{"id":13652,"date":"2018-10-23T09:00:32","date_gmt":"2018-10-23T17:00:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/23\/news-7419\/"},"modified":"2018-10-23T09:00:32","modified_gmt":"2018-10-23T17:00:32","slug":"news-7419","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/23\/news-7419\/","title":{"rendered":"Top 10 security steps in Microsoft 365 that political campaigns can take today"},"content":{"rendered":"<p><strong>Credit to Author: toddvanderark| Date: Tue, 23 Oct 2018 16:00:18 +0000<\/strong><\/p>\n<p>The increasing frequency of cyberattacks make clear that more must be done to protect key democratic institutions from cyber-enabled interference. Withjust a fewweeks left before theU.S.midtermelections and early voting under way,campaignsmust stay vigilant in protecting against cyberattacks to their online collaboration tools, including email.Microsoft recommendstaking action today to protect against phishing, malware,account compromise, and other threatssee<a target=\"_blank\" href=\"https:\/\/support.office.com\/article\/top-10-ways-to-secure-office-365-and-microsoft-365-business-plans-from-cyber-threats-de2da300-dbb6-4725-bb12-b85a9d296e75?ui=en-US&amp;rs=en-001&amp;ad=US\" rel=\"noopener\">Top 10 ways to secure Office 365 and Microsoft 365 Business plans from cyberthreats<\/a>.These recommendations are tailored for small to mid-sized political campaigns and election-focused stakeholders using<a target=\"_blank\" href=\"https:\/\/products.office.com\/en-us\/compare-all-microsoft-office-products?tab=2\" rel=\"noopener\">Office 365<\/a>or <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/business\" rel=\"noopener\">Microsoft 365<\/a>. Any organizationespecially those without full-time IT security staffcan benefit fromtaking these actions.<\/p>\n<p>&#10;<\/p>\n<p>This guidanceprovidesstep-by-step instructions forusing10 high-impact securitycapabilities.Theseactions help you implement many of the best practicesrecommended inthe<a target=\"_blank\" href=\"https:\/\/www.belfercenter.org\/CyberPlaybook\" rel=\"noopener\">Cybersecurity Campaign Playbook<\/a>,created by the <a target=\"_blank\" href=\"https:\/\/www.belfercenter.org\/project\/defending-digital-democracy\" rel=\"noopener\">Defending Digital Democracy<\/a> program at Harvard Kennedy SchoolsBelferCenter for Science and International Affairs.<\/p>\n<p>&#10;<\/p>\n<p>Top 10cybersecurityrecommendations:<\/p>\n<p>&#10;<\/p>\n<ol>&#10;<\/p>\n<li>Setuptwo-stepverification forall staff.<\/li>\n<p>&#10;<\/p>\n<li>Traincampaign staff to quickly identify phishing attacks.<\/li>\n<p>&#10;<\/p>\n<li>Use dedicated accountsfor administration.<\/li>\n<p>&#10;<\/p>\n<li>Raise the level of malware protection in mail.<\/li>\n<p>&#10;<\/p>\n<li>Protect against ransomware.<\/li>\n<p>&#10;<\/p>\n<li>Preventemailsauto-forwardingoutside of the campaign.<\/li>\n<p>&#10;<\/p>\n<li>Increase encryptionfor sensitive emails.<\/li>\n<p>&#10;<\/p>\n<li>Protect your email from phishing attacks.<\/li>\n<p>&#10;<\/p>\n<li>Protect against malicious attachments in email.<\/li>\n<p>&#10;<\/p>\n<li>Protect against phishing attacksthat includemalicious website links in email or other files.<\/li>\n<p>&#10;<\/ol>\n<p>&#10;<\/p>\n<p>Read <a target=\"_blank\" href=\"https:\/\/support.office.com\/article\/top-10-ways-to-secure-office-365-and-microsoft-365-business-plans-from-cyber-threats-de2da300-dbb6-4725-bb12-b85a9d296e75?ui=en-US&amp;rs=en-001&amp;ad=US\" rel=\"noopener\">Top 10 ways to secure Office 365 and Microsoft 365 Business plans from cyberthreats<\/a>for details on how to implement each action.<\/p>\n<p>&#10;<\/p>\n<p>These recommendations are provided as part of Microsofts ongoing commitment to the<a target=\"_blank\" href=\"https:\/\/aka.ms\/defendingdemocracy\" rel=\"noopener\">Defending Democracy Program<\/a>. Qualifying organizations using Office 365 can also take advantage of<a target=\"_blank\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2018\/08\/20\/protecting-democracy-with-microsoft-accountguard\/\" rel=\"noopener\">MicrosoftAccountGuard<\/a>for additional protectionto leverageMicrosoftsstate-of-the-artthreatdetectionand notification in case of targeted nation-state cyberattacks.<\/p>\n<p>&#10;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/23\/top-10-security-steps-in-microsoft-365-that-political-campaigns-can-take-today\/\">Top 10 security steps in Microsoft 365 that political campaigns can take today<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\">Microsoft Secure<\/a>.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/23\/top-10-security-steps-in-microsoft-365-that-political-campaigns-can-take-today\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: toddvanderark| Date: Tue, 23 Oct 2018 16:00:18 +0000<\/strong><\/p>\n<p>With the U.S. midterm elections rapidly approaching, campaigns must be vigilant in protecting against cyberattacks to their online collaboration tools, including email. Microsoft has compiled a list of 10 high-impact, easy-to-implement security settings that any campaign or election organization should consider for increased security in Microsoft 365.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/10\/23\/top-10-security-steps-in-microsoft-365-that-political-campaigns-can-take-today\/\">Top 10 security steps in Microsoft 365 that political campaigns can take today<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\">Microsoft Secure<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-13652","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13652"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13652\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13652"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}