Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Microsoft Office 365 – convenience in the cloud or an open invitation to hackers?

By Jan Youngren
Software-as-a-Service
June 29, 2020

There’s no doubt that modern cloud-based applications can deliver a stack of user benefits such as access at any time and anywhere, backup in the cloud and automatic updates as soon as they become available. Having all the latest security patches applied to software, without the need for time-consuming personal intervention, is also hugely convenient.

However, many users are still skeptical about accessing apps in the cloud and even more resistant to storing sensitive information anywhere but on the hard drive of their computer or a local backup device.

The question is this. Is this skepticism based on fact or as a result of that well-established human trait – resistance to change? In other words, does the convenience offered by a cloud app outweigh potential security threats such as hacking, and how susceptible are SaaS (Software as a Service) cloud apps to attack in the first place?

To answer this question, let’s consider Microsoft Office 365, which is one of the most widely used software packages on the planet with more than 27 million consumer users and over 100 million enterprise users.

What has Microsoft done to make Office 365 secure?

MS Office 365 was introduced in June 2011 after a successful BETA launch in 2010. It comprises an integrated suite of cloud-based apps and services like Word, Excel, PowerPoint, cloud-powered email, Skype, and various other tools designed to ease communication.

According to the most recent Symantec Internet Security Threat Report, 48 percent of malicious email attachments are Office files, up from five percent in 2017. This huge escalation is naturally causing for concern because hackers disguise malware as Office files attached to emails to trick you into clicking on them.

However, this is not a reflection on the security of the product itself, but more that hackers choose to use this vector of attack because the software is so popular. Indeed, Microsoft has spent almost a billion dollars making certain Office 365 is secure – and that’s not small change.

Access to data from anywhere – a good or bad thing?

The fact that data can be accessed remotely from anywhere presents a unique security concern that needs to be properly understood. While it’s true this could make Office 365 a target for unauthorized access, the more pertinent question to ask is how do hackers get the information (login details) they need to gain access in the first place?

Almost without exception, this can be traced back to human error in one form or another. A user clicks on a link in an email they don’t know to be safe, or opens a Word document they should just delete. It’s these kinds of mistakes that open the way for hackers to install their malware and get access to your personal information, regardless of whether you use cloud apps or not.

So, if it’s predominantly user error that causes problems, it’s clear that users need to be properly trained in good security practices in a business environment and take responsibility to understand the risks as an individual consumer.

A few basic Office 365 security guidelines

Here are a few pointers to help keep you safe from hackers:

  • Old/Unpatched Software – obsolete software has inferior security protocols that may leave you open to attack. Keep software current and updated (tick in the box for Microsoft Office 365 which takes care of updates automatically).
  • Weak Passwords – always use strong passwords and different passwords for different applications just in case one is compromised, so you don’t risk everything.
  • Opening Malicious Documents – simply don’t. If you don’t recognize a document and it looks suspicious, delete it.
  • Surface Unsafe Websites – some dodgy websites may be fun and exciting but you should understand the risks and stay away.
  • Multiple Users – every variable you introduce to your computing world increases risk and that includes letting more than one person use your computer. If possible, be selfish! Limit usage to just yourself.

And, finally:

  • What's your backup plan? – if it all comes crashing down, what would you do? Be prepared for the worst-case scenario with a solid backup and disaster recovery plan.

The verdict based on the available evidence

All in all, Microsoft Office 365 is SaaS that offers a wide range of benefits to users such as flexibility, easy access and minimal maintenance. Naturally, hackers will try to exploit its popularity and use it as an attack vector.

With that said, most problems can be prevented by savvy users being aware of the basic tactics a hacker might use and taking sensible precautions to avoid being tricked.

KEYWORDS: cyber security information security Microsoft Security software as a service (SaaS)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jan youngren

Jan Youngren is a cybersecurity and consumer protection specialist at VPNpro focused on investigations that help readers navigate the complex infosecurity sphere. His research and commentary has been featured in Forbes, ComputerWeekly, PC Mag, TechRadar, ZDNet, The Mirror, Entrepreneur, and many other leading publications around the world.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Cyber Incident Recovery

    How cyberattackers use Microsoft Office 365 tools against organizations to steal data

    See More
  • Microsoft Gets Office Open XML Defeat

    See More
  • cyber security freepik

    Addressing cybersecurity and it gaps in an ever-changing Workplace: 4 keys to staying safe in your new digital office space

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing