{"id":91766,"date":"2020-08-26T09:00:14","date_gmt":"2020-08-26T16:00:14","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91766"},"modified":"2023-05-15T23:03:01","modified_gmt":"2023-05-16T06:03:01","slug":"how-microsoft-threat-protection-risk-phishing","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/08\/26\/how-microsoft-threat-protection-risk-phishing\/","title":{"rendered":"How can Microsoft Threat Protection help reduce the risk from phishing?"},"content":{"rendered":"
The true cost of a successful phishing campaign may be higher than you think. Although phishing defenses and user education have become common in many organizations, employees still fall prey to these attacks. This is a problem because phishing is often leveraged as the first step in other cyberattack methods. As a result, its economic impact remains hidden. Understanding how these attacks work is key to mitigating your risk.<\/p>\n
One reason phishing is so insidious is that attackers continuously evolve their methods. In this blog, I\u2019ve described why you need to take phishing seriously and how different phishing methods work. You\u2019ll also find links to Microsoft Threat Protection solutions that can help you reduce your risk.<\/p>\n
According to Accenture\u2019s Ninth Annual Cost of Cybercrime Study<\/a>, phishing attacks cost the average organization USD1.4 million in 2018, an eight percent rise over 2017. This likely underestimates the cost because the report only considers four major consequences when determining the cost of an attack: business disruption, information loss, revenue loss, and equipment damage. However, phishing is used as the delivery method for several other attacks, including business email compromise, malware, ransomware, and botnet attacks. The 2019 Verizon Data Breach Report<\/a> finds that almost one in three attacks involved phishing. And according to the 2019 Internet Crime Complaint Center,<\/a> phishing\/vishing\/smishing\/pharming are the most common methods for scamming individuals online.<\/p>\n Since the costs of other attacks can often be attributed to phishing, a comprehensive cyber risk mitigation strategy should place a high value on phishing defenses and user education.<\/p>\n As attackers have developed new methods to evade detection by defenders and victims, phishing has transformed. Phishing now uses mediums other than email, including voicemail, instant messaging, and collaboration platforms, as people have enhanced email-based defenses, but may have not considered these other attack vectors. The success of phishing as the delivery of other cyberattacks makes it critically important for defenders to be able to identify the many types of phishing and how to defend against them, including:<\/p>\n Fahmida Y. Rashid provides more details about these type of phishing attacks on CSO<\/a>.<\/p>\n Recently, another phishing type was identified called consent phishing<\/a>. In response to COVID-19, people have increased their usage of cloud apps and mobile devices to facilitate work from home. Bad actors have taken advantage of this shift by leveraging application-based attacks to gain unwarranted access to valuable data in cloud services.\u00a0By using application prompts similar to that on mobile devices, they trick victims into allowing the malicious applications permission to access services and data (see Figure 2).<\/p>\n <\/p>\n Figure 1: Familiar application prompts trick users into giving malicious apps access to services and data.<\/em><\/p>\n The following best practices can help you defend against this new threat:<\/p>\n Office 365 Advanced Threat Protection (Office 365 ATP), natively protects all of Office 365 against advanced attacks. The service leverages industry-leading intelligence fueled by trillions of signals to continuously evolve to prevent emerging threats, like phishing and impersonation attacks. As part of Microsoft Threat Protection, Office 365 ATP provides security teams with the tools to investigate and remediate these threats, and integrates with other Microsoft Threat Protection products like Microsoft Defender Advanced Threat Protection and Azure Advanced Threat Protection to help stop cross-domain attacks spanning email, collaboration tools, endpoints, identities, and cloud apps.<\/p>\n Microsoft Threat Protection stops attacks across Microsoft 365 services and auto-heals affected assets. It leverages the Microsoft 365 security portfolio to automatically analyze threat data across identities, endpoints, cloud applications, and email and docs. By fusing related alerts into incidents, defenders can respond to threats and attacks immediately and in their entirety, saving precious time. (see Figure 3).<\/p>\n The following actions will help you gain greater visibility into attacks to protect your organization.<\/p>\n <\/p>\n Figure 2: Microsoft Threat Protection and Office 365 ATP provide several capabilities to help you protect your organization from phishing attacks.<\/em><\/p>\n To learn more about Microsoft Security solutions visit our website.<\/a>\u00a0 Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" The true costs from phishing may be higher than you think. Microsoft Threat Protection can help you mitigate your risk.<\/p>\n","protected":false},"author":96,"featured_media":91770,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3681],"products":[],"threat-intelligence":[],"tags":[3822,3795],"coauthors":[2296],"class_list":["post-91766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-risk-management","tag-microsoft-security-insights","tag-phishing"],"yoast_head":"\nPhishing campaigns can be well-targeted and sophisticated<\/h2>\n
\n
An emerging phishing method exploits the increase in remote work<\/h2>\n
\n
Office 365 Advanced Threat Protection helps prevent and remediate phishing attacks<\/h2>\n
Microsoft Threat Protection increases analyst efficiency<\/h2>\n
\n