Threat Scan (ETS) for Office 365

Slides:



Advertisements
Similar presentations
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Advertisements

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Creating your online identity
Deployment Planning Services
3 Do you monitor for unauthorized intrusion activity?
How it Works Firm Generates Contract Firm Sends to Client
Threat Scan (ETS) for Office 365
Comprehensive Security and Compliance at an Affordable Price.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Common Methods Used to Commit Computer Crimes
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
Customized Solutions to your needs
Putting It All Together
Putting It All Together
NEFA’S Online Learning Center
Computer Virus and Antivirus
Report Phishing Forward phishing s to
Trends in Ransomware Distribution
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Unit 4 IT Security.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Forensics Week 11.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Today’s Risk. Today’s Solutions. Cyber security and
STOP. THINK. CONNECT. Online Safety Quiz.
Call AVG Antivirus Support | Fix Your PC
Click Here. Webroot Antivirus Technical Support UK Fix and support for all technical problems related computer security. Remove all online harmful threats.
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
How to build a defense-in-depth
Varonis Overview.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Azure AD Deployment Are you maximising your Azure AD investment?
Strong Security for Your Weak Link:
Selling Your Home Made Easy
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Welcome and thank you for choosing SharkGate
Navigating Security Seas in a Small Ship with a Limited Crew
Introduction to Computers
Brandon Traffanstedt Systems Engineer - Southeast
Report Phishing Forward phishing s to
Anatomy of a Large Scale Attack
PREPARATION – DELETE BEFORE MEETING
How to address security, cost, IT and migration concerns
Incident response and intrusion detection
Brand promise guarantee
Information Protection
3 Do you monitor for unauthorized intrusion activity?
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Securely run and grow your business
<offer name> with Microsoft 365 Business Secure Deployment
PREPARATION – DELETE BEFORE MEETING
Employee Cybersecurity Program
Information Protection
Cybersecurity Simplified: Phishing
3 Do you monitor for unauthorized intrusion activity?
Streamline your move to the cloud
Presentation transcript:

Email Threat Scan (ETS) for Office 365 Customer Sales Training Hi and welcome to our presentation on the Barracuda Email Threat Scan. My name is <<PRESENTER>>, <<TITLE>> and we’ll spend the next 20 minutes going over how you can use ETS to detect malware and advanced threats in your email environment.

“There are two types of organizations: Those who have been breached and those who have been breached but don’t know it yet.” James Scott, Senior Fellow at ICIT Sadly, this is an all too familiar sentiment in the world today. There are two types of organizations, the breached and those who are breached but don’t know it yet.

Cloud overtakes on-premises in 2017 And this is especially important when you consider the trend with email. This is a graph from a Radicati report that shows that we’re reaching an inflection point soon… in 2017, cloud-based email is going to be more dominant that on-premises based email… and this trend is only increasing. We’re currently at about 55% on-premises to 45% cloud but by 2020, the industry is going to shift dramatically to 70% cloud. Radicati Cloud Business Email Market 2016-2020

The wrong ‘up and to the right’ Now with this shift, we have to consider the increase in breaches over time. From this year’s Verizon Data Breach Investigation Report, hacking, malware, and social (which includes phishing and ransomware) are drastically on the rise. These are advanced threats that are moving up and to the right. Verizon 2016 Data Breach Investigations Report

Why should you get scanned? Advanced threats are dangerous and on the rise Only a layered security approach that uses Advanced Threat Detection can mitigate the risk Email Threat Scan is a free service to assess risks from advanced threats and remediate them So when you ask why should you get scanned, the answer is very simple: Advanced threats are dangerous and on the rise. Organizations of all sizes are getting attacked daily and IT departments need to be vigilant against these threats. To mitigate these new threats , only a layered security approach that uses Advanced Threat Detection will work. Meaning: It is important to augment Office 365’s built-in protections with additional security layers. So to address these advanced threats and the trends that are guiding customer’s email deployments, we’re offering a free service: The Barracuda Email Threat Scan to assess risks from advanced threats and remediate them.

1000s 92% >50 Threats everywhere Office 365 mailboxes scanned Percentage of accounts with threats Threats found per account In the short time since we’ve launched ETS, we’ve already scanned thousands of mailboxes and the results are intriguing and not altogether surprising. Out of the thousands of mailboxes we’ve scanned, just over 90% of accounts in Office 365 contain malware. To be clear, if you are using Office 365 and are not using any advanced security solution, you are already very likely harboring a threat! And of these accounts that were infected, on average, they contained greater than 50 threats per account. So this is a problem that affects everyone everywhere and you need to be ready.

