Search
Close this search box.

Securing Microsoft Teams for Remote Work

Share:

If you’re one of the millions of people who have turned to Microsoft Teams during the recent crisis to communicate and collaborate with your team, it’s important to know that the platform is vulnerable to serious security threats. However, there are steps you can take to protect your data and maintain a strong security posture. 

Understand the Default Access Policy 

When Microsoft Teams was implemented, it came with a flexible access policy by default, making it easy for organisations to quickly adopt the platform. However, the default access policy is still enabled in many organisations, leaving them open to vulnerabilities if they are not properly checking their security. 

One of the main vulnerabilities associated with Teams is that it is implemented out of the box with federated access to external users on by default. This means that anyone in the world can search for a user by email, request to chat, share files, and potentially expose the individual and their entire organisation to communications that are often acted with malicious intent. 

Interact with Content Safely 

Teams allows individuals to interact with content outside of the Teams’ perspective. This means that an external user could search for someone in your organisation and send them a malicious file stored in a third-party storage provider. To protect your organisation, it is important to implement security policies from the top down. 

Protect Your Organisation with Security Policies 

As a user, you may not have control over all aspects of your organisation’s security policies, but it’s important to understand what they are and how they can help protect you. Administrators can allow approved domains only to federate, selectively enable guest access, create a process around attestation, and strengthen authorisation policies. 

Additionally, naming conventions and label policies should be established. By implementing naming conventions, you can help protect your organisation’s usage of Teams by making it easier to identify and classify data. Sensitive labels can be applied based on label and restrict guest access or app use for highly sensitive Teams. 

Secure Your Teams Usage 

As more companies plan to work remotely, it is essential to implement the strongest security posture across communication platforms like Microsoft Teams. By following the strategies mentioned above, you can protect your data and ensure your team is secure when using Teams. Remember to always be vigilant and practise safe habits when communicating and collaborating on the platform. 

Ahmed Khanji

Ahmed Khanji

Ahmed Khanji is the CEO of Gridware, a leading cybersecurity consultancy based in Sydney, Australia. An emerging thought leader in cybersecurity, Ahmed is an Adjunct Professor at Western Sydney University and regularly contributes to cybersecurity conversations in Australia. As well as his extensive background as a security advisor to large Australian Enterprises, he is a regular keynote speaker and guest lecturer on offensive cybersecurity topics and blockchain.

Contact

Sydney Offices
Level 12, Suite 6
189 Kent Street
Sydney NSW 2000
1300 211 235

Melbourne Offices
Level 13, 114 William Street
Melbourne, VIC 3000
1300 211 235

Perth Offices
Level 32, 152 St Georges Terrace
Perth WA 6000
1300 211 235

Company

Learn more about the team at the forefront of the Australian Cyber Security scene.

About Us →

Meet the Team →

Partnerships →

Learn more about the team at the forefront of the Australian Cyber Security scene.

Career Opportunities →

Internships →

Media appearances and contributions by Gridware and our staff.

See More →

Services

Services

Whether you need us to take care of security for you, respond to incidents, or provide consulting advice, we help you stay protected.

View all services →

Web App Pen. Test Calculator →

Network Pen. Test Calculator →

Governance & Audit

Legal and regulatory protection

Penetration Testing

Uncover system vulnerabilities

Remote Working & Phishing

Fortify your defenses

Cyber Security Strategy

Adaptation to evolving threats

Cloud & Infrastructure

Secure cloud computing solutions

Gridware 360

End-to-end security suite

Gridware Managed Services

Comprehensive & proactive security

Gridware CloudControl
360

Harness the benefits of cloud technology

Gridware Incident Response 24/7

Swift, expert-led incident resolution

Solutions
Resources

Resources

A collection of our published insights, whitepapers, customer success stories and more.

Customer success stories from real Gridware customers. Find out how we have helped others stay on top of their Cyber Security.

Read More →