Security

Office 365 Ransomware protection with SpinOne New Features

Office 365 Ransomware protection with SpinOne New Features, including cloud monitor, data audit, browse OneDrive, PST export, and others

Companies are moving to the cloud in drove for housing many business-critical processes, including employee collaboration and productivity tools. The pandemic has taught us many things about how employees can work effectively. They don’t have to be located on-premises if they have the tools that allow them to carry out their business productivity tasks effectively. Moving to the cloud has been accelerated by the need for employees to work from anywhere in highly distributed teams. Microsoft 365 has been the target of many cloud migrations with Microsoft Teams seeing huge adoption in the enterprise for the reasons mentioned. Cybersecurity in these cloud SaaS environments has come into clear focus. As ransomware and other extremely dangerous threats are targeting businesses, organizations need to be keenly focused on tightening the security of their cloud SaaS environments.

SpinOne is a great solution that provides arguably some of the best all-around features for protecting and securing your data in cloud SaaS environments like Google Workspace and Microsoft 365. Focusing on Microsoft 365, Spin has released new features that allow businesses to further simplify and strengthen their cybersecurity. Note how you can implement Office 365 Ransomware protection with SpinOne new features.

Ransomware encryption in the cloud?

Yes, ransomware can infect cloud-housed data. While many ransomware gangs are presently focused on on-premises data as they can often more quickly proliferate ransomware across on-premises servers, ransomware is no doubt going to begin targeting cloud SaaS data. Criminals know businesses are moving their critical data and apps to cloud SaaS and other solutions. So, to remain lucrative and extort money from businesses, cybercriminals will be following suit with this trend.

A ransomware attack in the cloud can happen due to various attack vectors. These include:

  • Phishing emails
  • File synchronization
  • Malicious cloud applications

Phishing emails

Phishing emails are one of the most common ways that cybercriminals attempt to deliver ransomware to business environments. Hackers send emails to end-users that often masquerade as from a legitimate sender containing malicious attachments.

Note the following posted recently by ZDNet:

Cybersecurity researchers at Coveware analysed ransomware attacks during the second quarter of this year and have detailed how phishing attacks and RDP attacks are the most popular entry points for starting ransomware attacks. Part of the appeal for cyber criminals is that these are low-cost to carry out while also being effective. 

Phishing attacks – where cyber criminals send emails containing a malicious attachment or direct victims towards a compromised website which delivers ransomware – have slightly grown in popularity over the last quarter, accounting for 42 percent of attacks. 

File synchronization

File synchronization is generally not as prolific as the other ways in modern cloud environments. However, it can still be a path to files in OneDrive and other cloud environments becoming encrypted. This attack happens when an end-user who has a cloud synchronization app running like Google Drive or Microsoft OneDrive for Business gets infected with ransomware. When the local files get encrypted by the ransomware, this triggers a synchronization of the data to the cloud. Then the cloud copy is encrypted.

Malicious cloud applications

Malicious cloud applications are an increasingly popular way that ransomware infects cloud environments. Similar to phishing attacks, cybercriminals create malicious cloud applications that pose as legitimate applications. These trick end-users into granting OAuth permissions to the application which then has the ability to encrypt cloud data. OAuth access is dangerous as it bypasses two-factor authentication by default and must be manually revoked.

Other Cloud Cybersecurity Challenges

One of the dangers of ransomware is that it can encrypt files, without administrator visibility. IT and SecOps on-premises can be challenged to have the visibility needed. This problem often grows when organizations migrate to the cloud. A lack of visibility to cybersecurity issues in the cloud is a definite challenge.

Also, like on-premises environments, businesses often use multiple solutions with various overlapping features and numerous dashboards to administer and maintain. With this being said, simplifying the approach with a more robust solution that provides visibility in a single-pane-of-glass view is much more effective.

On top of the lack of visibility and overlapping tools, businesses today are also challenged from the standpoint of a lack of automated responses to cybersecurity events. Cybersecurity automation is absolutely essential to combat the plethora of cybersecurity threats facing enterprise cloud and hybrid cloud SaaS environments.

File Versioning is Limited

Cloud SaaS environments contain file versioning in the cloud that allows seeing a version history of files contained in cloud storage. Admins and users can then recover files and other Microsoft 365 data. However, file versioning has limitations in the protection it provides. The point in time versions can easily be deleted by any user who has write access to files. They can simply delete the entire version history.

In addition, file versioning is limited in the amount of time they are valid. The retention is mainly controlled by Microsoft and may not align with each individual business SLA.

SpinOne Accelerating Cloud SaaS Cybersecurity

There is a solution that caught my attention a few years back, called SpinBackup. It wasn’t just the average cloud SaaS backup, of which, now there are many cloud backup solutions. SpinOne, the evolution of SpinBackup, combines effective cloud backups with powerful cybersecurity features, as these go hand-in-hand. SpinOne stands alone in this space with the features and capabilities provided to organizations moving to the cloud.

