Colter Lovette

September 11, 2024

How we think about cyber security in Baseline

Imagine your business's digital infrastructure as a medieval castle. You wouldn't rely solely on a moat to keep invaders out, would you? Of course not! You'd have walls, guards, watchtowers, and maybe even a dragon or two. In the world of cybersecurity, we call this approach "defense in depth" or layered security. And just like a well-defended castle, your Microsoft 365 environment needs multiple layers of protection to keep the digital marauders at bay.


The Lego Kit Analogy

Before we dive into the nitty-gritty, let's address the elephant in the room: Microsoft 365 is like a 5000-piece Lego kit without instructions. Sure, you could try to put it together yourself, but chances are you'll end up with a wobbly structure that looks nothing like the picture on the box. That's where managed services come in - we're the master builders who know exactly which piece goes where to create a secure, efficient, and tailored solution for your business.


Layering Your Defenses: The Cybersecurity Onion

Now, let's peel back the layers of our cybersecurity onion and see how each one contributes to your overall protection:

Layer 1: Email Filtering - The Moat
Email filtering acts as your digital moat, catching the majority of phishing attempts and malicious emails before they reach your users. While not impenetrable, it significantly reduces the volume of threats that make it to your inbox.

Layer 2: Microsoft Safe Links - The Drawbridge
Safe Links serves as a dynamic drawbridge, scanning every link in real-time before granting access. It rewrites URLs in emails, ensuring that even if a threat slips past the moat, it's checked again before allowing entry.

Layer 3: Defender for Office - The Castle Walls
Microsoft Defender for Office stands as your castle walls, providing robust protection against a wide range of threats. It scans attachments, checks for malicious content, and helps prevent data breaches across your Microsoft 365 environment.

Layer 4: Endpoint Protection - The Royal Guards
Endpoint protection deploys guards on every device, ready to detect and neutralize threats. It monitors for suspicious activity, blocks malware, and ensures that even if a threat breaches other defenses, individual devices remain secure.

Layer 5: Microsoft SmartScreen - The Vigilant Scouts
SmartScreen acts as a network of scouts, patrolling the web for dangers. It checks websites and downloads against a database of known threats, warning users and blocking access to malicious content across Microsoft products.

Layer 6: Authentication Protections - The Gatekeepers
Multi-factor authentication (MFA) and phishing-resistant MFA serve as vigilant gatekeepers. They ensure that even if someone obtains a password, they can't gain entry without additional proof of identity, significantly enhancing your access security.


The Danger of Exceptions: The Weakest Link

Remember, a chain is only as strong as its weakest link. In cybersecurity, exceptions to your security rules are often that weak link. It's like leaving a secret entrance to your castle unguarded because one knight complained about the long walk to the main gate.

For example, granting local admin rights to a single user out of 100 might seem harmless, but it's equivalent to giving one person the keys to every room in the castle. Suddenly, your impenetrable fortress has a glaring vulnerability.


Consistency is Key: The Uniform Guard

Our approach focuses on consistent configurations across all users and devices. Think of it as ensuring all your castle guards wear the same uniform and follow the same protocols. This uniformity makes it much easier to spot and address potential security risks.


Putting It All Together: The Master Plan

By leveraging the full power of Microsoft 365 Business Premium, we create a comprehensive security strategy that's greater than the sum of its parts. Each feature and product works in harmony with the others, creating an interlocking defense system that's hard to penetrate.

Remember, cybersecurity isn't about building an impenetrable wall - it's about creating so many layers of security that even if one fails, the others will keep you safe. It's like having a moat, and walls, and guards, and secret traps, and... well, you get the idea.

In the end, our layered approach to cybersecurity using Microsoft 365 isn't just about deploying a bunch of fancy tech - it's about thoughtful configuration, consistent application of security policies, and understanding how each piece fits into the bigger picture. Because when it comes to protecting your digital castle, you want a security system that's less "LEGO" and more "legendary."

---
Colter Lovette
Co-Founder & CEO of 32Waves Inc
www.32waves.com