Email Threat Scan Tool that scans Office 365 accounts for advanced persistent threats Quick, easy way to illustrate what threats are presently in an Office 365 account Provides a personal risk assessment Takes a minute to sign up for the scan with the results provided in about a day To secure against these advanced threats, we offer Barracuda Essentials for Office 365 which blocks threats in real-time so malware never reach the company’s mailbox. It sandboxes any suspicious attachments and then “detonates” it in a sandbox environment to detect malware. Now some of you may not be sure of the value of Advanced Threat Detection or even understand how you are at risk. Addressing this concern is what Email Threat Scan provides; a quick and easy way to illustrate what threats you already have in your environment. It only takes a minute to run the scan and within a day, Barracuda sends you a personalized risk assessment report that details the risks already in your environment.

Scan – Educate – Prevent Generate threat report Educate on risks Prevent threats with Essentials Scan mailboxes for threats It’s really simple and we have three steps to the process… scan, educate, and prevent. Let’s go over scan first.

Scan – Educate – Prevent Generate threat report Educate on risks Prevent threats with Essentials Scan mailboxes for threats The first steps is the scan mailboxes for threats and all we need is an Office 365 admin account.

Sign Up in Two Minutes How to scan? Go to this link: https://scan.barracuda.com/signup?source=gbsc&ref=YOUR EMAIL ADDRESS Here’s the process and when we say sign up in two minutes, we’re being generous as it is more like 30 seconds. Go to the custom scan.barracuda.com link and sign up. If you already have a Barracuda account because you have another device, you can simply log in. Then provide an admin account username and password for Office 365 and that’s it… the scan will start running immediately.

Giving permissions to Office 365 account Data scanned and removed from Barracuda servers within seconds Similar to ATD mechanism for Email Security Service Permissions can be revoked at anytime Data privacy solution brief When you enter the credentials for your Office 365 account, you can revoke permissions at any time you see fit. And Barracuda doesn’t keep any of the data on their servers… they scan it and remove it. It’s a similar process to their ATD mechanism of where they inspect and detonate any potential threat in their sandbox so you don’t have to worry about the threat. If you are curious, Barracuda does have a data privacy solution brief that is available on their website or we can send to anyone after this webinar… just let us know.

Scan – Educate – Prevent Generate threat report Educate on risks Prevent threats with Essentials Scan mailboxes for threats OK, so we saw how easy it was to run the scan… the next step is to go over the threat report with you.

Follow Up We will send you the scan results (typically within 24 hours) Schedule call to discuss results Typically, it takes about 24 hours for a scan to complete and Barracuda will send it to you once it is done. The next step is to schedule a call to review the results and talk about next steps.

Educate on risks What if you find false positives Some applications behave like malware Extremely low false positive rate Advanced threats can cause a lot of damage Advanced threats in deleted/junk folder Emails may have been read before being deleted Types of threats Sandboxing identifies how threats behave, not their specific type In some cases, you may find a false positive… that’s a perfectly reasonable comment but we do want to point out that some applications behave like malware in the way they function. And while this is the case, Barracuda does have an extremely low false positive rate for risk evaluation. The message here is that these threats can cause a great deal of damage in a short period of time so a false positive is more tolerable than malware making it’s way into your network. Another question you may have is ‘why are we scanning the deleted and junk folder?’ To get a complete picture of the threat landscape, we have to scan the entire mailbox because malware may have been opened prior to its deletion. Some f you are also looking for the specific type of threat but keep in mind that sandboxing identifies how they behave, not specifically what they are. In this case, we want to demonstrate that a certain type of threat is present.

Scan – Educate – Prevent Generate threat report Educate on risks Prevent threats with Essentials Scan mailboxes for threats OK, we’ve come to the third component of our message… prevent.

Prevent Threats with Barracuda Essentials Barracuda Essentials for Office 365 blocks threats in real-time Threats never reach the company’s mailbox Utilizes sandboxing technology to detonate threats Preventing ongoing threats Compatible with on-premises and hybrid configurations Central admin with Barracuda Cloud Control Prevention is completely about using Essentials for Office 365 to block threats from occurring as they never reach the company’s inbox. And Essentials for Office 365 is the ideal solution to prevent malware from entering your email environment. Essentials offers cloud-based multi-layer email security, archiving, and backup for Office 365 that compliments all Office 365 plans.

Prevention Delete threats from mailbox Wipe infected endpoints Check if company emails are publicly visible Now once you have selected Essentials for Office 365 as the solution to secure your cloud-based email, there’s the matter of what to do with the threats that are in your mailbox that Email Threat Scan picked up… Delete them… delete all the threats to ensure that a threat isn’t detonated. Also check if your company email addresses are public. This is an easy way for hackers to target specific emails as they don’t have to guess at what people’s addresses are… they can target specific corporate officers for a greater effect.

Moving Forward OK, so moving forward, here is my ask of everyone today.

Next Steps Scan your Office 365 mailbox Schedule time to review the scans Scan your Office 365 mailbox… you can’t afford not to. Call us… we will get on a call with you to go over the scan. That’s it and we’re looking forward to hearing from you. We will now open it up to questions from the attendees.