{"id":5595,"date":"2019-02-15T22:42:44","date_gmt":"2019-02-15T22:42:44","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5595"},"modified":"2021-07-12T13:38:47","modified_gmt":"2021-07-12T12:38:47","slug":"protecting-o365-and-g-suite-email-layered-approach","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach","title":{"rendered":"Protecting O365 and G Suite Email\u2014A Layered Approach"},"content":{"rendered":"<p>It\u2019s no secret that technology giants Microsoft and Google have the biggest market share globally in terms of their office suite technology. According to\u00a0<a class=\"ext\" href=\"https:\/\/www.datanyze.com\/market-share\/office-suites\" target=\"_blank\" rel=\"noopener noreferrer\">Datanyze<\/a>, in 2018 G Suite took the lead with 61.91% market share while Microsoft Office 365 had 38.06% globally. In terms of enterprises deploying cloud apps, Microsoft Office 365 seems to be the leader, with 56.3% adoption in 2018.<\/p>\n<p>Adoption rates continue to grow as more and more businesses choose to use these cloud-based solutions as the center point of their business systems. Indeed, 2018 saw an all-time high of 81% global cloud adoption, according to\u00a0<a class=\"ext\" href=\"https:\/\/pages.bitglass.com\/rs\/418-ZAL-815\/images\/Bitglass_Cloud_Adoption_2018.pdf?mkt_tok=eyJpIjoiTUdWbU1qSTNPREU0WW1JdyIsInQiOiJBRW52bHJWTUIzSkRVSTN3WFp1MmlYSmU5TXBDXC9GZ2tHc3p4bVBOXC9CRVBPekx3XC9zem5TR1JlQVVhSWpjZDI1TitlVUthNndLTGhLRE94VmxUdEYyU2FDaVwvOUZRTXVBZmNqOFZCQXBadFwvc05WZ3dlVUJrXC9iYXdoSktpbCs5diJ9\" target=\"_blank\" rel=\"noopener noreferrer\">Bitglass<\/a>. Using cloud apps is becoming standard practice due to simplicity, predictable costs, and ease of collaborating across multiple offices and locations\u2014resulting in stronger connections, as well as increasingly collaborative and productive environments.<\/p>\n<p>Regrettably, many businesses don\u2019t consider their security strategy when moving their infrastructure, including email, to the cloud. Most assume security is built into all cloud services across the board. This creates opportunity for cybercriminals to infiltrate organizations and launch cyberattacks.<\/p>\n<h3>The dangers of a single line of defense<\/h3>\n<p>However, there\u2019s no guarantee that any one vendor is completely secure. Though companies like Microsoft and Google have taken significant steps to actively protect their apps and infrastructure, there are still inherent vulnerabilities for businesses relying wholly on a single line of defense. Protection against data leakage, theft of user credentials, rapid increase in the amount of malware and ransomware, and failure to comply with regulations remain the responsibility of IT teams.<\/p>\n<p>Email continues to be one of the most popular attack vectors. An astonishing 91% of attacks begin with a spear phishing email. Research by Statista found that 66% of MSPs indicated the most common cause of ransomware infection they saw was phishing attacks. This clearly shows that when moving to large email collaboration tools, security challenges and risk should not be disregarded. Instead, the entire ecosystem should be taken into consideration.<\/p>\n<p>How do you reduce your risks? Security experts recommend a defense-in-depth or layered approach, where multiple security countermeasures are implemented to protect against cyberattacks. Taking it a step further, tools and solutions implemented should give you good visibility and monitoring capabilities over your data. In many instances, organizations deploy multiple tools and solutions that don\u2019t integrate with one another, creating holes in their defense-in-depth strategy.<\/p>\n<h3><b>Minimizing risk is just one part of the security blanket<\/b><\/h3>\n<p>Adding a strong email security solution can help reduce the risk of cyberthreats like phishing attacks and protect against loss of critical data. Continuity is also critical to support business and employee productivity during email server outages and downtime, and is an important part of a layered security approach. This prevents users having to wait for a fix, costing time and potentially business. On top of this, you need to have visibility and control over email flow so users can see quarantined email and give better insight to system admins and security teams within organizations, helping them to identify possible hackers and deploy countermeasures.<\/p>\n<h3><b>How can SolarWinds Mail Assure help?<\/b><\/h3>\n<p>SolarWinds Mail Assure helps safeguards email via collective intelligence that incorporates data from its user base to help prevent both known and emerging threats. Protection against threats, support for business continuity, and email archiving enhance users\u2019 email experience, so they can focus on their core business activities. The solution is compatible with a wide range email services, including\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-archiving-microsoft-365\">Microsoft 365 Email Archiving<\/a>,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/exchange-email-archiving\">Exchange<\/a>, and G Suite, and adds an additional layer of security.<\/p>\n<p>This is only one part of your defense-in-depth security strategy. It is critical to implement a security blanket for all apps and services within your organization\u2014like robust endpoint security that directly secures end users\u2019 devices, a healthy backup system to help protect data and provide easy recovery from ransomware attacks or natural disasters, and security policies that include the use of one-time passwords, to name a few.