Could There Be A Hacker In Your Network?
What would you do if you knew there were unauthorized users in your network? How could you know?
Let’s unpack a real-life scenario we encountered with a manufacturing client that shows why security best practices are so important and how Microsoft’s tools can help.
Hackers in the Network
We recently had a manufacturing customer in Michigan who switched to Microsoft 365 E3. As we helped them get their system set up, one of their technical leads was exploring the reporting capabilities of Azure Active Directory Premium.
Sure enough, in their new suite, they could see they had logins from Nigeria, and asked if that was correct. Since Microsoft shows accurate geolocations for logins, we knew it was correct.
We also knew that this meant someone was in their network who wasn’t supposed to be there.
In our experience, any organization that ISN’T using multifactor authentication (MFA) definitely has compromised accounts. So whether or not you’re in the manufacturing industry, it’s a good idea to get this set up.
Plus if you get set up with Azure Active Directory Premium, you’ll be able to see where your logons are coming from.
Cleaning It Up
In this case, we got the situation locked down and secured – but ultimately this calls back to the importance of investing in the right tools and security measures. If you want to take a deep dive into security and M365, view our webinars for more information
How Did Someone Get Into My Network? (The Credential Problem)
People tend to reuse their credentials (or very simple variants of their credentials), which is an understandable mistake because it can be tough to remember multiple unique passwords.
Your bank password is probably secure – but your password to, say, your fitness account may be less secure. If it’s compromised, then it’s almost certain that someone, somewhere, is trying to use it to log into your Microsoft account. If you use the same password for multiple accounts and don’t use MFA, you more than likely have a compromised account.
I Want to Keep My Network Secure… How Do I Do it?
If you want to keep your network secure, make sure you’re using the right tools, you’re optimizing your implementation, and that you’re utilizing security best practices (such as MFA). If you have any questions, or you’d like an assessment of your security posture, contact us and we can help you!
Related Posts
Welcome to the Interlink Cloud Blog
By subscribing to the blog, you will be notified whenever a new blog post is created on the site.
All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Blog Archive
- October 2023 (1)
- September 2023 (1)
- August 2023 (3)
- July 2023 (2)
- April 2023 (2)
- March 2023 (7)
- January 2023 (2)
- November 2022 (1)
- October 2022 (1)
- September 2022 (3)
- August 2022 (5)
- July 2022 (2)
- June 2022 (8)
- May 2022 (2)
- April 2022 (2)
- January 2022 (4)
- November 2021 (2)
- October 2021 (5)
- September 2021 (1)
- August 2021 (4)
