<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The Blackhole of Office 365: 45-day Security Challenge in Email and Collaboration</title>
    <link>https://community.checkpoint.com/t5/Email-and-Collaboration/The-Blackhole-of-Office-365-45-day-Security-Challenge/m-p/37503#M135</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: center;"&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://media.licdn.com/mpr/mpr/AAEAAQAAAAAAAAz-AAAAJGMxMjhhYjYzLWUwMjgtNGZjNi05ZWMzLTUwNzQ1ZGQ2ZjE1NQ.png" style="width: 620px; height: 333px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;At this very moment, your inbox and social media account are probably cluttered with promises for the latest quick fix or magical pill that turns you into a lean, mean version of your self in just 30 days. In the same vain, many organizations have adopted a similar approach for outsourcing their infrastructure and applications to the 'cloud' in an effort to 'slim down'. As I described in last years article, "&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/pulse/when-increased-roi-increases-risk-infection-dirty-secret-johnson?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3BzZROwQGeRpSCZvvSM2wOWQ%3D%3D" style="color: #8c68cb; background: transparent; border: 0px; text-decoration: none;" target="_blank"&gt;When increased ROI also increases the Risk Of Infection (ROI)&lt;/A&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;", many organizations moving to the cloud believe that they are also outsourcing the application security risk to those providers as well and how easy it is for hackers to target Office 365 environments. Like many of these programs, the short term gains may be coming at the price of your (company's security) long-term health.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Did you know? By default, Microsoft Office 365 only provides basic protection against &lt;A href="https://technet.microsoft.com/en-us/library/exchange-online-antispam-and-antimalware-protection.aspx"&gt;&lt;EM&gt;&lt;STRONG&gt;known&lt;/STRONG&gt;&lt;/EM&gt; malware&lt;/A&gt;.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Abstaining from the cloud is probably not an option, but protection from unknown malware is. I'm proposing a 45-day Security Challenge for organizations utilizing Office 365. As an API solution, it's simple to deploy, does not require any MTA or proxy re-routing and will take you approximately 15-20 minutes to protect a subset of mailboxes OR your entire organization with no downtime or chance for outage. It's called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/products/sandblast-office365-security/" rel="nofollow noopener" style="color: #8c68cb; background: transparent; border: 0px; text-decoration: none;" target="_blank"&gt;Sandblast for Office 365&lt;/A&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;STRONG style="background: transparent; border: 0px; font-weight: bold; font-size: 21px;"&gt;The 45-day Security Challenge&lt;/STRONG&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Engineering Support.&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;A complimentary technical resource to help get you up and running. Or, if you prefer, we can provide you a step-by-step guide to do it yourself. (You will need to administrative credentials for your company's Office 365 account.)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Detect, Prevent, Clean or all the above.&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7); font-weight: normal;"&gt;Choose how you deploy for your environment. Detect will give you the visibility of email threats found. Prevent will provide active defense from even Patient-0 entering your organization. Clean will apply&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.checkpoint.com/products/threat-extraction/" rel="nofollow noopener" style="color: #8c68cb; background: transparent; border: 0px; font-weight: normal; text-decoration: none;" target="_blank"&gt;Threat Extraction&lt;/A&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7); font-weight: normal;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for all incoming attachments which extracts active content from files or flattens to PDF thereby removing any potential threats.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;No sales calls.&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;It's yours to try for 45-days. If at the end of 45-days you want to make it a permanent solution, it's up to you to reach out to us. Alternatively, if you decide this isn't for you, just delete your account.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Bridging the gap.&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Check Point has you covered. Whichever organization is most in need based upon the most threats found will be protected for the next six months until a permanent solution is put into place (even if you choose another vendor solution).&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Getting Started&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;Send me a LinkedIn message, shoot me an email (stevej at checkpoint.com), or leave the comment "45-day cleanse" on this article and I'll assign a technical resource to get you started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, in just 15-20 minutes I guarantee that your organizational security health will immediately improve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your truly,&lt;/P&gt;&lt;P&gt;\stevej&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen Johnson&lt;/P&gt;&lt;P&gt;Head of Advanced Threat Prevention, Americas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Jul 2017 01:02:40 GMT</pubDate>
    <dc:creator>Steve_Johnson</dc:creator>
    <dc:date>2017-07-07T01:02:40Z</dc:date>
    <item>
      <title>The Blackhole of Office 365: 45-day Security Challenge</title>
