{"id":20638,"date":"2018-07-19T11:33:13","date_gmt":"2018-07-19T15:33:13","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/office-365-protection\/20638\/"},"modified":"2019-11-15T13:33:25","modified_gmt":"2019-11-15T11:33:25","slug":"office-365-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/office-365-protection\/20638\/","title":{"rendered":"Enhancing Office 365&#8217;s detection and antispam"},"content":{"rendered":"<p>Infection by e-mail is a time-honored tradition for good reason. Take a look through Securelist, our blog for security researchers and experts. You don\u2019t have to go far back \u2014 let\u2019s say to the beginning of July \u2014 to get an eyeful of malware distributed through e-mail. Spam is a common means to distribute ransomware such as Rakhni. Classic phishing is a classic method for straight-up stealing victims\u2019 cryptocurrency. <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/spear-phishing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Spear-phishing<\/a> is a current APT trend. E-mail attachments spread malware such as Cryacl.<\/p>\n<p>E-mail is hardly the most sophisticated malware vector, but it is the most widespread. In theory, the answer to the abovementioned threats lies in a solution installed on your business\u2019s mail server that can filter spam and check attachments for the malware traces. However, that solution is of limited help if you use cloud services, such as Microsoft Office 365.<\/p>\n<p>Of course, that does not mean you should stop using cloud e-mail. Just keep in mind that if your business relies on an outside service, you need to augment the service\u2019s default protection. In the case of cloud-based Microsoft Office 365, we recommend Kaspersky Security for Microsoft Office 365.<\/p>\n<p>Not long ago, testers from Virus Bulletin <a target=\"_blank\" href=\"https:\/\/www.virusbulletin.com\/blog\/2018\/04\/standalone-product-test-kaspersky-security-microsoft-office-365\/\" rel=\"noopener noreferrer nofollow\">compared levels of protection<\/a> between Office 365 alone and Office 365 in combination with our solution. Our solution raised antispam detection by 2.41% without adding any new false positives. At first glance, that may not look spectacular. However, the improvement from 97.41% to 99.82% is a big deal. Microsoft Office 365 by itself is good at spam filtering. It catches all obvious spam. The spam it misses is the stuff that doesn\u2019t really look like spam.<\/p>\n<p>Can you guess who is making a real effort to disguise spam as legitimate mail? That\u2019s right: Phishing actors and malware operators.<\/p>\n<p>(The improvement we offer over Office 365 alone in antimalware efficiency should be clear without additional explanation: detection jumps from 79.6% to 99.6%. Fighting malware is our business; we have been doing it for more than 21 years.)<\/p>\n<p>Put in gaming terms, our solution is like a magical Cloak of Protection. With it, you have +20 for malware detection and +2 for spam avoidance. That\u2019s protection worth using. You can learn more about Kaspersky Security for Microsoft Office 365 and our other cloud solutions on the Kaspersky Business Hub website.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"cloudhub\">\n","protected":false},"excerpt":{"rendered":"<p>To be safe, augment the service\u2019s default protection. <\/p>\n","protected":false},"author":700,"featured_media":20639,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[2318,816,2795],"class_list":{"0":"post-20638","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-antispam","10":"tag-cloud","11":"tag-office-365"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/office-365-protection\/20638\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/office-365-protection\/13705\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/office-365-protection\/11484\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/office-365-protection\/15779\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/office-365-protection\/14046\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/office-365-protection\/13180\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/office-365-protection\/16540\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/office-365-protection\/16001\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/office-365-protection\/23129\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/office-365-protection\/10738\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/office-365-protection\/11048\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/office-365-protection\/9500\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/office-365-protection\/17314\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/office-365-protection\/20642\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/office-365\/","name":"Office 365"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/20638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=20638"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/20638\/revisions"}],"predecessor-version":[{"id":23871,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/20638\/revisions\/23871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/20639"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=20638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=20638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=20638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}