Email Security

    Moving Email to the Cloud? Cyber Resilience is a Must

    Prevent cyber risks by not putting your eggs in everyone else’s basket.

    by Mikey Molfessis
    gettyimages-890153720.jpg

    Microsoft's announcement that it has launched its first cloud data centers in Africa—one in Cape Town, another in Johannesburg—is a cause for celebration among South Africa's business sector. As we hurtle into the Fourth Industrial Revolution, access to cloud infrastructure will be critical to power artificial intelligence and edge computing innovation.

    And while only Azure is supported at present, Microsoft plans to soon launch Office 365™ from these data centers, offering organizations increased productivity. Amazon and Huawei also have plans to establish local data centers over the next few years.

    However, organizations' tendencies to rely exclusively on single cloud service providers for day-to-day operations have exposed them to undue risk. With services such as Office 365, organizations are not only putting all their eggs in one basket: they are putting all their eggs in the same basket that everyone else is putting all their eggs.

    The volume of users on cloud-based email services such as Office 365 means there is more malware created for these environments. Criminals know they have only one lock to pick to gain access, so they focus their attention on these email cloud services because of the potentially large payoff.

    Get more articles like this delivered to your inbox every week. Subscribe to Cyber Resilience Insights today.

    As more businesses move email and data to Office 365, there’s an increased need to protect against malicious or accidental loss of data. Mimecast's latest Email Security Risk Assessment (ESRA) report, an aggregated analysis of tests that measure the efficacy of widely-used email security systems globally, including Office 365, illustrated the scope of the problem. Of the more than 232 million emails inspected, organizations' existing email security systems missed more than 26,000 malware attachments, 53,000 impersonation attacks and 23,000 dangerous file types.

    What You Really Get From Office 365

    Microsoft offers certain data protection capabilities as part of its Office 365 services, which are designed to protect against data loss caused by its own infrastructure failing. But these services don't always offer protection against accidental deletion, data corruption, advanced cyberattacks or malicious users or administrators. These can often lead to downtime which can bring business operations to a standstill. Email continuity is essential to any modern organization’s efforts to maintain productivity but is not always achievable when all business-critical applications run on a single cloud provider’s infrastructure.

    It’s not only email data breaches, human error or technical error that can cause downtime for an organization. Well-reported and widespread Office 365 outages—the most recent of which took place in Europe in mid-January—highlight what can happen when email data becomes unavailable. As more organizations move to Office 365, we’re likely to see South Africa featuring on Downdetector’s outage map. Outages pose serious productivity risks to users who rely on SaaS monocultures to support their operations. 

    Even more concerning is the possibility that employees will turn to their unsecure personal Gmail or Yahoo Mail accounts when Office 365 goes offline. You then have absolutely no control over email activity.

    Important data stored on Office 365 can also be lost due to accidental or malicious deletion or ransomware. If your organization doesn’t have an independent backup in place, and deleted data passes through short term folders such as the Recycle Bin, Deleted Items folders or retention policies without being recovered, it is lost forever.

    How Can You Improve Cloud Email Resilience?

    To mitigate the cyber risks associated with cloud services, organizations should look to improve their cyber resilience. An effective cyber resilience strategy should include layered security protection, independent data storage and alternative access routes to key systems like email, for when the worst does occur.

    The cyber resilience strategy should further include a backup and recovery plan. This was always a priority for organizations when their systems were on-premises. The fact that data is now in the cloud does not change this.

    South African organizations are arguably a step ahead of their international counterparts in their cyber resilience efforts. The latest research by Mimecast and Vanson Bourne found that 49% of South African organizations have a cyber resilience strategy in place, against a global average of 46.2%. But this still means that half of organizations are yet to have a comprehensive cyber resilience strategy in place.

    Recent Osterman Research titled “Why Your Company Needs Third-Party Solutions for Office 365”, indicates that organizations globally are starting to supplement the service with third-party products to achieve cyber resilience. The study found that nearly one-third of organizations implementing Office 365 plan to use third-party solutions that will provide improved security, archiving or other capabilities, rather than relying on what is available natively in Office 365. In fact, 37% of the typical Office 365 budget in 2019 will be spent on a cheaper plan in conjunction with third-party security, archiving and other solutions.

    Increased adoption of email cloud services is a welcome development in the South African business sector and will support organizations as they strive for greater agility and scalability. But putting all your eggs in one basket—the same basket as everyone else—leaves you exposed to a broad range of cyber risks that can have a debilitating effect on your operations.

    Using a third-party provider and having an effective cyber resilience strategy provides a safety net and enables organizations to quickly return to standard operations without losing critical data or productivity.

    Subscribe to Cyber Resilience Insights for more articles like these

    Get all the latest news and cybersecurity industry analysis delivered right to your inbox

    Sign up successful

    Thank you for signing up to receive updates from our blog

    We will be in touch!

    Back to Top