-using another password\u2014maybe the one I use for Facebook or OpenTable\u2014at least then I\u2019d remember it! But I\u2019m in the security industry. I know better. I\u2019ve heard too many stories about a hacker stealing a password from some no-name site only to parlay it into access to a large organization. In the end, I did what we always tell our users to do and generated a unique password (I really needed that haircut), but I understand why so many users don\u2019t. It\u2019s an impossible task, and the truth is, these rules aren\u2019t making us any more secure.<\/p>\n
What if we could make user access simpler for users and simultaneously more secure for the enterprise?<\/em> That’s the topic of the first e-book in a six-part series that describes how you can use the full Microsoft 365 Enterprise E5 suite to comprehensively address today\u2019s security challenges without reducing employee productivity.<\/p>\n The first e-book, Secure access to your enterprise<\/a>, tells the story of Christina, Vice President of Operations, who is savvy about security, but is also very busy. The e-book gives you a real-world perspective on how the requirements of her job can put the enterprise at risk, even when she does everything right. Learn how Azure Active Directory (Azure AD) integrates with other security products in Microsoft 365 to reduce the likelihood that a user\u2019s password will be stolen, detect when a user has been compromised, and to give you back control when a user is compromised.<\/p>\n One of the reasons that user credentials are stolen or guessed is because people must remember so many of them. Even your most senior users may use the same password for several applications, which increases the likelihood that the password will be stolen. A good user access solution simplifies access, so your users are encouraged to use secure authentication methods, and it verifies user identity at every sign-in. The Secure access to your enterprise<\/a> e-book provides more context around why passwords are at risk and offers up solutions such as Azure AD single sign-on (SSO) that are simple and more secure.<\/p>\n Even when good preventative practices are in place, you need to adopt an \u201cassume breach\u201d mindset. Bad actors have the patience and resources to find and exploit even the smallest vulnerability. Eventually someone in your organization will be compromised. Conditional access can detect when user sign-in behavior deviates from the norm and apply automated, custom policies to confirm identity before providing access.<\/p>\n Once you\u2019ve determined that a user has been compromised, you need to respond quickly. Bad actors have been known to sell credentials on the dark web, and once they are inside your organization, they will look for ways to get access to your most valuable data. The Secure access to your enterprise<\/a> e-book includes several examples of how Microsoft 365 Enterprise E5 products help you respond quickly to limit the damage if you suffer a security breach.<\/p>\nReduce the likelihood that a user\u2019s credentials will be stolen<\/h3>\n
Detect when a user has been compromised<\/h3>\n
Take back control of compromised identities<\/h3>\n
Learn more<\/h3>\n