Due to recent unavoidable circumstances, many organisations around the world are having to actively utilise cloud collaboration tools such as Microsoft Teams, Microsoft 365, One Drive, and others. For example, Microsoft Teams recently announced that it had set a new daily record of 2.7 billion meeting minutes, which is up 200% compared to March of last year.
While such tools are great enablers of remote work, they can increase security risks, and especially the risks posed by the insider threat. In fact, a recent study found that only 23% of remote employees had received any guidance on how to use platforms like Microsoft Teams. The result is that the majority of employees might not even think that they are putting company data at risk when they share sensitive files in chats and channels, assuming that it is someone else’s responsibility to protect the data. The problem is that software and collaboration platforms such as Microsoft Teams rely heavily on SharePoint Online to store files which are shared in conversations, on OneDrive to store files in private chats, and on Azure AD to manage and authenticate team members. Such storage locations appear automatically once the user creates a specific team or chat, which lacks sufficient security controls. Once users indiscriminately use Teams, numerous locations in OneDrive and SharePoint Online appear, of which users do not ever think of. There is a high risk of data overexposure in such storages.
Flexibility comes with risks
Popular cloud collaboration platforms such as Microsoft Teams are often very useful in supporting the collaboration needs of a remote workforce. Yet, the side effect of this flexibility is a high risk of human errors, as many employees might ignore security best practices just to do their job faster. The most common types of mistakes to be avoided are:
Privilege elevation – Since groups

View Entire Article on ComparetheCloud.com