Posts

Showing posts with the label Phishing

Strengthening Security Measures: Microsoft Defender for Office Enables Users to Report Suspicious Messages in Teams

Image
  Cybersecurity is an ever-evolving landscape that requires constant vigilance and innovative security measures. Recognizing this, Microsoft is launching a new feature in Microsoft Defender for Office that empowers end-users to report suspicious messages within Microsoft Teams, further enhancing the security of your online communications. This feature will be automatically activated for Microsoft Defender Plan 2 or Microsoft E5/ Office E5 customers. Starting in early June, Teams administrators will have the ability to control if users can report security risk messages within the Teams Admin Center. By mid-June 2023, this functionality should be available across all tenants. How will this impact your organization? This new feature is designed to protect your organization from potential security threats, including phishing or spam messages, or malicious content such as a phishing URL or malware file. An important point to note is that the toggle setting in the Teams admin center will not

Enhancing Collaboration Security with Microsoft Teams Message Summary

Image
New Features to Protect Your Organization and Improve Security Operations Introduction The growing popularity of collaboration tools like Microsoft Teams has inevitably led to an increase in cyber threats targeting these platforms. While Microsoft Defender for Office 365 has been providing protection in Microsoft Teams at the time of click, we are excited to announce the preview of enhancements to that protection, further securing users in Microsoft Teams and improving security operations flows. Note that this preview is only available to Microsoft Defender for Office P2 customers. New Features in the Preview Enhanced Visibility and Reporting With the new functionality, end-users in Microsoft Teams can now report suspicious messages, allowing admins and security teams to gain better insight into potential threats. This enhances the visibility of the attack landscape and enables more proactive threat hunting.           2.      Zero Hour Auto-Purge (ZAP) for Malicious Items Building on t