Monday, March 4, 2024

Microsoft Added Ransomware Protection, Recovery & Email Encryption For Office 365 Users

Now office 365 users get’s built-in Ransomware Detection, Recovery & Email encryption. The new functions are coming to Office 365 Home and Office 365 Personal subscribers.

The Ransomware capabilities will be available to office 365 users soon and other features like Password protected sharing links, email encryption, and prevent forwarding will be in upcoming weeks. Also, you can Read Ransomware Attack Response and Mitigation Checklist.

Recover files & Ransomware detection for Office 365

With the new File Restore option, you can recover the files of your one drive to the previous point of time within the 30 days. The new feature enables you to recover the accidental file removal, ransomware, file damage and other catastrophic events.

Office 365 users get alerted through an email, mobile, or desktop notification if their files are under attack and provided guidance to restore the files based on the date and time of the attack.

Microsoft adds password protection for sending an email or sharing a link so that it will be sent only to the intended recipients.

While sharing the links office 365 users are provided with an option to set a password for accessing a shared file or folder. Email encryption with outlook adds additional security layer and ensures end-to-end encryption of your email.

Recipients use to receive a link to the trusted Office 365 webpage where they can choose to receive a one-time passcode or re-authenticate with a trusted provider before viewing the email.

“When composing an email in, sensitive information like social security numbers can be detected to provide you with a suggestion to send with encryption” says Microsoft.

Prevent forwarding restricts users from copying or forwarding emails that you sent from the outlook. Emails sent with the prevent forwarding option are also encrypted.

Advanced link checking option encounters the malicious links that you in Word, Excel, and PowerPoint. With its real-time detection, it checks the destination website is likely to download malware onto your computer or if it’s related to a phishing scam.

“Today’s announcements have focused on new, advanced protection capabilities for our Office 365 Home and Personal subscribers. However, those who use our free services also have strong protections in place. This includes robust Microsoft account security like two-factor authentication and anomalous sign-in detection”


Latest articles

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles