{"id":10116,"date":"2025-01-20T17:23:34","date_gmt":"2025-01-20T16:23:34","guid":{"rendered":"https:\/\/netxconsult.de\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/"},"modified":"2025-09-12T13:19:16","modified_gmt":"2025-09-12T11:19:16","slug":"microsoft-365-how-secure-is-working-in-the-cloud-really","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/","title":{"rendered":"Microsoft 365 &#8211; How secure is working in the cloud really?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><span data-contrast=\"none\">Microsoft 365 has become an integral part of modern working life &#8211; but what about security when we work in the cloud? I <\/span><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\" data-contrast=\"none\">n this post, we dive deep into the mystery of cloud security, taking a close look at various security aspects of this widely used solution from Microsoft.<\/span><\/p>\n<p><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\">How can I ensure that my employees are protected against malicious emails in the best possible way?<br \/>\n<\/span><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\">How can I guarantee my customers, the authorities or my cyber insurance that our systems meet the necessary standards? <\/span>Is annual <span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\" data-contrast=\"none\">security<\/span> awareness training still sufficient according to today&#8217;s understanding?<span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\"><br \/>\n<\/span><\/p>\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">We will examine all these questions in detail and identify possible downsides.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. security concerns in M365<\/h2><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">1.1 Access management<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>One of the most challenging aspects of Microsoft 365 security is access management. The complexity of access and permissions settings can be both impressive and overwhelming. <span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">With the ability to assign access rights to everything from individual documents to entire parts of the infrastructure, Microsoft 365 offers enormous versatility. But this versatility can become a challenge if not managed carefully and deliberately. <\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><blockquote>\n<p style=\"text-align: center;\"><b>&#8220;Complexity is the enemy of security.&#8221;<\/b><\/p>\n<\/blockquote>\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">For many security experts, this is the motto for creating a truly secure and maintainable concept.<\/span><\/p>\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">With so many options, it&#8217;s easy to make careless mistakes that can have potentially serious consequences for the security of your data. An accidental overestimation of access rights, an overlooked account authorization or an incorrectly configured sharing setting can result in sensitive information being sent to the wrong people or even being made publicly available. <\/span><\/p>\n<p>The effective management of access in Microsoft 365 therefore requires a high level of attention and understanding. It is important to know exactly who has access to which resources and for what reason. In addition, you should always be aware of current best practices in the area of access management and apply them. In the complex world of cloud computing, a small oversight can become a big problem.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"1201\" alt=\"The complexity of Microsoft 365 can allow attackers to exploit gaps in security\" title=\"Zugriffsmanagment\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Zugriffsmanagment.png\" class=\"img-responsive wp-image-8561\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Zugriffsmanagment-200x300.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Zugriffsmanagment-400x600.png 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Zugriffsmanagment-600x900.png 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Zugriffsmanagment.png 801w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">1.2 Phishing and social engineering attacks<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:78px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"806\" alt=\"When phsihing, the attacker casts the symbolic fishing rod and sees who bites\" title=\"Phishing\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Phishing.png\" class=\"img-responsive wp-image-8559\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Phishing-200x201.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Phishing-400x402.png 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Phishing-600x604.png 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Phishing.png 801w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><p>Another security aspect that is of great importance when using Microsoft 365 is phishing and social engineering attacks. These types of cyberattacks aim to trick users into revealing login credentials or executing malicious code by using trust and deception.<\/p>\n<p>Microsoft 365 users are often the target of such attacks, as they often have valuable data and access rights. By constantly logging in and out of various services, there is a risk that users will fall for fake login pages out of carelessness and be tricked into disclosing their login information.<\/p>\n<p>To make matters worse, phishing attacks and social engineering techniques are becoming increasingly sophisticated. Cybercriminals are using sophisticated tactics such as mimicking legitimate Microsoft notifications or exploiting current events and human emotions to trap their victims.<\/p>\n<p>Phishing and social engineering are just two of the countless methods used by hackers. You can find out more here: <a href=\"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/\">Attack techniques uncovered: This is how hackers work!<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. get help!<\/h2><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">2.1 Help from consultants<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p>With our many years of experience and expertise, we can identify security deficits and potential challenges and suggest a solution for you. By taking an external view of things, the first improvements can usually be made with just a few simple steps.<\/p>\n<p>However, as is so often the case in life, it is not always possible to avoid certain wisdom. In this context, the following quote is apt:<\/p>\n<blockquote style=\"text-align: center;\">\n<p><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); letter-spacing: var(--body_typography-letter-spacing);\"><b>&#8220;Tell me &#8211;<\/b> and I&#8217;ll forget.