Don’t Let an Ass Jack Your SaaS: Understanding Office 365 Data Threat Profiles


Don’t Let an Ass Jack Your SaaS

These characters are the reason why over 75% of businesses that use SaaS applications like Office 365 suffer a data loss incident each year.

The Smartasses

Intentionally mess with your Office 365 data, costing you time and money.

the malicious insider
the hacker
the merch

Hugh Jass

Aliases:

  • The Bad Burro

Crimes: Deletes, modifies and corrupts data for personal gain, retribution, or just to cause damage.

Involved in almost 25% of all electronic crime events.

Hattie “Hack” Astor

Aliases:

  • The Moscow Mule

Crimes: Spreads viruses, malware and ransomware. Launches phishing attacks to steal credentials and take over accounts.

Steals IP, perpetrates business email compromise, drains financial accounts and commits other types of cyber fraud.

Cyrus “Cy” Burnett

Aliases:

  • The Darkweb Donkey

Crimes: Sells your users’ credentials on the Dark Web.

Bankrolls hackers and enables the success of lucrative Account Takeover (ATO) attacks.

The Dumbasses

Unknowingly mess with your Office 365 data, resulting in expensive consequences.

the lazy programmer
the junior admin
the clueless user

Ike Kant-Codewell

Aliases:

  • The Lazy Ass

Specialty: Writes apps and scripts that cause sync errors.

Architects software that does not meet Microsoft’s criteria for listing on AppSource.

Barry Badadmon

Aliases:

  • The Boss’ Nephew

Crimes: Accidentally deletes user accounts and team document stores.

Incorrectly configures policies and writes bad scripts that result in data deletion.

Dawn Keigh-Hotay

Aliases:

  • The Partay Donkay

Crimes: Constantly “loses” emails and files and needs IT help to “find” them. Clicks on suspicious links, downloads questionable files, and uses their work email on all kinds of websites.

Everyday human errors account for up to 64% of data loss incidents.

Get Badass Office 365 data protection from Spanning

Integrated Dark Web Monitoring
Integrated Dark Web Monitoring
Dark Web Monitoring alerts Office 365 administrators when employee emails and passwords have been compromised, enabling them to take proactive steps to secure accounts at risk. Leverage Office 365 and Spanning audit, reporting and search capabilities to determine if a malicious activity has taken place and restore any corrupted data in just a few clicks.
Zero-Effort Backup
Automated Backup
Automated Office 365 backup that auto-discovers new and/or altered content to back up. This takes place as part of a recurring, incremental backup process that runs quietly in the background every day without any additional effort from your admins or users.
Point-In-Time Restore
Point-in-time restore
Enjoy total restore flexibility with access to every point-in-time Office 365 backup performed by Spanning. Daily automated backup and unlimited on-demand backup equip your organization with an abundance of historical snapshots and versions of your backed-up Office 365 data. Find the last date on which your content was in the desired state and restore it directly back into your tenant.
Transparent Reporting
Transparent Reporting
Utilize the immutable audit log for a transparent, actionable report of every Office 365 backup. Admins are given a clear, comprehensive insight into the state of all backup and restore activities, which can be viewed directly within the application. Additionally, admins can opt-in to receive daily backup status reports via email to keep them informed of backup health across their tenant.

Join our Mailing List

You’ll have a chance to win an Amazon Echo Dot plus a free download of the 6 asses who can Jack your SaaS!

All the Jackasses

Ready to see Spanning in action?

Sign up for a demo today and receive a $25 gift card of your choice or a charity donation in your name.

Request A Demo
Try Spanning Today!