<\/p>\n<p>Don\u2019t take your security strategy for granted. It is well worth investing in resources to assist with your security operations.<\/p>\n<p><em>Mia Thompson is product marketing manager, Mail Assure, at SolarWinds MSP.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>The SolarWinds and SolarWinds MSP trademarks, service marks, and logos are the exclusive property of SolarWinds MSP Canada ULC, SolarWinds MSP UK Ltd. or its affiliates. All other trademarks are the property of their respective owners.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s no secret that technology giants Microsoft and Google have the biggest market share globally in terms of their office suite technology. According to\u00a0Datanyze, in 2018 G Suite took the&#8230;<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5595","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting O365 and G Suite Email\u2014A Layered Approach - N-able<\/title>\n<meta name=\"description\" content=\"With companies moving their business solutions to cloud-based software like G Suite and Office 365, Mia Thompson looks at the dangers of taking security for granted in these applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting O365 and G Suite Email\u2014A Layered Approach - N-able\" \/>\n<meta property=\"og:description\" content=\"With companies moving their business solutions to cloud-based software like G Suite and Office 365, Mia Thompson looks at the dangers of taking security for granted in these applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-15T22:42:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T12:38:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mia Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mia Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\"},\"author\":{\"name\":\"Mia Thompson\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\"},\"headline\":\"Protecting O365 and G Suite Email\u2014A Layered Approach\",\"datePublished\":\"2019-02-15T22:42:44+00:00\",\"dateModified\":\"2021-07-12T12:38:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Mail\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\",\"name\":\"Protecting O365 and G Suite Email\u2014A Layered Approach - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2019-02-15T22:42:44+00:00\",\"dateModified\":\"2021-07-12T12:38:47+00:00\",\"description\":\"With companies moving their business solutions to cloud-based software like G Suite and Office 365, Mia Thompson looks at the dangers of taking security for granted in these applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting O365 and G Suite Email\u2014A Layered Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\",\"name\":\"Mia Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"caption\":\"Mia Thompson\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting O365 and G Suite Email\u2014A Layered Approach - N-able","description":"With companies moving their business solutions to cloud-based software like G Suite and Office 365, Mia Thompson looks at the dangers of taking security for granted in these applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach","og_locale":"fr_FR","og_type":"article","og_title":"Protecting O365 and G Suite Email\u2014A Layered Approach - N-able","og_description":"With companies moving their business solutions to cloud-based software like G Suite and Office 365, Mia Thompson looks at the dangers of taking security for granted in these applications.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-02-15T22:42:44+00:00","article_modified_time":"2021-07-12T12:38:47+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Mia Thompson","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Mia Thompson","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach"},"author":{"name":"Mia Thompson","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce"},"headline":"Protecting O365 and G Suite Email\u2014A Layered Approach","datePublished":"2019-02-15T22:42:44+00:00","dateModified":"2021-07-12T12:38:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach"},"wordCount":721,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Mail"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach","url":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach","name":"Protecting O365 and G Suite Email\u2014A Layered Approach - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2019-02-15T22:42:44+00:00","dateModified":"2021-07-12T12:38:47+00:00","description":"With companies moving their business solutions to cloud-based software like G Suite and Office 365, Mia Thompson looks at the dangers of taking security for granted in these applications.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/protecting-o365-and-g-suite-email-layered-approach#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"Protecting O365 and G Suite Email\u2014A Layered Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce","name":"Mia Thompson","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","caption":"Mia Thompson"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=5595"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5595\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=5595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}