X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

A takeover of Microsoft Office 365 accounts may be the first item on the to-do list of bad actors who have breached an organization’s cybersecurity. Baker & Hostetler released its 2020 Data Security Incident Response Report on Thursday, indicating that ransomware is thriving with the help of stolen contact lists pilfered from underprotected accounts.

The report is based on information gleaned from 950 cyber incidents that Baker & Hostetler consulted on over the course of 2019. In 31% of the cases featured, bad actors initiated an Office 365 account takeover after the initial breach. Deployment of ransomware was the next most common step (24%), followed by the installation of malware (13%).

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at [email protected]

Frank Ready

Frank Ready is a reporter on the tech desk at ALM Media. He can be reached at [email protected]

More from this author

 

Information Security Law: Control of Digital AssetsBook

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bol...

Get More Information
 
 

ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2020 ALM Media Properties, LLC. All Rights Reserved.