<br \/>\n<\/span><b style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); letter-spacing: var(--body_typography-letter-spacing); background-color: var(--testimonial_bg_color);\">Show it to me &#8211;<\/b><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); letter-spacing: var(--body_typography-letter-spacing); background-color: var(--testimonial_bg_color);\"><span style=\"font-weight: var(--body_typography-font-weight);\"> and I will keep it.<\/span><br \/>\n<\/span><b style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); letter-spacing: var(--body_typography-letter-spacing); background-color: var(--testimonial_bg_color);\">Let me do it &#8211;<\/b><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); letter-spacing: var(--body_typography-letter-spacing); background-color: var(--testimonial_bg_color); font-weight: var(--body_typography-font-weight);\"> and I will understand.&#8221;<\/span><\/p>\n<\/blockquote>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:55px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"600\" alt=\"Training can keep employees and admins up to date\" title=\"Hilfe_durch_Schulungen_und_Beratung\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Hilfe_durch_Schulungen_und_Beratung.png\" class=\"img-responsive wp-image-8557\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Hilfe_durch_Schulungen_und_Beratung-200x150.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Hilfe_durch_Schulungen_und_Beratung-400x300.png 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Hilfe_durch_Schulungen_und_Beratung-600x449.png 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/10\/Hilfe_durch_Schulungen_und_Beratung.png 801w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><p>In fact, we must acknowledge our limitations and seek the assistance of market-leading experts in optimizing security in the Microsoft 365 environment. Their tools and constantly refining approach allow you to not just mimic cloud security occasionally, but to <b>take<\/b> it <b>into your own hands<\/b> on a daily basis <b>.<\/b><\/p>\n<p>We would be happy to show you how to get the most out of such a solution to give you and your employees the secure workplace they deserve. Sounds almost too good to be true? Read on to find out how it works.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color8);--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">2.2 The software solution for your Microsoft 365 security<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><p><span style=\"background-color: rgba(255, 255, 255, 0); letter-spacing: var(--body_typography-letter-spacing); font-weight: var(--body_typography-font-weight); font-style: var(--body_typography-font-style,normal); font-size: var(--body_typography-font-size); font-family: var(--body_typography-font-family); color: var(--body_typography-color);\">We work closely with a German company that shines with their &#8220;all inclusive&#8221; package. All aspects of their software are designed to make it as easy to use and therefore as effective as possible. <\/span><\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:24px;--awb-content-font-size:20px;--awb-icon-alignment:left;--awb-hover-color:#f4f4f6;--awb-border-color:rgba(0,0,0,0.08);--awb-background-color:#ffffff;--awb-divider-color:rgba(0,0,0,0.08);--awb-divider-hover-color:rgba(0,0,0,0.08);--awb-icon-color:#ffffff;--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:#000000;--awb-toggle-hover-accent-color:#f86011;--awb-title-font-family:&quot;DM Sans&quot;;--awb-title-font-weight:500;--awb-title-font-style:normal;--awb-title-font-size:22px;--awb-content-font-family:&quot;DM Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-10116-1\"><div class=\"fusion-panel panel-default panel-11eac4ffdf3fef3ae fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_11eac4ffdf3fef3ae\"><a aria-expanded=\"false\" aria-controls=\"11eac4ffdf3fef3ae\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10116-1\" data-target=\"#11eac4ffdf3fef3ae\" href=\"#11eac4ffdf3fef3ae\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Safety Control Panel<\/span><\/a><\/h4><\/div><div id=\"11eac4ffdf3fef3ae\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_11eac4ffdf3fef3ae\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The complexity of Microsoft 365&#8217;s security mechanisms can be significantly reduced by using third-party software. An intuitive control panel can be used to define precise security and access policies that enable a customized but seamless security concept.<\/p>\n<p>The clear design of the system makes it much easier for system administrators to manage access rights. They can grant and, if necessary, revoke access rights as required, ensuring an optimum level of security and control.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ac8b91f603e48ae5f fusion-toggle-no-divider\" style=\"--awb-title-color:#000000;--awb-content-color:#000000;\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ac8b91f603e48ae5f\"><a aria-expanded=\"false\" aria-controls=\"ac8b91f603e48ae5f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10116-1\" data-target=\"#ac8b91f603e48ae5f\" href=\"#ac8b91f603e48ae5f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Spam filtering<\/span><\/a><\/h4><\/div><div id=\"ac8b91f603e48ae5f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ac8b91f603e48ae5f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>German language spam filtering falls by the wayside for many major providers, despite the clear trend that spam attacks are becoming increasingly individualized and multilingual protection is required. Thanks to the integration directly in the M365 Suite, our partner and we offer a top solution: an impressive spam detection rate of 99.99% not only in German, but also in English and other languages. The advantages of optimized spam protection:<\/p>\n<ul>\n<li>Effectively protects against malware and phishing<\/li>\n<li>Promotes IT security<\/li>\n<li>Saves valuable employee working time<\/li>\n<li>Optimizes bandwidth usage<\/li>\n<\/ul>\n<p>Rely on industry-leading email security and ensure optimized protection against unwanted content.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-55ded8da281f85e05 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_55ded8da281f85e05\"><a aria-expanded=\"false\" aria-controls=\"55ded8da281f85e05\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10116-1\" data-target=\"#55ded8da281f85e05\" href=\"#55ded8da281f85e05\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Ongoing training<\/span><\/a><\/h4><\/div><div id=\"55ded8da281f85e05\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_55ded8da281f85e05\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>In our ever-changing digital landscape, security awareness training is essential. With our engaging short videos, we offer monthly training for your employees. This engaging content not only encourages participation, but also sharpens individual vigilance.