116 Gawler Place, Adelaide SA 5000 1800 818 875 [email protected]

Office 365

How to Configure Email Forwarding Rules Safely in Office 365

Email forwarding rules in Office 365 can be a convenient way to streamline communication, but they also pose a security risk if misconfigured. Cyber criminals often exploit forwarding rules to siphon sensitive emails unnoticed, leading to data breaches, financial fraud, and compliance violations.

For SMEs, where IT resources are limited, securing email forwarding is a crucial yet often overlooked step in cyber security.

Jump to our How To section now.

  1. The Risk: Why It Matters

  2. How to Secure Your Email Forwarding Rules

  3. Why Email Configuration is Important for SMEs

If you’re unsure whether your business is protected, Jam Cyber can help assess and secure your Office 365 environment. Contact us today for expert advice.

The Risk: Why It Matters

 

Email forwarding rules can be exploited by attackers in various ways:

  • Silent Data Exfiltration: Hackers compromise an account and set up forwarding rules to send copies of emails to external addresses, often going undetected for months.

  • Business Email Compromise (BEC): Attackers manipulate email rules to intercept invoices, payroll details, or client communications, redirecting funds or sensitive data to fraudulent accounts.

  • Regulatory Non-Compliance: Industries subject to data protection laws (e.g., the Australian Privacy Act) may face fines and reputational damage if customer data is leaked.

There have been an increase in cases involving cyber criminals infiltrating a business’s Office 365 account and setting up automatic forwarding of all emails containing financial terms like “invoice” or “payment.”

Unfortunately, most breaches are only discovered after significant financial losses have occurred.

microsoft365-Image2

How to Secure Your Email Forwarding Rules

 

To protect your business from email forwarding-related threats, follow these best practices:

  1. Disable Automatic Forwarding by Default
  • Navigate to your email security settings and disable external auto-forwarding where possible.
  • Only allow forwarding to trusted internal addresses when necessary.

  1. Review and Audit Forwarding Rules Regularly
  • Check your email settings to inspect forwarding configurations.
  • Conduct a scheduled review of all existing forwarding rules to ensure they are legitimate and necessary.
  • Remove any unauthorised or outdated rules immediately.

  1. Enable Alerts for Suspicious Forwarding Activity
  • Configure your email security system to send alerts when forwarding rules are created or modified.
  • Regularly monitor logs for unusual forwarding behaviour, such as emails being forwarded to external domains.
  • Investigate and disable any suspicious rules promptly.

  1. Implement Multi-Factor Authentication (MFA)
  • Require MFA for all user accounts to prevent unauthorised access.
  • Encourage employees to use authentication apps or hardware security keys for enhanced protection.

  1. Educate Employees on Email Security
  • Train staff on how to recognise phishing attempts and social engineering tactics used to manipulate forwarding rules.
  • Encourage employees to report any unexpected email behaviours, such as missing emails or auto-forwarding notifications.
  • Implement a clear security policy on the use of email forwarding.

  1. Use Strong Access Controls
  • Restrict the ability to create or modify forwarding rules to administrators or specific user groups.
  • Regularly review user permissions and remove unnecessary administrative privileges.

  1. Implement Advanced Threat Protection
  • Use security tools to block suspicious forwarding attempts automatically.
  • Scan emails for malware and phishing attempts in real-time to prevent cyber threats from taking hold.
  • Deploy endpoint protection software to further reduce the risk of account compromise.

  1. Conduct Regular Security Assessments
  • Schedule periodic cyber security reviews to assess email security policies and configurations.
  • Simulate phishing attacks to test employee awareness and response to security threats.
  • Work with security experts like Jam Cyber to ensure best practices are in place and up to date.
filtering email

Why Email Configuration is Important for SMEs

 

SMEs are prime targets for cyber attacks due to typically weaker cyber security and limited IT resources. Unlike large enterprises with dedicated security teams, smaller businesses often operate with basic security configurations, making them vulnerable to email-based threats.

The Risks of Poor Email Security

A compromised email account can result in:

  • Loss of Client Trust: Customers and partners expect their sensitive information to be handled securely. A data breach resulting from an insecure email system can severely damage an SME’s reputation, leading to loss of business and long-term trust issues.

  • Financial Fraud: Cyber criminals use compromised email accounts to manipulate invoices, send fake payment requests, or intercept financial transactions. SMEs may suffer severe financial losses that can be difficult to recover from.

  • Operational Disruption: A cyber incident involving email security can lead to downtime, loss of access to critical business communications, and disruption of customer service, impacting overall business productivity.

Why SMEs Are at Greater Risk

  • Limited IT Budgets: Unlike larger corporations, SMEs may not have the resources to implement comprehensive cyber security measures, making them easier targets for cyber criminals.

  • Lack of Awareness: Many SME employees may not be aware of the risks posed by email threats such as phishing or social engineering, increasing the likelihood of security breaches.

  • Increasing Cyber Threats: The rise of sophisticated cyber attacks, including ransomware and phishing scams, has made email security more critical than ever before. SMEs must take proactive measures to stay ahead of evolving threats.
Fake invoce

Jam Cyber specialises in helping SMEs secure their email environments. Get in touch for expert assistance.

By configuring forwarding rules safely, SMEs can mitigate the risk of cyber threats, ensure compliance, and safeguard sensitive communications.

Need help? Jam Cyber’s team of experts is here to assist. Contact us today for a consultation!

// Need more help?

Contact our team today.



    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.