One of the hottest sale items on the Dark Web are login credentials. Those user name and password combinations can get a hacker anywhere from $12 to $120 each, and Office 365 login credentials are among the most lucrative.
One of the most important best practices when it comes to cybersecurity is to ensure you’re using good password habits. If you’re working with outsourced IT services in Houston or another city, they’ll tell you that this includes using a strong password and not reusing passwords in multiple places.
But while most people know they should be more vigilant about password security, juggling the multiple login passwords used every day makes that a challenge.
Passwords are reused an average of 5 times each.
According to a password security report by the Ponemon Institute, 51% of people say that passwords are too difficult to manage. The conundrum is that there are so many different passwords people use daily, and making them all “strong” with a combination of letters, numbers, and symbols, makes them harder to remember.
But that user password is often the only thing standing between a hacker and all the data stored in your Office 365 account.
What Does a Hacker Do with Stolen Office 365 Credentials?
Once login credentials are hacked or stolen, hackers can do things like:
- Send out emails on your email accounts, including phishing emails
- Access all the data you have stored in OneDrive
- Access other user login credentials
- Change your security settings to allow malware to run
- Change passwords, locking you out of your system
- Use your connected Skype account for social phishing attacks
A newer scam that’s been seen on eBay is to sell a license for Office 365 for much less than the list price using stolen login credentials to access it, which gives cybercriminals even more reason to go after Office 365 passwords.
How do you balance needing to secure your Office 365 account with the difficulty in managing user password security? The answer is using multi-factor authentication (MFA).
How Multi-Factor Authentication Secures Your Office 365 Logins
Multi-factor authentication is a setting in Office 365 (and multiple other cloud services) that you can turn on for all users. Once turned on, it will require users to set up MFA and link it to their mobile device or another code delivery method.
MFA requires another factor of user authentication to ensure that the person is authorized to access an application.
There are three main factors of authentication:
- Something you know: A username and password combination
- Something you have: A smartphone that can receive a code via text
- Something you are: A fingerprint or facial recognition scan
Unless multi-factor authentication (also referred to as two-factor authentication) is enabled, then a system is just using a single factor to approve a login, which is the username/password.
When you enable MFA in Office 365, once a user logs in, they’re then sent a code to their phone, which has to be entered to complete login and gain access. This greatly reduces the chance that a hacker can breach your system with a stolen password because they won’t be able to get past that second authentication factor.
How Well Does MFA Work?
Google did a study on how well adding a second factor of authentication worked, and the results showed that it significantly reduced the chance of a data breach.
Their findings showed that enabling MFA and using an SMS code for the second factor:
- Blocked 100% of automated bot attacks
- Blocked 96% of bulk phishing attacks
- Blocked 76% of targeted attacks
When an on-device prompt was used for the second factor instead of SMS, the number rose to 90% of targeted attacks blocked.
Why It’s Important to Enable MFA in Office 365
Office 365 has become the most popular cloud service by user count, which makes it a big target for hackers looking to steal and resell credentials, access sensitive information in cloud storage, or use its email capabilities to send out millions of spam messages from your organization’s domain.
The popularity of Office 365 has given rise to phishing scams that are specifically targeting platform users and admin users. These include:
- Phishing emails that look like a request to share a file from SharePoint that include a legitimate OneDrive link that takes users to a spoofed Office 365 login page.
- Phishing that targets admins and looks like a real email from Microsoft that warns about an “action required” or a “hold placed on your account, “ which leads to a fake login page.
- Various phishing campaigns with subject lines like “approved invoice,” “FYI,” and “Fw: Payments.” These are all designed to take a user to a fake login page and steal their credentials.
Multi-factor authentication adds an important layer of security that protects your accounts even if a user login has been breached and helps you ensure account security despite poor password practices and the ongoing barrage of Office 365 phishing attacks.
Get Help Securing Your Cloud Services Today!
Are your cloud services at risk of a breach? Don’t leave your data at risk, Digital Crisis offers expert Houston IT services, including ensuring the security of your Office 365 accounts and any other cloud solutions you use.
Contact us today to make sure your accounts are protected. Call 713-965-7200 or reach us online.