Skip to main content

Microsoft 365 Security Best Practices for Business

6 May 2026 | By CIO Tech

Most businesses run Microsoft 365. Most businesses also leave it on the default settings it shipped with. That is a problem.

Out of the box, Microsoft 365 is configured for ease of use, not security. Legacy authentication protocols are often still enabled. Admin accounts double as everyday email accounts. Phishing emails land in inboxes with no warning tags. Every one of these gaps is something an attacker can walk through, and they do, regularly.

The fixes are straightforward. You do not need a six-figure security budget. You need someone to turn on the settings Microsoft already provides but leaves switched off. This post walks through the five changes that make the biggest difference.

Turn on multi-factor authentication for every account

MFA (multi-factor authentication) means requiring a second step to log in, beyond just a password. Usually that is a code from a phone app or a push notification.

Without MFA, a stolen password is all an attacker needs. With MFA, a stolen password is useless on its own. Microsoft’s own data shows that MFA blocks more than 99 per cent of account compromise attacks.

The mistake most businesses make is enabling MFA for some accounts but not all. Every account needs it, not just the boss’s. Attackers do not care about job titles. They care about which account lets them in.

If your Microsoft 365 tenant still has legacy authentication enabled, every email account is a doorway. Legacy authentication protocols do not support MFA at all, which means they bypass it entirely. Disabling legacy authentication is one of the first things we handle for every client. If most of your team works from home or hybrid, our Work-From-Home Security Audit Checklist covers the M365 settings that matter most when staff log in from anywhere.

Learn more about our Microsoft 365 security hardening.

Laptop screen with charts and analytics
Default Microsoft 365 settings are not secure settings.

Set up Conditional Access policies

Conditional Access is a set of rules that control when and how people can log in. Think of it as a security gatekeeper that checks conditions before granting access.

For example, you can set a rule that says: if someone tries to log in from outside Australia, block them. Or: if someone tries to access your data from a device that is not company-managed, require extra verification.

Without Conditional Access, your Microsoft 365 environment treats every login attempt the same, whether it comes from your office in Parramatta or a compromised device in another country. That is not a reasonable default for a business that stores client data, financial records, or HR files in the cloud.

Conditional Access is available on Microsoft 365 Business Premium and above. If you are on a lower tier, this is worth the upgrade conversation alone.

Phishing is the most common way attackers get into business email. Someone clicks a link, enters their credentials on a fake login page, and the attacker is in.

Safe Links is a Microsoft Defender feature that checks every link in an email at the time of click, not just at delivery. If the link has turned malicious between when the email arrived and when the user clicks it, Safe Links catches it.

Safe Attachments does the same thing for files. It opens attachments in a sandbox (an isolated environment) before delivering them to the inbox. If the file behaves like malware, it gets quarantined.

Neither feature is enabled by default on most plans. Both are straightforward to turn on and significantly reduce the risk of a phishing attack landing.

For a broader look at how we approach email and endpoint security, see our cybersecurity services for Sydney businesses.

Tag external emails so staff can spot fakes

This one takes about two minutes to set up and is one of the most effective changes you can make. External email tagging adds a visible banner to any email that comes from outside your organisation.

Why does this matter? Because a common phishing technique is to impersonate someone inside the business. An email that looks like it comes from the CEO asking for a bank transfer. An email that looks like it comes from HR asking staff to update their credentials.

When every external email is clearly tagged, your staff can see immediately that the email did not come from inside the business. It does not prevent all phishing. But it removes one of the easiest tricks attackers rely on. Pair the technical controls with clear staff expectations using our Acceptable Use Policy Template.

Separate your admin accounts from daily-use accounts

If the person who manages your Microsoft 365 environment is also using that same account to check email, open attachments, and browse the web, your admin account is exposed to every threat that hits a normal inbox.

Admin accounts should be separate, dedicated accounts used only for administration. They should not receive email or be used for daily work. They need their own MFA and their own Conditional Access rules.

This is basic hygiene, but most small businesses skip it because nobody told them it mattered. It matters. If an attacker compromises an admin account, they control your entire environment: email, files, user accounts, everything.

We cover admin separation and access control as part of our Microsoft 365 and cloud services work for every managed IT client.

The defaults are not good enough

Microsoft 365 is a solid platform. But its default configuration is designed for the broadest possible audience, which means it ships with security settings turned down to avoid friction.

For a business that holds client data, financial records, or anything covered by Australian privacy law, those defaults are not adequate. The five changes above (MFA everywhere, Conditional Access, Safe Links, Safe Attachments, external tagging, and admin separation) cover the highest-risk gaps and can all be implemented quickly.

If you are not sure what your current Microsoft 365 configuration looks like, that is exactly what our IT Audit covers. We review your environment, document the gaps, and give you a plain-English report on what needs to change and why.

Ready to find out what your Microsoft 365 setup is actually exposing? Our $990 plus GST IT Audit covers your full environment: Microsoft 365 configuration, security controls, backup, and more. You get a clear report and a prioritised action plan.

Stop putting off IT that works

Book an IT Audit

$990 one-off. 90-day deep dive into your IT environment with a prioritised action plan.

Book IT Audit

Free IT Health Check

Takes 3 minutes. See where your IT stands and what to fix first.

Free IT Health Check

Cyber Posture Snapshot

Your details 1 / 10

How exposed is your business?

Six quick questions, two short ones to tailor the result, and you'll see where your business stands. About two minutes. Plain English, no jargon.

We'll use your email to send a copy of your result. No spam, no pushy sales calls.

Question 1 of 9

When your team logs in to email and business apps, do they need a code from their phone as well as a password?

Question 2 of 9

If a ransomware attack locked all your files tomorrow, could you restore them from a backup?

Question 3 of 9

When Microsoft or Apple release a critical security update, how fast does it land on your computers?

Question 4 of 9

How many people in your business can install software or change system settings on any work computer?

Question 5 of 9

If a staff member got a fake invoice or "urgent" email pretending to be from you right now, what would happen?

Question 6 of 9

When a staff member leaves, when does their access to email, files, and apps actually get cut off?

Question 7 of 9

How many people work in your business?

Question 8 of 9

Who looks after your IT today?

Question 9 of 9

What sort of business are you?

Tailoring your result...

Hi there, here's where your business stands.

Your Cyber Posture
Critical gaps Critical
Notable exposure Notable
Mixed picture Mixed
On the right track On track

Notable exposure

Your two biggest gaps

  1. 1
  2. 2

Where this leaves you on Essential Eight

  • MFA Multi-factor authentication
  • Backups Regular backups
  • Patching Covers 2 of 8: Patch applications + Patch operating systems
  • Admin access Restrict administrative privileges

This snapshot covers 5 of the 8 Essential Eight controls. The full IT Maturity Assessment covers all 8, plus Microsoft 365 hardening, device management, and staff training.