Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model
  • The Hacker News

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

[email protected] The Hacker News Published: March 20, 2025 | Updated: March 20, 2025 5 min read
0 views
Shared Responsibility Model

Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365’s approach, offers a framework for comprehending and implementing effective cybersecurity measures.

The Essence of Shared Responsibility

Think of cloud security like a well-maintained building: the property manager handles structural integrity and common areas, while tenants secure their individual units. Similarly, the shared responsibility model creates a clear division of security duties between cloud providers and their users. This partnership approach ensures comprehensive protection through clearly defined roles and responsibilities.

What Your Cloud Provider Handles

Microsoft maintains comprehensive responsibility for securing the foundational elements of your cloud environment. Their security team manages physical infrastructure security, including state-of-the-art data centers and robust network architecture. They implement platform-level security features and regularly deploy security updates to protect against emerging threats. Your data receives protection through sophisticated encryption protocols, both during transmission and while stored. Microsoft also ensures compliance with global security standards and regulations, conducts regular security audits, and employs advanced threat detection capabilities with rapid response protocols.

Your Business’s Security Responsibilities

As a Microsoft 365 user, your organization must take ownership of several critical security aspects. This includes implementing robust user access controls and choosing appropriate authentication methods for your security needs. Your team should carefully configure security

settings to align with your organization’s risk tolerance and compliance requirements. Protecting account credentials and maintaining strong password policies falls squarely within your domain. Additionally, you must actively monitor and control data sharing practices, ensure comprehensive employee security training, and determine when additional security tools are necessary to meet specific business requirements.

Discover how CrashPlan enhances Microsoft 365 backup and recovery here.

Implementing Security Measures

Begin your security journey with a comprehensive assessment of your current security posture using Microsoft Secure Score. This evaluation will reveal existing security gaps that require immediate attention. Based on these findings, develop a detailed remediation plan with clear priorities and timelines. Establish a dedicated security governance team to oversee the implementation process and create effective communication channels for security-related updates and concerns.

Authentication and Access Management Implementation

The implementation of robust authentication measures begins with enabling Security Defaults in Entra ID (formerly Azure AD). Create a pilot program starting with your IT staff to test and refine the deployment process. When configuring Multi-Factor Authentication (MFA) methods, prioritize the use of authenticator apps, Google Authenticator or Duo, over SMS for enhanced security. Develop comprehensive end-user training materials and communication plans to ensure smooth adoption.

Your MFA rollout should follow a phased approach, beginning with IT and administrative staff to build internal expertise. Next, extend implementation to department managers who can champion the change within their teams. Follow this with a controlled rollout to general staff members, and finally include external contractors in your MFA requirements.

For Role Based Access Control (RBAC), start by documenting your organization’s existing roles and responsibilities in detail. Create role groups that align with specific job functions, beginning with Global Administrators, who should be limited to two or three trusted individuals. Define clear responsibilities for Security Administrators, Compliance Administrators, and Department-level Administrators. Implement the principle of least privilege access for each role, ensuring users have only the permissions necessary for their job functions.

Data Protection Configuration

Begin your data protection journey by conducting a thorough assessment of your organization’s information assets. Identify and categorize sensitive data types across your systems, paying particular attention to Personal Identifiable Information (PII), financial records, intellectual

property, and client confidential information. These classifications form the foundation of your data protection strategy.

Create a hierarchical system of sensitivity labels that reflects your organization’s data handling requirements. Start with basic classifications such as Public for generally available information, and progress through Internal for company-wide data, Confidential for sensitive business information, and Highly Confidential for the most critical data assets. Implement auto-labeling policies to automatically classify common data types, reducing the burden on end users while ensuring consistent protection.

Your Data Loss Prevention (DLP) implementation should begin with enabling Microsoft 365’s built-in policies that align with common regulatory requirements. Develop custom DLP policies that address your organization’s specific needs, configured to monitor critical business locations including email communications, Teams conversations, and SharePoint document libraries. Create clear notification templates that explain policy violations to users and provide guidance on proper data handling.

In addition to these measures, a 3-2-1 backup strategy is crucial for ensuring the recovery of your organization’s data in case of an incident or disaster. This involves maintaining three copies of your data (primary, secondary, and tertiary), on two different types of media (such as hard drives and tape drives), with one being offsite. Implementing a 3-2-1 backup strategy ensures that you can recover your data in the event of a disaster, reducing downtime and minimizing potential losses.

Threat Protection Setup

Configure Microsoft Defender’s Safe Links feature to provide comprehensive protection against malicious URLs. Enable real-time URL scanning across all Office applications and remove the option for users to click through warnings, ensuring consistent protection. Set up Safe Links to scan URLs at the time of click, providing protection even against delayed-action threats.

Implement Safe Attachments with Dynamic Delivery to maintain productivity while ensuring document safety. Configure the system to block detected malware and extend protection across SharePoint, OneDrive, and Teams environments. Enhance your anti-phishing defenses by creating targeted protection for high-risk users such as executives and finance team members.

Establish a comprehensive security monitoring framework beginning with carefully calibrated alert notifications. Define clear severity thresholds that align with your incident response capabilities and ensure notifications reach the appropriate team members. Create an escalation procedure that accounts for alert severity and response time requirements.

Ongoing Security Management

Implement a structured approach to security maintenance through a weekly rotation of key tasks. The first week of each month should focus on comprehensive access reviews, ensuring appropriate permissions across all systems. Week two centers on evaluating policy effectiveness and making necessary adjustments. The third week involves detailed compliance verification against relevant standards and regulations. Complete the monthly cycle with a thorough review of security metrics and performance indicators.

Establish a comprehensive security training program that addresses different audience needs throughout the month. Begin with new employee security orientation sessions that cover fundamental security practices and company policies. Follow this with department-specific training that addresses unique security challenges and requirements for different business units. Conduct regular phishing simulation exercises to test and improve user awareness.

Looking Ahead

Organizations must maintain strong security which requires constant vigilance and adaptation. Organizations must stay informed about emerging threats and security technologies while regularly assessing and updating their security controls. Success in cybersecurity isn’t measured by the absence of incidents but by the effectiveness of your detection and response capabilities.

Remember that implementing security measures is an ongoing journey rather than a destination. Regular assessment, continuous improvement, and active engagement from all stakeholders are essential for maintaining an effective security posture in today’s dynamic threat landscape.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: Amazon Ends Little-Used Privacy Feature That Let Echo Users Opt Out of Sending Recordings to Company
Next: Hackers Target Cisco Smart Licensing Utility Vulnerabilities

Author's Other Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1

Related Stories

whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
hacked.jpg
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

[email protected] The Hacker News December 2, 2025 0 0
npm-mal.jpg
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

[email protected] The Hacker News December 2, 2025 0 1
iran-hacking.jpg
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

[email protected] The Hacker News December 2, 2025 0 0
SecAlerts.jpg
  • The Hacker News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

[email protected] The Hacker News December 2, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.