Free webinar

How to defend against an Office 365 account takeover

  • June 11 @ 2 PM AEST | 2 PM BST
  • 45 Mins

Presented by

Jay, Product Expert

According to an Osterman research survey from 2018*, 44 percent of organizations report falling victim to an account takeover (ATO)-based email attack. ATO-based attacks are highly dangerous and are often successful since they're executed using a trusted user's email account.

ATO attacks are often initiated using phishing, brute force, or malware attacks. Office 365 admins can successfully mitigate the risk of an ATO attack in their Office 365 environment by hardening their Office 365 configuration.

Agenda

  • What an ATO attack is
  • How an ATO attack is executed
  • How to mitigate the risk of an ATO attack
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

* Best Practices for Protecting Against Phishing, Ransomware and BEC Attacks, Osterman Research 2018.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Get the webinar recording

  • Please enter your email
    Please enter business email address
  •  
     
  • By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now