IdentityForce LogoIdentityForce Logo
Protect What Matters Most.
Microsoft Exchange vulnerability
Posted on March 11, 2021 by in Business, Corporate ID Protection, Data Breach & Technology, ID Protection Tips & Awareness, Safeguarding Customers

An attack on over 30,000 Microsoft Exchange email servers may have started as early as January 3rd, 2021 and hackers continue to target the underlying vulnerabilities. This security incident primarily impacts businesses and other organizations using the on-premise edition of Microsoft Exchange Server, an email inbox, calendar, and file collaboration solution. Users range from the largest enterprises to small and medium-sized businesses worldwide. The Exchange servers are prime targets for cyberattacks due to the volume of email information they hold about an organization, the sensitive and proprietary data they may expose, and the gateway to additional sources of personal and business information they represent.

On March 2nd, 2021, Microsoft announced the release of several Exchange Server security updates, addressing these previously unknown, or “zero-day” vulnerabilities. While fixes have been issued, the scope of potential Exchange Server compromise depends on the speed and uptake of patches — and the number of estimated victims continues to grow. History suggests many organizations do not update their software when vulnerabilities are found. In 2020, Microsoft warned Exchange server customers to patch the critical flaw CVE-2020-0688 but found that months afterward, tens of thousands of Exchange servers remained unpatched.

DOWNLOAD SONTIQ’S ALERT ON THE MICROSOFT EXCHANGE SERVER ATTACK

Is my business at risk?

Although it has not been confirmed if any sensitive business or Personally Identifiable Information (PII) was accessed by hackers, the cyberattack gave cyberthieves total remote control over affected systems, allowing for potential data theft and further compromise.

Organizations using Microsoft Exchange services should:

READ THE FBI’S STATEMENT ON THE MICROSOFT SERVER HACK.

Steps to protect your email account

Consider the following tips to ensure your business and your employees’ email accounts are protected from further fraudulent use:

  1. Apply fixes immediately. Microsoft has urged IT administrators and customers to apply the security fixes immediately. For your convenience, we have included this information above, but please access Microsoft’s direct guidance using the aforementioned link. Please note, just because fixes are applied now, this does not mean that servers have not already been compromised. Interim mitigation option guides are also available if patching immediately is not possible.
  2. Enable two-factor authentication. 2FA helps protect online accounts from unauthorized access. With 2FA, use something you know (your email and password) and something you have (a one-time code sent to your phone) to verify your identity and log in to your account.
  3. Update account passwords. Change passwords for all online accounts regularly and sign up for a password manager tool to store all login credentials in one secure location.
  4. Protect mobile devices. Reduce risks of future identity incidents by monitoring mobile devices for malware, spyware, and other exploitable weaknesses. Look for an identity theft protection service with mobile cybersecurity built into its app.

Protect Your Employees Today

Regardless of what industry you’re in, make sure that your entire staff is protected by rolling out the industry’s best identity theft protection as a non-taxable employee benefit – you’ll add a layer of defense that provides protection from the fallout of a data breach.

Experience our suite of protection services for yourself with a Free Business Trial.