{"id":33775,"date":"2022-01-10T13:03:06","date_gmt":"2022-01-10T18:03:06","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=33775"},"modified":"2023-11-14T12:42:48","modified_gmt":"2023-11-14T17:42:48","slug":"protect-your-microsoft-365-digital-assets-with-a-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/protect-your-microsoft-365-digital-assets-with-a-zero-trust-architecture\/","title":{"rendered":"Protect Your Microsoft 365 Digital Assets with a Zero-Trust Architecture"},"content":{"rendered":"

With today’s cloud-based servers and applications, your single-factor \u201csecure network\u201d is not enough. You need a Zero-Trust mindset to protect your all-digital assets today.<\/h2>\n
\n

While working for a previous employer, I worked on a project to help a client assess its network security. During our analysis, we identified the malware called Emotet<\/a> on our client\u2019s system.<\/p>\n

The world had been fighting Emotet since the financial sector first reported it to the U.S. Cybersecurity and Infrastructure Security Agency that same year. Spread via fraudulent email attachments, the malware\u2019s creators were selling its infrastructure to other malicious actors so that they, too, could spread it with their own attachments hidden in seemingly helpful Word documents \u2014 invoices, shipping orders, even company updates.<\/p>\n

Once users tried to open the attachment, a pop-up prompted them to \u201cenable macros\u201d to view it. When victims did so, the malware began running on their machines, opening the doors to data theft, other Trojan attacks and ransomware.<\/p>\n

Worse, the virus changed each time a user opened it. Because it was constantly evolving, the international security agency Europol could not take it down until 2021.<\/strong><\/p>\n

Fortunately, back in 2020, my work for the client included identity protection via Azure MFA (multifactor authentication), device protection via Microsoft<\/a> Intune, data protection via Exchange Online Protection (EOP), Microsoft Information Protection (MIP), Data Loss Prevention (DLP), and app protection via Microsoft Defender for Cloud Apps (MDCA), formerly Microsoft Cloud App Security (MCAS). Through this multifactor approach, we removed Emotet from the client\u2019s system and prevented it from spreading further, saving the company a painful remediation that could have cost up to $1 million or more.<\/p>\n

My Emotet experience revealed problems that would only grow as additional companies moved their servers and data to the cloud. The message is clear: Simply securing networks is no longer enough to protect an organization\u2019s entire digital ecosystem.<\/strong> The virtual walls companies relied on are crumbling, especially as businesses and everyday computer users increasingly rely on the ease of accessing documents, analyzing data and working from anywhere that the cloud enables.<\/p>\n

After joining Centric in 2021, I began working with my new colleagues to create a “Zero-Trust” approach to security. It includes a multifactor security assessment like the one that helped my team identify Emotet and the elements of Zero-Trust Security Architecture. We believe organizations need both for security today. But where do you start?<\/p>\n

Start With the Security You Have Now<\/h2>\n

Before you can build secure architecture, you must conduct an assessment to understand your current security posture fully. The assessment should include a comprehensive roadmap to help you deploy and adopt Microsoft 365<\/a> capabilities to protect the six pillars of Zero-Trust Architecture: identities, devices, apps, infrastructure, data and network.<\/strong> You will then be ready to enhance your Microsoft 365 investment securely.<\/p>\n

As you interview assessment providers and examine their proposals, make sure that they have the bandwidth and skillset to create a roadmap that includes your:<\/p>\n