top of page

Why Hackers Love Microsoft 365

  • Patrick Albert
  • Sep 20
  • 3 min read

Updated: Sep 22

And what every MSP should know before their clients get hit


ree

Microsoft 365 is the crown jewel for attackers

Microsoft 365 has become the backbone of modern business. For small and mid-sized organizations, it powers everything from email and file storage to authentication, collaboration, and business continuity.


That also makes it one of the most targeted platforms on the internet. Compromising a Microsoft 365 account can mean access to sensitive data, client communications, financial records, and administrative controls. It is a one-stop shop for attackers.


Did you know? Over 345 million people use Microsoft 365 globally, and nearly 90 percent of cyberattacks begin with email or identity compromise. (Source: Microsoft Security Blog)


Most tenants are still exposed

Despite Microsoft 365’s importance, many environments are dangerously undersecured. Default settings are often left unchanged, and critical protections are either misconfigured or completely missing.


Here are just a few of the most common exposures we still see in the field:

  • Legacy authentication is still enabled, allowing attackers to bypass MFA entirely

  • Admin accounts lack MFA, even when those accounts can reset passwords, change permissions, or access sensitive data

  • Audit logging is turned off, which means no trail to follow after an incident

  • External sharing is unrestricted, making it easy for data to leak out without anyone noticing

  • Auto-forwarding rules silently send emails to attacker-controlled mailboxes, often used in BEC scams


These risks are rarely intentional. They happen because M365 tenants are complex and constantly evolving. But when something goes wrong, your clients won’t care if it was a default setting or a missed checkbox. They will care that a breach occurred and that it could have been prevented.

Now’s the time to ask: Do your clients still allow basic auth? Do they have MFA on every privileged account? Are audit logs are turned on in case you need to look into something?

This is hard to scale

For MSPs, auditing Microsoft 365 environments is time-consuming and inconsistent. Each tenant is unique, tools are fragmented, and recommendations often vary by license level or personal opinion.

Microsoft Secure Score offers some visibility, but it blends security advice with usability and sales priorities. Many MSPs are left guessing what "good enough" really looks like.


What defines secure?

This is the core challenge. What do you measure your clients against? What configuration is good, what is risky, and what is overkill?

Secure Score gives you a number, but not always a clear standard and often feels like an upsell to another license. CIS Benchmarks are helpful, but often feel abstract or too generic.

MSPs need something actionable. Something credible. Something that is based on how real attacks happen, not just what licenses are available.


A real baseline has finally arrived

The Cybersecurity and Infrastructure Security Agency (CISA) released something MSPs have needed for years: a tactical, credible security baseline for Microsoft 365.


It is called ScubaGear. And it is not a whitepaper.

ScubaGear is a set of tactical, specific configuration checks built to help public and private organizations secure their Microsoft 365 tenants against real-world threats. It includes:

  • A detailed configuration checklist

  • A scoring system from 0 to 100

  • A free PowerShell script to run assessments

  • JSON output you can integrate or report on


This isn’t theoretical guidance - it’s field-tested, operational, and aligned with national cloud security expectations. CISA doesn’t sell software. They build frameworks based on how attackers work, not what vendors want to sell.


For MSPs, ScubaGear is the clearest standard yet to assess risk, align with regulators, and drive remediation efforts with real authority.


Up next: breaking down the ScubaGear baseline

In our next post, we will walk through what ScubaGear actually checks, how to run it yourself, and how you can use those findings to protect your clients.


We will also show how ThreatMate helps MSPs take this from a one-time assessment to an ongoing service that runs across all tenants, tracks drift, and keeps configurations aligned with CISA’s guidance.


If you manage Microsoft 365 tenants, this is something worth your time. Schedule a a free Security Baseline for your Microsoft 365 tenants.



 
 
bottom of page