According to Ensono’s study, nearly half of firms are not using the entire set of tools and applications available in Microsoft 365. Most importantly, many businesses are overlooking the platform’s cybersecurity capabilities, leaving them vulnerable to attack.

Since the outbreak of the pandemic, businesses have been able to successfully adjust to the new working world owing to platforms and technologies like Microsoft 365.

Ensono conducted a survey of IT decision-makers who use Microsoft 365 to understand how businesses customize the platform for their needs. 83 % of the respondents polled say their current Microsoft 365 setup is critical to efficient business operations, while 72 % believe their current setup is cost-effective.

Despite the fact that the majority of organizations are satisfied with their Microsoft 365 setup, many are not taking full advantage of the package’s features. A substantial percentage of businesses, in particular, do not implement built-in security mechanisms.

Nearly half of individuals who reported a Microsoft 365-related breach said it was due to files being shared with other parties, while 37 percent said it was related to the impersonation of a compromised account. With the proper installation of MFA and CAC, these situations could be better protected.

Simon Ratcliffe, the Principal Consultant at Ensono, said, “While Microsoft 365 has proven invaluable for enterprises undergoing rapid transformation, not all companies have set up the platform in an optimal manner for their business. Microsoft 365 licensing inefficiencies remain a persistent problem in the market today, with firms creating additional costs by investing in third-party tools already available as part of their Microsoft 365 package. With optimization and the implementation of key security features, the platform can provide a better and more secure experience for its users.”

“However, there is no one-size-fits-all solution for every business. Each organization is unique, and therefore security requirements and the needs of users will vary. When reviewing an organization’s Microsoft 365 configuration, it is essential that the process is led every step of the way by the business context. Following a review, the Microsoft 365 environment can be optimized for specific business requirements, including maximizing the use of Microsoft 365 features to match the needs of the organization, and creating a security set-up tailored to the cybersecurity posture of the business.”