{"id":57031,"date":"2018-10-23T16:34:13","date_gmt":"2018-10-23T16:34:13","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=423624"},"modified":"2018-10-23T16:34:13","modified_gmt":"2018-10-23T16:34:13","slug":"top-10-security-steps-in-microsoft-365-that-political-campaigns-can-take-today","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2018\/10\/23\/top-10-security-steps-in-microsoft-365-that-political-campaigns-can-take-today\/","title":{"rendered":"Top 10 security steps in Microsoft 365 that political campaigns can take today"},"content":{"rendered":"<div><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2018\/10\/top-10-security-steps-in-microsoft-365-that-political-campaigns-can-take-today.png\" class=\"ff-og-image-inserted\" \/><\/div>\n<p>The increasing frequency of cyberattacks make clear that more must be done to protect key democratic institutions from cyber-enabled interference. With\u00a0just a few\u00a0weeks left before the\u00a0U.S.\u00a0midterm\u00a0elections and early voting under way,\u00a0campaigns\u00a0must stay vigilant in protecting against cyberattacks to their online collaboration tools, including email.\u00a0Microsoft recommends\u00a0taking action today to protect against phishing, malware,\u00a0account compromise, and other threats\u2014see\u00a0<a target=\"_blank\" href=\"https:\/\/support.office.com\/article\/top-10-ways-to-secure-office-365-and-microsoft-365-business-plans-from-cyber-threats-de2da300-dbb6-4725-bb12-b85a9d296e75?ui=en-US&amp;rs=en-001&amp;ad=US\" rel=\"noopener\">Top 10 ways to secure Office 365 and Microsoft 365 Business plans from cyberthreats<\/a>.\u00a0These recommendations are tailored for small to mid-sized political campaigns and election-focused stakeholders using\u00a0<a target=\"_blank\" href=\"https:\/\/products.office.com\/en-us\/compare-all-microsoft-office-products?tab=2\" rel=\"noopener\">Office 365<\/a>\u00a0or <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/business\" rel=\"noopener\">Microsoft 365<\/a>. Any organization\u2014especially those without full-time IT security staff\u2014can benefit from\u00a0taking these actions.<\/p>\n<p>This guidance\u00a0provides\u00a0step-by-step instructions for\u00a0using\u00a010 high-impact security\u00a0capabilities.\u00a0These\u00a0actions help you implement many of the best practices\u00a0recommended in\u00a0the\u00a0<a target=\"_blank\" href=\"https:\/\/www.belfercenter.org\/CyberPlaybook\" rel=\"noopener\">Cybersecurity Campaign Playbook<\/a>,\u00a0created by the <a target=\"_blank\" href=\"https:\/\/www.belfercenter.org\/project\/defending-digital-democracy\" rel=\"noopener\">Defending Digital Democracy<\/a> program at Harvard Kennedy School\u2019s\u00a0Belfer\u00a0Center for Science and International Affairs.<\/p>\n<p>Top 10\u00a0cybersecurity\u00a0recommendations:<\/p>\n<ol>\n<li>Set\u00a0up\u00a0two-step\u00a0verification for\u00a0all staff.<\/li>\n<li>Train\u00a0campaign staff to quickly identify phishing attacks.<\/li>\n<li>Use dedicated accounts\u00a0for administration.<\/li>\n<li>Raise the level of malware protection in mail.<\/li>\n<li>Protect against ransomware.<\/li>\n<li>Prevent\u00a0emails\u00a0auto-forwarding\u00a0outside of the campaign.<\/li>\n<li>Increase encryption\u00a0for sensitive emails.<\/li>\n<li>Protect your email from phishing attacks.<\/li>\n<li>Protect against malicious attachments in email.<\/li>\n<li>Protect against phishing attacks\u00a0that include\u00a0malicious website links in email or other files.<\/li>\n<\/ol>\n<p>Read <a target=\"_blank\" href=\"https:\/\/support.office.com\/article\/top-10-ways-to-secure-office-365-and-microsoft-365-business-plans-from-cyber-threats-de2da300-dbb6-4725-bb12-b85a9d296e75?ui=en-US&amp;rs=en-001&amp;ad=US\" rel=\"noopener\">Top 10 ways to secure Office 365 and Microsoft 365 Business plans from cyberthreats<\/a>\u00a0for details on how to implement each action.<\/p>\n<p>These recommendations are provided as part of Microsoft\u2019s ongoing commitment to the\u00a0<a target=\"_blank\" href=\"https:\/\/aka.ms\/defendingdemocracy\" rel=\"noopener\">Defending Democracy Program<\/a>. Qualifying organizations using Office 365 can also take advantage of\u00a0<a target=\"_blank\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2018\/08\/20\/protecting-democracy-with-microsoft-accountguard\/\" rel=\"noopener\">Microsoft\u00a0AccountGuard<\/a>\u00a0for additional protection\u00a0to leverage\u00a0Microsoft\u2019s\u00a0state-of-the-art\u00a0threat\u00a0detection\u00a0and notification in case of targeted nation-state cyberattacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The increasing frequency of cyberattacks make clear that more must be done to protect key democratic institutions from cyber-enabled interference. With\u00a0just a few\u00a0weeks left before the\u00a0U.S.\u00a0midterm\u00a0elections and early voting under way,\u00a0campaigns\u00a0must stay vigilant in protecting against cyberattacks to their online collaboration tools, including email.\u00a0Microsoft recommends\u00a0taking action today to protect against phishing, malware,\u00a0account compromise, and other [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":57032,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[50,52],"class_list":["post-57031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-recent-news","tag-security"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/57031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=57031"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/57031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/57032"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=57031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=57031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=57031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}