<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>safe links &#8211; Objective Technologies</title>
	<atom:link href="https://www.objectiveuk.com/tag/safe-links/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.objectiveuk.com</link>
	<description>IT Support, Cyber Security and Microsoft 365</description>
	<lastBuildDate>Wed, 16 Nov 2022 21:00:04 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.objectiveuk.com/wp-content/uploads/2026/03/cropped-Logos_Objective-32x32.jpg</url>
	<title>safe links &#8211; Objective Technologies</title>
	<link>https://www.objectiveuk.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft 365 Defender: Protecting users from phishing attacks</title>
		<link>https://www.objectiveuk.com/2022/11/16/microsoft-365-defender-protecting-users-from-phishing-attacks/</link>
		
		<dc:creator><![CDATA[Objective]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 21:00:04 +0000</pubDate>
				<category><![CDATA[Office]]></category>
		<category><![CDATA[anti-malware]]></category>
		<category><![CDATA[anti-spam 2022november16office_a]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[microsoft 365]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[safe links]]></category>
		<category><![CDATA[sandboxing]]></category>
		<guid isPermaLink="false">https://objective.miara.co.uk/microsoft-365-defender-protecting-users-from-phishing-attacks/</guid>

					<description><![CDATA[Microsoft 365 Defender is a powerful cybersecurity tool that helps protect users from phishing attacks. In this blog post, we will discuss how Microso...]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-full wp-image-39529 alignleft" src="https://www.objectiveuk.com/wp-content/uploads/2022/11/img-featured-How-does-Microsoft-365-Defender-fight-phishing-A-1.jpg" alt="" width="170" height="170" />Microsoft 365 Defender is a powerful cybersecurity tool that helps protect users from phishing attacks. In this blog post, we will discuss how Microsoft 365 Defender works and why you should consider implementing it in your business.</p>
<p><a href="https://www.phishing.org/what-is-phishing" rel="noopener" target="_blank">Phishing</a> is one of the most common methods used by cybercriminals to steal sensitive information such as login credentials and credit card numbers. Phishers typically send out emails purportedly from a legitimate source such as a bank or government agency. To gain their victims’ trust, they may use underhanded tactics, such as referring to the victims by their nicknames. These scammers may even take control of email accounts to further deceive their targets.</p>
<p><a href="https://learn.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide" rel="noopener" target="_blank">Microsoft 365 Defender</a> has a variety of tools and features to help businesses defend against phishing attacks, including standard anti-malware solutions, to distinguish between acceptable and suspicious behaviors. Defender uses machine learning to create a list of contacts that users communicate with most frequently.</p>
<h3>Anti-malware</h3>

<p>Emails containing <a href="https://www.techtarget.com/searchsecurity/definition/malware" rel="noopener" target="_blank">malware</a>, such as ransomware and spyware, can infect your computer when opened. Ransomware locks users out of their systems and files until a ransom is paid. Spyware, on the other hand, steals data by recording keystrokes, copying clipboards, taking screenshots, and more.</p>
<p>Unlike other security programs that only use one line of defense, Defender utilizes multiple layers to protect against known and unknown malware. This not only filters harmful attachments but also aids in real-time threat response. Microsoft regularly releases updates to keep its defenses effective against the most current threats.</p>
<h3>Anti-spam</h3>

<p>As mentioned, phishing attacks typically use spam emails to dupe victims. By blocking spam emails, you can greatly reduce your chances of falling prey to such an attack.</p>
<p>Defender&#8217;s advanced anti-spam technology works by analyzing both an email&#8217;s source and contents. Emails from untrustworthy or suspected sources are automatically moved to the Spam folder. In addition, this feature monitors company activity regularly to prevent anyone from sending spam emails.</p>
<h3>Sandbox</h3>

<p>Unfortunately, people sometimes open email attachments without thinking, which can cause harmful software to enter their computers. Defender protects you from this threat by <a href="https://www.techtarget.com/searchmobilecomputing/definition/application-sandboxing" rel="noopener" target="_blank">sandboxing</a> all email attachments. Microsoft will send you a warning message if the file appears to be unsafe so you don’t click on or download it. However, if it&#8217;s safe, you&#8217;ll be able to open it without any issues.</p>
<h3>Safe Links</h3>

<p>Some phishing emails contain URLs that lead to fraudulent websites that are made to steal your personal information. Other times, these URLs will lead you to a page laden with malware.</p>
<p>But with Microsoft 365 Defender’s Safe Links feature, you can avoid being compromised by files linked to malicious URLs. Safe Links scans email links for known malicious hyperlinks to protect users. If the link takes users to a malicious website, Defender will issue a warning to not proceed. If the destination URL is safe, users can open it normally. And even if users don&#8217;t report any changes, Defender will rescan links and report anything that looks suspicious.</p>
<p>If you&#8217;re not sure how to get started with Microsoft 365 Defender, our team of experts can help. Contact us today and we&#8217;ll be happy to guide you through the process of setting up Defender and protecting your data.<br /><div class="autoblogfoot">Published with permission from TechAdvisory.org. <a href="http://www.techadvisory.org/2022/11/microsoft-365-defender-protecting-users-from-phishing-attacks/" target="_blank" rel="noopener">Source.</a></div></p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prevent phishing scams using Microsoft 365 Defender</title>
		<link>https://www.objectiveuk.com/2021/10/29/prevent-phishing-scams-using-microsoft-365-defender/</link>
		