It has been great to see how the product has continued to improve in the past couple of years. In 2021, Spin has already introduced several new features in Q2, with three more new capabilities to note. Let’s look at the following:

• Cloud monitor
• Data audit
• Security policies
• Add-ons

Cloud monitor

Cloud Monitor’s two child dashboards provide the following:

  • Activity log – All monitored activity captured by Spin
  • Incidents – Cybersecurity events captured by Spin

Cloud Monitor Activity log provides a view of activity across your Microsoft 365 organization.  You can see:

  • timestamps
  • activity recorded
  • source, user
  • IP address
  • IP geolocation information.

Also, note the filter menus at the top of the screen. You can look for specific data this way.

Viewing cloud monitor activity log using SpinOne
Viewing cloud monitor activity log using SpinOne

SpinOne activity types for Microsoft 365 cloud monitor
SpinOne activity types for Microsoft 365 cloud monitor

The Incidents dashboard includes the following incident types:

  • Ransomware protection
  • Shared items control
  • Sensitive data detection
Incidents of CCNs reported in SpinOne Cloud monitor
Incidents of CCNs reported in SpinOne Cloud monitor

Data audit

Businesses today must keep a check on who data is shared with, by whom, when, and what type of data it is. SpinOne makes keeping an eye on data leakage with the Data Audit dashboard. Data Audit displays OneDrive information that is shared (files or folders) with others. You can see:

  • Owner
  • Who data is shared with
  • When they were shared
  • Policies
Viewing the SpinOne Shared Data dashboard
Viewing the SpinOne Shared Data dashboard

Using the PII dashboard you can have visibility to PII data contained in emails sent or received. SpinOne captures the information in redacted form.

Viewing the PII dashboard
Viewing the PII dashboard

Security Policies

SpinOne provides the ability to create security policies that control security processes included with SpinOne:

  • Ransomware protection
  • OneDrive Sharing Visibility and Control
  • Sensitive Data Detection
  • Restore Filtration
SpinOne Security Policies
SpinOne Security Policies

Below is a look at the properties of a security policy.

Sensitive Data Detection properties in SpinOne
Sensitive Data Detection properties in SpinOne

Add-ons

SpinOne has added an easy way to interact with and upgrade backend archive and storage licenses.

These include:

  • Archive licenses– A cost-effective license that allows retaining terminated employee data
    • One Automated Backup
    • Unlimited Manual Backups
    • Unlimited Download
    • Unlimited Restore
    • Unlimited Storage
    • Access to the latest Snapshot

Storage – With the storage add-on, you can increase your overall account storage capacity. Businesses can upgrade their storage capacity at any time to avoid exceeding storage limits.

Viewing add ons dashboard in SpinOne
Viewing add ons dashboard in SpinOne

Recent New Features introduced by SpinOne

Spin has recently introduced the following new features:

  1. OneDrive folder structure browsing during recovery
  2. Export Exchange Online mailboxes and emails to PST
  3. Increased storage from 30GB to 50GB

OneDrive folder structure browsing during recovery

With the new feature, cloud administrators can browse the folder structure of user’s OneDrives. This helps to locate and restore information.  This new feature leads to simplified operations, quicker restores, and less downtime. 

Browsing OneDrive folder structure during recovery
Browsing OneDrive folder structure during recovery

Export Exchange Online mailboxes and emails to PST

SpinOne makes it easy to export Exchange Online mailbox data to a PST file. PSTs are a standard file type used to export mailbox data as an archive, local storage, and other use cases. 

SpinOne allows easily exporting Exchange Online mailboxes to PST
SpinOne allows easily exporting Exchange Online mailboxes to PST

Increased storage from 30GB to 50GB

New SpinOne licenses now provide 50 GB of storage. This is an upgrade from the previous 30 GB capacity, but only for those who are on the current $9 user/month SpinOne subscription plan. With this increase, Spin is providing even better value to customers and those who are looking to protect business-critical data in the cloud. 

Wrapping Up

Office 365 Ransomware protection with SpinOne new features provides the ability to have greater visibility in the environment, simplified SecOps operations, and other really robust features for organizations migrating to the cloud. Ransomware will only continue to threaten data, wherever it is located. Tools like SpinOne help organizations leverage the cloud with the cybersecurity needed.

Learn more about SpinOne and sign up for a free trial version here.

More Spinone articles here:

Subscribe to VirtualizationHowto via Email 🔔

Enter your email address to subscribe to this blog and receive notifications of new posts by email.



Brandon Lee

Brandon Lee is the Senior Writer, Engineer and owner at Virtualizationhowto.com, and a 7-time VMware vExpert, with over two decades of experience in Information Technology. Having worked for numerous Fortune 500 companies as well as in various industries, He has extensive experience in various IT segments and is a strong advocate for open source technologies. Brandon holds many industry certifications, loves the outdoors and spending time with family. Also, he goes through the effort of testing and troubleshooting issues, so you don't have to.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.