Attackers are constantly developing new threats. Microsoft 365 provides organizations with a number of tools, guidance (such as Secure Score at https://securescore.office.com), and built-in features that can be used to improve security.
In this next section, we will explore some examples of common threats and see which Microsoft 365 capabilities can be used to protect against them:
- Compromised accounts
- Compromised devices
- Phishing attempts
First, let's look at compromised user accounts.