		<dc:creator><![CDATA[Objective]]></dc:creator>
		<pubDate>Fri, 29 Oct 2021 20:00:30 +0000</pubDate>
				<category><![CDATA[Office]]></category>
		<category><![CDATA[2021october29office_a]]></category>
		<category><![CDATA[advanced threat protection]]></category>
		<category><![CDATA[anti-impersonation]]></category>
		<category><![CDATA[anti-spoofing]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[microsoft 365]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[safe links]]></category>
		<guid isPermaLink="false">https://objective.miara.co.uk/prevent-phishing-scams-using-microsoft-365-defender/</guid>

					<description><![CDATA[Microsoft is an established provider of top-tier business productivity software — and its commitment to its subscribers’ cybersecurity is integral...]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-full wp-image-33537" src="https://www.objectiveuk.com/wp-content/uploads/2018/10/2018October30Office_A-4.png" alt="" width="170" height="170" />Microsoft is an established provider of top-tier business productivity software — and its commitment to its subscribers’ cybersecurity is integral to that reputation. To combat phishing, one of today’s most prevalent cyberthreats, the software giant has equipped Microsoft 365 Defender with powerful features. Here are some of them.
<h3>1. Anti-phishing</h3>
The most dangerous types of phishing scams involve emails that are disguised to appear like it&#8217;s from an entity. An attacker may use cunning tactics, such as referring to the victims by their nickname. They may even take over actual email accounts and use these to trick their victims.</p>
<p>Through machine learning, Defender creates a list of contacts that users normally communicate with. It then employs an array of tools, including standard anti-malware solutions, to differentiate acceptable from suspicious behaviors.
<h3>2. Anti-spam</h3>
Since common phishing campaigns utilize spam emails to victimize people, blocking spam is a great way to protect your company from such attacks.</p>
<p>Defender’s anti-spam technology addresses the issue by examining both an email’s source and its contents. If an email is found to come from an untrustworthy source or has suspicious contents, it is automatically sent to the Spam folder. What’s more, this feature regularly checks the activity of people in your company to ensure that none of them sends out spam emails.
<h3>3. Anti-malware</h3>
Malware, such as ransomware and spyware, can spread via phishing emails. Ransomware locks systems and files from users until a ransom is paid. Spyware, on the other hand, steals data by recording keystrokes, copying clipboards, and taking screenshots, among other methods.</p>
<p>Defender employs a multilayered defense against both known and unknown types of malware. This covers the different stages of email transmission security, including filtering potentially harmful attachments, and real-time threat response. Microsoft also regularly deploys new definition updates to keep its defenses armed against the latest threats.
<h3>4. Sandbox</h3>
It’s not uncommon for some users to accidentally open a malicious email attachment, especially if they’re not careful.</p>
<p>Defender resolves this issue by opening all attachments in a sandbox first. This sandbox is an isolated environment, so if the attachment is malicious, it will only infect the sandbox and not your actual system. Microsoft will then warn you not to open the file. If it’s safe, you will be able to open it normally.
<h3>5. Safe Links</h3>
Instead of attachments, some phishing emails contain URLs that lead to fraudulent websites — often made to look like legitimate ones — that require victims to provide their personal information. Some of these URLs also lead to pages that download malware into a computer.</p>
<p>Through a process called URL detonation, Safe Links protects users by scanning the links in their emails and checking for malicious behavior, such as the transmission of malware. If the link opens a malicious website, Microsoft Defender will warn users not to visit it. Otherwise, users can open the destination URL normally. Even so, the service will rescan the link in the succeeding days and report any suspicious changes.</p>
<p>What’s great about Safe Links is that it also scans links in emails from people within your company and works on files uploaded to Microsoft Teams and SharePoint.
<h3>6. User Submissions</h3>
Defender allows you to set a specific mailbox to send emails you deem a threat. The User Submissions feature lets you set criteria for both malicious and safe email and identify mailboxes besides your spam folder to keep these messages in. This feature gives your administrators greater control over which emails to flag and which to report to Microsoft.
<h3>7. Enhanced Filtering</h3>
If your company uses third-party services to route emails to your on-premises environment before they are sent to Microsoft 365, you will benefit from Enhanced Filtering for Connectors. Defender uses inbound connectors to determine the trustworthiness of email sources. The more complex your routing scenario is, the more likely that an email’s inbound connectors will not reflect its real source.</p>
<p>Enhanced Filtering preserves authentication signals that may have been lost over the course of routing emails. This maximizes the effectiveness of Microsoft 365’s overall filtering capabilities, helping it detect spam and phishing emails.</p>
<p>If you need an email service that promotes efficiency while protecting your business, we can deploy and manage Microsoft 365 for you. Call us today to get started.<br /><div class="autoblogfoot">Published with permission from TechAdvisory.org. <a href="http://www.techadvisory.org/2021/10/prevent-phishing-scams-using-microsoft-365-defender/" target="_blank" rel="noopener">Source.</a></div></p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
