Cloud Security

Microsoft 365 security: How CDR integration improves email security

Microsoft 365 security: How CDR integration improves email security
Written by ga_dahmani
Microsoft 365 security: How CDR integration improves email security

Employees of all companies regularly receive emails with content and attachments from inside and outside the organization, involving multiple business units, vendors, partners, and other third parties.

With all the emails and attachments coming into your organization every day, any employee with an email address, especially those who often interact with the world outside of their company, is vulnerable to targeted zero-day attacks through of sophisticated phishing attempts and hijacked email conversations. Phishing refers to the fraudulent practice of sending email messages that contain a malicious attachment and appear harmless to recipients.

DevOps Connection: DevSecOps @ RSAC 2022

Hackers use increasingly sophisticated social engineering tactics to get victims to open these phishing emails. Due to this rise in complex social engineering tactics, many businesses have seen an increase in phishing schemes and business email compromise (BEC) attacks, particularly those targeting Microsoft Office 365 users.

Microsoft Office 365 security is not enough

According to the FBIPhishing emails were the most common type of cybercrime in 2020, with nearly 250,000 reported incidents. And since then, the number of phishing attacks has tripled. Simply put, it’s almost too easy. Hackers know that employees must open company email communications in a timely manner to avoid operational delays and productivity disruptions. Arming the attachments in these emails is the master key that opens the door to a wide range of cyberattacks and crimes.

Microsoft Office 365 users are especially vulnerable to malicious email attachments. For example, 85% of organizations using Microsoft 365 have experienced an email data breach. According to the Verizon Data Breach Report, 71% of attacks occur through Microsoft Office files and Windows applications, and 98% of threats target Office Suite documents that use macros. These are scary numbers for Microsoft Office 365 users.

Some recent examples:

February 2022: Hackers targeted Microsoft 365 users with phishing emails that used a technique known as right to left override (RLO). The goal is to trick Microsoft 365 users into clicking on an attachment by spoofing a file extension with a special Unicode character. While users may think they are clicking on an .mp3 voicemail file or a simple .txt message, they are actually running a malicious .exe script.

August 2021: Microsoft alerted users to a phishing campaign targeting Office 365 companies that uses various techniques to evade phishing detection. These techniques included the use of legitimate-looking original sender email addresses, an Office 365 phishing page, and a compromised SharePoint site that prompts victims to enter their credentials.

Why your organization can’t trust native Microsoft 365 security and traditional cybersecurity solutions Protect your content

It takes more than native Microsoft Office 365 security to protect your business against email attacks that get more sophisticated every day. Existing solutions such as secure email gateways, antivirus software, and sandboxing provide a layer of defense against known malware that is already registered in threat databases. But unknown, new, and zero-day threats, or techniques that mask known threats, such as password protection or file compression, evade these traditional email and web security approaches. with close to nine million new malware threats reported per month, relying on the security of Microsoft Office is a risk no organization can take.

To combat this risk, organizations often block files intended for business use by default. This approach to email and file security hampers productivity and disrupts the delivery of business-critical files and communications. As a result, file locking is not a viable or scalable solution for a growth-oriented organization. Instead, businesses need a technology-based Office 365 security solution that enables a seamless flow of communications while protecting employees from potential social engineering through email phishing schemes.

The Solution: Teardown and Rebuild Content

Disarm and rebuild content (CDR) is a security technology that cleans potentially malicious code from computer files. Also known as file cleaning, CDR does not rely on detection like other anti-malware tools. Instead, the technology assumes all files are malicious and scans for all individual file components located outside of the approved firewall. As a file sanitizer, the technology removes any malware, removes any embedded code, and rebuilds the file in a way that breaks any additional covert malicious code. The end result is a safe copy of the original file, with all features intact.

Votiro Cloud: deliver secure files instantly

Votiro Cloud proactively removes malware threats from Office 365 email content and attachments without significantly delaying email delivery. Votiro’s patented content disassembly and reconstruction-as-a-service technology identifies the known good elements of files, selecting them and moving them to a clean file template in a single, continuous process.

CDR accomplishes three main goals that help drive security in Microsoft 365. It removes all malware from delivered content, including new, unknown, or hidden malware, without the need to detect malware first. Our CDR solutions also apply a zero-trust security approach to all incoming content, as each piece of content is processed identically. This zero-trust strategy allows employees to receive content immediately, with no delays or requests for IT support. In addition, it allows employees to participate immediately, since the functionality and integrity of the content remain intact.
To learn more about keeping your Microsoft Office 365 files safe from file-borne cyberattacks with technology that integrates easily into your existing infrastructure, Contact Us This day. You also can schedule a free demo if you are interested in seeing first hand what CDR solutions can do for your business.

*** This is a syndicated Security Bloggers Network blog from vote written by Votiro. Read the original post at:

About the author


Leave a Comment