{"id":3086,"date":"2025-12-28T09:29:18","date_gmt":"2025-12-28T09:29:18","guid":{"rendered":"https:\/\/www.microsoft365specialisten.be\/why-microsoft-365-is-secure-is-often-not-true\/"},"modified":"2025-12-30T14:10:27","modified_gmt":"2025-12-30T14:10:27","slug":"why-microsoft-365-is-secure-is-often-not-true","status":"publish","type":"post","link":"https:\/\/www.microsoft365specialisten.be\/en\/why-microsoft-365-is-secure-is-often-not-true\/","title":{"rendered":"Why \u201cMicrosoft 365 is secure\u201d is often not true"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3086\" class=\"elementor elementor-3086 elementor-3052\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19731902 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"19731902\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76e465fc sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"76e465fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t\n<p\/>\n\n\n\n<p\/>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ad926a e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"1ad926a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b018f38 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"b018f38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"861\" data-end=\"950\"><a href=\"https:\/\/www.microsoft365specialisten.be\/en\/blog\/using-microsoft-365-correctly\/\">Using Microsoft 365 correctly<\/a>&#8220;We have MFA enabled.&#8221;<br data-start=\"890\" data-end=\"893\">&#8220;Everything is in the cloud.&#8221;<br data-start=\"919\" data-end=\"922\">&#8220;Microsoft takes care of that, right?&#8221;<\/p><p data-start=\"952\" data-end=\"1128\">These are statements we often hear. They sound logical and reassuring. And yet, in many organizations, they are precisely the reason why risks go unnoticed.  <\/p><p data-start=\"1130\" data-end=\"1350\">Microsoft 365 <strong data-start=\"1144\" data-end=\"1151\">can <\/strong>be very secure. But it&#8217;s not automatic. Security is not a checkbox and not a one-time setting. It is the result of choices, agreements, and discipline. And that&#8217;s exactly where things often go wrong.<\/p><h4 data-start=\"1352\" data-end=\"1407\">Microsoft secures the platform, not your environment<\/h4><p data-start=\"1409\" data-end=\"1669\">Microsoft ensures the security of the infrastructure: data centers, networks, and basic services. That is their responsibility.<br data-start=\"1541\" data-end=\"1544\">But how your data is organized, who has access to what information, and how widely it is shared is entirely up to you.<\/p><p data-start=\"1671\" data-end=\"1861\">This distinction is often underestimated. \u201cIn the cloud\u201d is equated with \u201csecure,\u201d when in reality it means you have <strong data-start=\"1802\" data-end=\"1853\">more options and more responsibility.<\/strong> <\/p><h4 data-start=\"1863\" data-end=\"1908\">MFA provides security, but no overview<\/h4><p data-start=\"1910\" data-end=\"2131\">Multi-factor authentication is important. It is a necessary basic measure. But MFA only secures one moment: the login. What happens after that depends entirely on how your Microsoft 365 environment is set up.   <\/p><p data-start=\"2133\" data-end=\"2399\">When employees have access to documents they don&#8217;t need, when old accounts remain active, or when shared mailboxes are left unmanaged for years, the risk remains. MFA does not prevent someone with too many rights from seeing too much. <\/p><p data-start=\"2401\" data-end=\"2463\">Security doesn&#8217;t stop at the password. That&#8217;s just where it begins. <\/p><h4 data-start=\"2465\" data-end=\"2510\">What we continue to encounter in practice<\/h4><p data-start=\"2512\" data-end=\"2724\">In many environments, it is not technology that is lacking, but oversight. Structures have evolved over time. Rights were once granted \u201cfor convenience.\u201d External access was temporarily opened up and never reviewed again.   <\/p><p data-start=\"2726\" data-end=\"2864\">Everything works until someone starts asking questions. Or until there is an audit. Or until data suddenly surfaces that no one knew existed.  <\/p><p data-start=\"2866\" data-end=\"3011\">It turns out that no one knows exactly where sensitive information is stored, who has access to it, and what happens when someone leaves the company.<\/p><h4 data-start=\"3013\" data-end=\"3064\">Security without governance is false security.<\/h4><p data-start=\"3066\" data-end=\"3266\">Without governance, security becomes reactive. Action is only taken when something goes wrong. Governance turns that around. It ensures that risks are mitigated in advance, not explained after the fact.   <\/p><p data-start=\"3268\" data-end=\"3504\">This does not have to be a lengthy or bureaucratic process. On the contrary, effective governance brings peace of mind. Clear structures, clear responsibilities, and fewer exceptions. Less improvisation. Less \u201cwe&#8217;ll deal with that later.\u201d     <\/p><p data-start=\"3506\" data-end=\"3537\">And above all: fewer surprises.<\/p><h4 data-start=\"3539\" data-end=\"3584\">Why SMEs often get this wrong<\/h4><p data-start=\"3586\" data-end=\"3783\">Many SMEs believe they are too small to be of interest to attackers. The reality is different. Attacks today are automated. They are not selected based on name, but on chance of success.   <\/p><p data-start=\"3785\" data-end=\"3967\">Microsoft 365 is often the first point of access. A poorly defined environment, combined with assumptions rather than insight, makes organizations more vulnerable than they realize. <\/p><h4 data-start=\"3969\" data-end=\"3995\">The honest conclusion<\/h4><p data-start=\"3997\" data-end=\"4113\">If you say, <em data-start=\"4009\" data-end=\"4044\">\u201cOur Microsoft 365 is secure,\u201d <\/em>then the only correct follow-up question is:<br data-start=\"4082\" data-end=\"4085\"><strong data-start=\"4085\" data-end=\"4113\">\u201cWhat are we basing that on?\u201d<\/strong><\/p><p data-start=\"4115\" data-end=\"4200\">Without insight, security remains a feeling. And security based on feelings is not security. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf11fb4 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"cf11fb4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f92c136 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"f92c136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4229\" data-end=\"4438\"><strong data-start=\"4229\" data-end=\"4298\">Are you unsure whether your Microsoft 365 environment is truly secure?<\/strong><br data-start=\"4298\" data-end=\"4301\">A targeted security and governance audit quickly and objectively identifies where the risks lie \u2014 without panic, without sales pressure.<\/p><p data-start=\"4440\" data-end=\"4499\"><em data-start=\"4443\" data-end=\"4499\">\ud83d\udc49 Have your Microsoft 365 security evaluated objectively.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c27012f sc_fly_static elementor-widget elementor-widget-button\" data-id=\"c27012f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.microsoft365specialisten.be\/en\/services\/security-governance\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover more about Security &amp; Governance now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7784254 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"7784254\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-58875d9 e-con-full e-flex sc_layouts_column_icons_position_left e-con e-child\" data-id=\"58875d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div data-animation-type=\"block\" class=\"elementor-element elementor-element-4e8c8d7 animation_type_block sc_fly_static elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4e8c8d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;ta_fadeinup&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Frequently asked questions about Microsoft 365 security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div data-animation-type=\"block\" class=\"elementor-element elementor-element-77416b2 animation_type_block sc_fly_static elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"77416b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;ta_fadeinup&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2433\" data-end=\"2520\">Security is not a feeling or a promise. It is something you must be <strong data-start=\"2500\" data-end=\"2519\">able to demonstrate<\/strong>. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-animation-type=\"block\" class=\"elementor-element elementor-element-8d16836 elementor-widget__width-initial animation_type_block sc_fly_static elementor-invisible elementor-widget elementor-widget-trx_elm_accordion\" data-id=\"8d16836\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;ta_fadeinup&quot;,&quot;accordion_type&quot;:&quot;accordion&quot;,&quot;toggle_speed&quot;:300}\" data-widget_type=\"trx_elm_accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion trx-addons-toggle-icon-align-right\" id=\"trx-addons-accordion-8d16836\" data-accordion-id=\"8d16836\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1471\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"1\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1471\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tIs Microsoft 365 secured by default?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1471\" class=\"trx-addons-accordion-tab-content\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1471\">\n\t\t\t\t\t\t<p>Microsoft 365 is technically well secured at the platform level. Microsoft provides the infrastructure, but not how your organization structures, shares, and secures data. That responsibility lies with you as an organization.  <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1472\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"2\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1472\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tIs multi-factor authentication (MFA) sufficient to ensure security?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1472\" class=\"trx-addons-accordion-tab-content\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1472\">\n\t\t\t\t\t\t<p>MFA is a necessary basic measure, but not a complete security solution. It protects the login moment, not what users can see or do afterwards. Without correct permissions and agreements, the risk remains.  <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1473\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"3\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1473\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tWhat are the most common security issues in Microsoft 365?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1473\" class=\"trx-addons-accordion-tab-content\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1473\">\n\t\t\t\t\t\t<p>In practice, we mainly see problems caused by historically accumulated rights, unclear SharePoint structures, old accounts that have not been cleaned up, and overly broad external access. Not because of hackers, but because of a lack of overview. <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1474\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"4\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1474\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tWhat is meant by governance within Microsoft 365?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1474\" class=\"trx-addons-accordion-tab-content\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1474\">\n\t\t\t\t\t\t<p>What is meant by governance within Microsoft 365? Governance means clear agreements about structure, access, and responsibility. Who is allowed to see what, where is which data stored, and who owns it. It is not a technical measure, but an organizational framework that enables security.  <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1475\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"5\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1475\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tWhy is Microsoft 365 security particularly important for SMEs?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1475\" class=\"trx-addons-accordion-tab-content\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1475\">\n\t\t\t\t\t\t<p>SMEs often have less formal structures and operate pragmatically. This makes them flexible, but also vulnerable. Today's attacks are automated and target weak configurations, not the size of a company.  <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1476\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"6\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1476\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tHow do I know if our Microsoft 365 environment is truly secure?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1476\" class=\"trx-addons-accordion-tab-content\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1476\">\n\t\t\t\t\t\t<p>You can only know this through insight. A targeted security and governance audit reveals where the risks lie, where everything is in order, and which improvements will have the greatest impact. Without assumptions, without panic.  <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"trx-addons-accordion-item\">\n\t\t\t\t\t\t\t\t\t\t<h6 id=\"trx-addons-accordion-tab-title-1477\" class=\"trx-addons-accordion-tab-title\" tabindex=\"0\" data-tab=\"7\" role=\"tab\" aria-controls=\"trx-addons-accordion-tab-content-1477\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-title-text\">\n\t\t\t\t\t\t\t\tDoes security always have to be complex or expensive?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"trx-addons-accordion-toggle-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-close trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M4.8,4.8V0h1.3v4.8H11v1.3H6.2V11H4.8V6.2H0V4.8H4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class='trx-addons-accordion-toggle-icon-open trx-addons-icon'>\n\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 11 11\"><path d=\"M0,4.8l11,0v1.3H0L0,4.8z\"><\/path><\/svg>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"trx-addons-accordion-tab-content-1477\" class=\"trx-addons-accordion-tab-content\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"trx-addons-accordion-tab-title-1477\">\n\t\t\t\t\t\t<p>No. In many cases, small, well-thought-out adjustments can make a big difference. Good security is more often about clarity and discipline than about extra tools.  <\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Using Microsoft 365 correctly&#8220;We have MFA enabled.&#8221;&#8220;Everything is in the cloud.&#8221;&#8220;Microsoft takes care&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3085,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":0,"footnotes":""},"categories":[34],"tags":[],"class_list":["post-3086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-using-microsoft-365-correctly"],"_links":{"self":[{"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/posts\/3086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/comments?post=3086"}],"version-history":[{"count":7,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/posts\/3086\/revisions"}],"predecessor-version":[{"id":3246,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/posts\/3086\/revisions\/3246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/media\/3085"}],"wp:attachment":[{"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/media?parent=3086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/categories?post=3086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft365specialisten.be\/en\/wp-json\/wp\/v2\/tags?post=3086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}