Microsoft Office 365 updates to stop spear phishing attacks

Microsoft Office 365

Microsoft Office 365 just received an important security update where those responsible for its development have finally tried to prevent attacks from spear phishing using this platform. For those who do not know how this technique works, comment that what hackers do is send documents with links bit.ly inside. These links are later used to steal credentials and even install remote control malware.

Although it may seem like a very simple method to be truly effective, the truth is that it is, so much so that Microsoft has had to take action on the matter and update the entire Microsoft Office 365 platform. As a detail, tell you that the solution to this problem was already implemented and available to all users enrolled in the company's advanced protection program, now the novelty is that, finally, it is now available to everyone.

Microsoft Office 365 is updated to prevent spear phishing attacks.

The solution to the problem has been that now Microsoft Office 365 will perform a reputation check analyzing each and every one of the URLs present in the documents looking for any kind of malicious behavior. When this system goes into operation, users will be able to see that a window opens with a warning indicating that a link is being scanned. If this link is fraudulent, a window with a red background will open that informs you that we are dealing with a malicious website.

In turn, as a system administrator, you can establish SafeLink policies to control at all times which user accessed the link. Without a doubt, a new movement from Microsoft that seeks to offer much more secure suites for all types of users. Hopefully, thanks to this new security update for Microsoft Office 365, spear phishing attacks can be eradicated, at least on this platform.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.