9 minutes ago

The security blind spot

John Mc Loughlin
John Mc Loughlin

Microsoft 365 security is a ticking time bomb, writes J2 CEO and cybersecurity expert John Mc Loughlin.

Across boardrooms and IT departments, a dangerous assumption continues to grow that because data resides in Microsoft 365 and Azure it is automatically secure.

This belief is fundamentally flawed and creates a false sense of protection that masks real exposure, turning what should be a strategic cloud advantage into a ticking time bomb quietly building risk inside the organisation’s own environment.

Microsoft builds the platform, it doesn’t defend your specific environment. What you monitor, how you configure settings, and how you respond to threats is entirely your responsibility. Security isn’t pre‑installed, it has to be actively managed.

Today, inside your Microsoft 365 tenant, there could already be:

  • Suspicious sign‑ins going unnoticed
  • Privilege escalation quietly granting excessive rights
  • Malicious inbox rules rerouting or deleting mail
  • Account takeover attempts underway
  • Data quietly exfiltrating from SharePoint or OneDrive

And here’s the most alarming truth of all – attackers know exactly how blind most organisations are.

According to a 2025 industry survey, 68 % of organisations face cyberattacks on their Microsoft 365 environment daily — yet many still assume the platform protects them by default. Even worse, only about 41 % of organisations have implemented multi‑factor authentication (MFA) effectively, despite the fact that nearly all account compromises occur on accounts without enforced MFA.

If your organisation hasn’t enforced MFA across every account, or if you think Microsoft’s baseline protections are enough, you are not secure, and you’re placing critical data at risk.

Most security failures in Microsoft 365 stem not from flaws in the platform, but from human assumptions and configuration gaps. Administrators may believe that Microsoft does backups for them, that MFA is “good enough,” or that default alerts will catch real threats before any damage is done. None of those assumptions hold up under real attack conditions.

Attackers are constantly probing cloud environments with advanced techniques – phishing campaigns that bypass basic defences, abuse of OAuth device flows, credential stuffing, and AI‑driven exploitation tools that target human behaviour as much as systems.

The cloud isn’t a walled garden, it’s the front door to your business, and it’s under siege every hour of every day. Cyber resilience in the cloud isn’t about stacking more security products, it’s about visibility and actionable insight.

If you can’t see suspicious activity across logins, identity changes, data flows, and configuration modifications, you cannot protect what you cannot detect. Believing that Microsoft alone will defend your environment is not just naïve, it’s negligent. In the cloud, if you can’t see it, you can’t protect it.

Leave a Reply

Don't Miss

(left to right) Philippe Jarre, CEO of Mindware and Frédéric Braut, Senior Vice President Global Channels Sales at Vade Secure.

Mindware to distribute Vade Secure’s predictive email security tool in MEA

With a view to strengthening its security capabilities and portfolio, Mindware has

Welcome to

By signing or creating an account you agree with our Code of conduct & Privacy policy