<br \/>\nBut theory alone is not enough. We use automated e-mail tests to put what we have learned directly into practice. This mix of continuous theoretical and practical training maximizes awareness and equips your employees optimally against suspicious activities and threats. Invest in leading security awareness training and strengthen your company&#8217;s security culture.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><p>Every company has individual requirements and challenges, especially when it comes to security in Microsoft 365. We understand that. Let us discuss your personal situation in a free initial consultation. Together, we will then find a suitable solution and present you with effective measures to make Microsoft 365 more secure for you and your employees.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-12 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/netxconsult.de\/en\/?page_id=11949\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Free initial consultation<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":8554,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[335],"tags":[314,315,317],"class_list":["post-10116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en_cloud","tag-cloud-security","tag-microsoft-cloud-en","tag-microsoft-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft 365 Security \u2013 How Safe Is Working in the Cloud?<\/title>\n<meta name=\"description\" content=\"How secure is Microsoft 365? Discover key security tips and best practices to protect your cloud environment and keep your business data safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft 365 Security \u2013 How Safe Is Working in the Cloud?\" \/>\n<meta property=\"og:description\" content=\"How secure is Microsoft 365? Discover key security tips and best practices to protect your cloud environment and keep your business data safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T16:23:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-12T11:19:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/09\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Manuel Mayer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel Mayer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/\"},\"author\":{\"name\":\"Manuel Mayer\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/2a71da04439b566eb6d3d3719e41f764\"},\"headline\":\"Microsoft 365 &#8211; How secure is working in the cloud really?\",\"datePublished\":\"2025-01-20T16:23:34+00:00\",\"dateModified\":\"2025-09-12T11:19:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/\"},\"wordCount\":8537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png\",\"keywords\":[\"Cloud security\",\"Microsoft Cloud\",\"Microsoft Security\"],\"articleSection\":[\"EN_Cloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/\",\"name\":\"Microsoft 365 Security \u2013 How Safe Is Working in the Cloud?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png\",\"datePublished\":\"2025-01-20T16:23:34+00:00\",\"dateModified\":\"2025-09-12T11:19:16+00:00\",\"description\":\"How secure is Microsoft 365? Discover key security tips and best practices to protect your cloud environment and keep your business data safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png\",\"width\":1800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/microsoft-365-how-secure-is-working-in-the-cloud-really\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft 365 &#8211; How secure is working in the cloud really?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/2a71da04439b566eb6d3d3719e41f764\",\"name\":\"Manuel Mayer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"caption\":\"Manuel Mayer\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/manuelnetx\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft 365 Security \u2013 How Safe Is Working in the Cloud?","description":"How secure is Microsoft 365? Discover key security tips and best practices to protect your cloud environment and keep your business data safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft 365 Security \u2013 How Safe Is Working in the Cloud?","og_description":"How secure is Microsoft 365? Discover key security tips and best practices to protect your cloud environment and keep your business data safe.","og_url":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/","og_site_name":"netX consult","article_published_time":"2025-01-20T16:23:34+00:00","article_modified_time":"2025-09-12T11:19:16+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/09\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png","type":"image\/png"}],"author":"Manuel Mayer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Manuel Mayer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/"},"author":{"name":"Manuel Mayer","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/2a71da04439b566eb6d3d3719e41f764"},"headline":"Microsoft 365 &#8211; How secure is working in the cloud really?","datePublished":"2025-01-20T16:23:34+00:00","dateModified":"2025-09-12T11:19:16+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/"},"wordCount":8537,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/09\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png","keywords":["Cloud security","Microsoft Cloud","Microsoft Security"],"articleSection":["EN_Cloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/","url":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/","name":"Microsoft 365 Security \u2013 How Safe Is Working in the Cloud?","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/09\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png","datePublished":"2025-01-20T16:23:34+00:00","dateModified":"2025-09-12T11:19:16+00:00","description":"How secure is Microsoft 365? Discover key security tips and best practices to protect your cloud environment and keep your business data safe.","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/09\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2023\/09\/Wie_sicher_ist_die_Cloud_Wirklich_Titelbild.png","width":1800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"Microsoft 365 &#8211; How secure is working in the cloud really?"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/2a71da04439b566eb6d3d3719e41f764","name":"Manuel Mayer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","caption":"Manuel Mayer"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/10116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=10116"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/10116\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media\/8554"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=10116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=10116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=10116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}