Dangerous vulnerabilities in Business Office 365 and attacks on Mac systems
Hackers: Microsoft Office 365 and Mac OS are in the firing line - The most important thing to start with: A security hole in the business version of MS Office 365 gives hackers quick access to company networks. For the first time, threats to Mac systems have also grown faster than Windows threats.
Security vulnerability in Business Office 365
A security hole in the business version of Microsoft Office 365 gives hackers quick access to company networks, and ransomware and other malware can spread quickly.
“The Emotet Trojan infects systems almost exclusively via MS Office files. Macros are used for this purpose, for example in Word documents. In normal Office versions, these macros can be deactivated, but in the business versions of Office 365 this function cannot be deactivated company-wide via group policies,” warns Andreas Besser, Managing Director of the secure networking system house Telonic.
In fact, most versions of Office 365 silently ignore Group Policy requirements. Telonic secures entire networks of companies of all sizes and makes IT security a network task in order to exclude risks such as Emotet and to take immediate measures in the event of an infection.
Mac OS also becomes a risk
Until now, Mac users could feel a little safer - those days are over: According to Malwarebytes and the annual "State of Malware" report, threats to Mac systems have grown faster than Windows threats for the first time in history.
“No system platform is more secure than another. “It is more important than ever to secure and monitor networks so that malware cannot penetrate or is immediately detected and countermeasures are initiated,” says Andreas Besser from Telonic.
A dedicated SNOC support (Security Network Operation Center) looks after Telonic customers and their networks 24 hours a day, seven days a week and 52 weeks a year for disruptions or threats. The log files are analyzed centrally - a flood that is emitted from numerous network components.
HUMBOLDT ensures safety
The majority of logs are harmless and do not require any action - one reason why really serious messages can quickly be overlooked by an IT department. HUMBOLDT from Telonic uses artificial intelligence to analyze all log files generated by a security infrastructure in real time and, if necessary, issues targeted instructions to prevent further effects of a security risk. HUMBOLDT correlates, evaluates and provides actions to the log entries from different sources.
[mk_ad]
Our own Computer Emergency Response Team (T-CERT) evaluates new events and feeds them into the database. However, one risk can only be excluded within the company: people. Emotet continues to spread via fake emails in the names of friends, neighbors, customers or colleagues.
“Common sense must also be used to set the first hurdle for threats as high as possible,” says Telonic boss Andreas Besser.
Telonic GmbH is your first point of contact as a leading system house for network and security. The company has been family-owned since it was founded in 1979 and serves customers in numerous sectors - from administration, industry and logistics to banking and finance to energy supply companies. With a clear focus on network and IT security solutions, Telonic has numerous best practice experiences and acts as a system integrator for leading software and hardware manufacturers.
In addition to the manufacturer-independent analysis, Telonic implements the projects and also ensures ongoing support and any training measures required.
More than 120 employees are available to customers nationwide.
Source: Presseportal.de
Article image: Shutterstock / By F8 studio
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