      <link>https://community.checkpoint.com/t5/Email-and-Collaboration/The-Blackhole-of-Office-365-45-day-Security-Challenge/m-p/37503#M135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: center;"&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://media.licdn.com/mpr/mpr/AAEAAQAAAAAAAAz-AAAAJGMxMjhhYjYzLWUwMjgtNGZjNi05ZWMzLTUwNzQ1ZGQ2ZjE1NQ.png" style="width: 620px; height: 333px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;At this very moment, your inbox and social media account are probably cluttered with promises for the latest quick fix or magical pill that turns you into a lean, mean version of your self in just 30 days. In the same vain, many organizations have adopted a similar approach for outsourcing their infrastructure and applications to the 'cloud' in an effort to 'slim down'. As I described in last years article, "&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/pulse/when-increased-roi-increases-risk-infection-dirty-secret-johnson?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_post_details%3BzZROwQGeRpSCZvvSM2wOWQ%3D%3D" style="color: #8c68cb; background: transparent; border: 0px; text-decoration: none;" target="_blank"&gt;When increased ROI also increases the Risk Of Infection (ROI)&lt;/A&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;", many organizations moving to the cloud believe that they are also outsourcing the application security risk to those providers as well and how easy it is for hackers to target Office 365 environments. Like many of these programs, the short term gains may be coming at the price of your (company's security) long-term health.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Did you know? By default, Microsoft Office 365 only provides basic protection against &lt;A href="https://technet.microsoft.com/en-us/library/exchange-online-antispam-and-antimalware-protection.aspx"&gt;&lt;EM&gt;&lt;STRONG&gt;known&lt;/STRONG&gt;&lt;/EM&gt; malware&lt;/A&gt;.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Abstaining from the cloud is probably not an option, but protection from unknown malware is. I'm proposing a 45-day Security Challenge for organizations utilizing Office 365. As an API solution, it's simple to deploy, does not require any MTA or proxy re-routing and will take you approximately 15-20 minutes to protect a subset of mailboxes OR your entire organization with no downtime or chance for outage. It's called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/products/sandblast-office365-security/" rel="nofollow noopener" style="color: #8c68cb; background: transparent; border: 0px; text-decoration: none;" target="_blank"&gt;Sandblast for Office 365&lt;/A&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;STRONG style="background: transparent; border: 0px; font-weight: bold; font-size: 21px;"&gt;The 45-day Security Challenge&lt;/STRONG&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Engineering Support.&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;A complimentary technical resource to help get you up and running. Or, if you prefer, we can provide you a step-by-step guide to do it yourself. (You will need to administrative credentials for your company's Office 365 account.)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Detect, Prevent, Clean or all the above.&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7); font-weight: normal;"&gt;Choose how you deploy for your environment. Detect will give you the visibility of email threats found. Prevent will provide active defense from even Patient-0 entering your organization. Clean will apply&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.checkpoint.com/products/threat-extraction/" rel="nofollow noopener" style="color: #8c68cb; background: transparent; border: 0px; font-weight: normal; text-decoration: none;" target="_blank"&gt;Threat Extraction&lt;/A&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7); font-weight: normal;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for all incoming attachments which extracts active content from files or flattens to PDF thereby removing any potential threats.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;No sales calls.&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;It's yours to try for 45-days. If at the end of 45-days you want to make it a permanent solution, it's up to you to reach out to us. Alternatively, if you decide this isn't for you, just delete your account.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Bridging the gap.&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Check Point has you covered. Whichever organization is most in need based upon the most threats found will be protected for the next six months until a permanent solution is put into place (even if you choose another vendor solution).&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;SPAN style="color: rgba(0, 0, 0, 0.7);"&gt;Getting Started&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;Send me a LinkedIn message, shoot me an email (stevej at checkpoint.com), or leave the comment "45-day cleanse" on this article and I'll assign a technical resource to get you started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, in just 15-20 minutes I guarantee that your organizational security health will immediately improve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your truly,&lt;/P&gt;&lt;P&gt;\stevej&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen Johnson&lt;/P&gt;&lt;P&gt;Head of Advanced Threat Prevention, Americas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jul 2017 01:02:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Email-and-Collaboration/The-Blackhole-of-Office-365-45-day-Security-Challenge/m-p/37503#M135</guid>
      <dc:creator>Steve_Johnson</dc:creator>
      <dc:date>2017-07-07T01:02:40Z</dc:date>
    </item>
  </channel>
</rss>

