{"id":12878,"date":"2018-07-23T07:30:30","date_gmt":"2018-07-23T15:30:30","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/23\/news-6645\/"},"modified":"2018-07-23T07:30:30","modified_gmt":"2018-07-23T15:30:30","slug":"news-6645","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/07\/23\/news-6645\/","title":{"rendered":"Enhancing Office 365&#8217;s detection and antispam"},"content":{"rendered":"<p><strong>Credit to Author: Nikolay Pankov| Date: Thu, 19 Jul 2018 15:33:13 +0000<\/strong><\/p>\n<p>Infection by e-mail is a time-honored tradition for good reason. Take a look through Securelist, our blog for security researchers and experts. You don&#8217;t have to go far back \u2014 let&#8217;s say to the beginning of July \u2014 to get an eyeful of malware distributed through e-mail. Spam is a common means to distribute ransomware such as Rakhni. Classic phishing is a classic method for straight-up stealing victims&#8217; cryptocurrency. Spear-phishing is a current APT trend. E-mail attachments spread malware such as Cryacl.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/07\/19113101\/office-365-protection-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-23130\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/07\/19113101\/office-365-protection-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" \/><\/a><\/p>\n<p>E-mail is hardly the most sophisticated malware vector, but it is the most widespread. In theory, the answer to the abovementioned threats lies in a solution installed on your business&#8217;s mail server that can filter spam and check attachments for the malware traces. However, that solution is of limited help if you use cloud services, such as Microsoft Office 365.<\/p>\n<p>Of course, that does not mean you should stop using cloud e-mail. Just keep in mind that if your business relies on an outside service, you need to augment the service&#8217;s default protection. In the case of cloud-based Microsoft Office 365, we recommend Kaspersky Security for Microsoft Office 365.<\/p>\n<p>Not long ago, testers from Virus Bulletin <a target=\"_blank\" href=\"https:\/\/www.virusbulletin.com\/blog\/2018\/04\/standalone-product-test-kaspersky-security-microsoft-office-365\/\">compared levels of protection<\/a> between Office 365 alone and Office 365 in combination with our solution. Our solution raised antispam detection by 2.41% without adding any new false positives. At first glance, that may not look spectacular. However, the improvement from 97.41% to 99.82% is a big deal. Microsoft Office 365 by itself is good at spam filtering. It catches all obvious spam. The spam it misses is the stuff that doesn&#8217;t really look like spam.<\/p>\n<p>Can you guess who is making a real effort to disguise spam as legitimate mail? That&#8217;s right: Phishing actors and malware operators.<\/p>\n<p>(The improvement we offer over Office 365 alone in antimalware efficiency should be clear without additional explanation: detection jumps from 79.6% to 99.6%. Fighting malware is our business; we have been doing it for more than 21 years.)<\/p>\n<p>Put in gaming terms, our solution is like a magical Cloak of Protection. With it, you have +20 for malware detection and +2 for spam avoidance. That&#8217;s protection worth using. You can learn more about Kaspersky Security for Microsoft Office 365 and our other cloud solutions on the Kaspersky Business Hub website.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"cloudhub\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/office-365-protection\/23129\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nikolay Pankov| Date: Thu, 19 Jul 2018 15:33:13 +0000<\/strong><\/p>\n<p>To be safe, augment the service\u2019s default protection. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[17373,1001,11728,17374],"class_list":["post-12878","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-antispam","tag-business","tag-cloud","tag-office-365"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12878"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12878\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}