fbpx
BETA
v1.0
menu menu

Log on to your account

Forgotten password | Register

Welcome

Logout

How your org can avoid being a victim of the next “SharePoint”

1st Aug 2025 | 06:00am

In July, hackers attacked a plethora of businesses and government agencies, worming their way through a previously unknown vulnerability in Microsoft SharePoint. One government agency told the Washington Post that the hackers had wiped some of their documents. Thousands of servers were left vulnerable. 

It’s a chilling scenario: a hacker, potentially halfway across the world, gains the ability to infiltrate systems, steal data, or disrupt operations. 

In just a matter of days, shockwaves of concern rippled throughout organizations, leaving many searching for answers as to what they need to know and how they can protect themselves and their customers. 

Why did this thing get so big so fast?

The SharePoint vulnerability received a severity score of 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS), which is a standardized framework used to assess and prioritize security flaws. A score that high signals a critical risk, meaning affected organizations should apply the available patch immediately.

The extreme severity, paired with SharePoint’s widespread use in enterprise environments, helped the threat (and the headlines) spread rapidly.

When an attack of this scale occurs, it’s natural to look for something or someone to blame. Outdated or neglected systems are often among the first to be blamed in cybersecurity, but in this case, legacy infrastructure wasn’t the issue. SharePoint is actively maintained and a patch was available, but issues with the effectiveness of the patch left even the most security-conscious organizations vulnerable.

Protecting company secrets

The SharePoint vulnerability is a reminder that protecting sensitive information starts with controlling who has access to it. One of the simplest ways to keep intruders out is by using multi-factor authentication—the process of confirming your identity with more than just a password. Yes, it can be a hassle to enter a code from your phone, but that small extra step makes it much harder for attackers to break in.

SharePoint comes with built-in tools that let organizations control who can see and edit files. But those tools only work if they’re used wisely. For example, not every employee needs access to every document. Keeping sensitive files limited to just the people who need them helps reduce the risk if someone does manage to sneak into the system.

It’s also important to watch for unusual behavior—small signs that something might be wrong. If someone’s account suddenly tries to access files they don’t normally use, logs in from an unfamiliar location or gets blocked repeatedly when trying to open restricted content, those are red flags.  Many organizations use tools like Security Information and Event Management (SIEM) platforms and user and entity behavior analytics (UEBA) to catch these early warning signs. SIEM tools help security teams monitor activity across the network, while UEBA uses patterns and data to flag behavior that’s out of the ordinary. Together, they can help stop an attack before it causes serious damage.

Now what?

Incidents like the SharePoint vulnerability highlight just how quickly a virtual flaw can turn into a real-world problem—exposing sensitive data, disrupting operations and shaking trust. These events offer organizations a moment to revisit the fundamentals: making sure employees know how to recognize phishing attempts, limiting who has access to critical documents and using safeguards like multi-factor authentication to keep intruders out.

But the real key is consistency. Cybersecurity has to be built into the culture of the organization. That means clear policies, ongoing awareness, and fast action when something feels off. The companies that fare best in the face of cyber threats aren’t always the biggest or most high-tech—they’re the ones that stay alert, respond quickly and prioritize cybersecurity as an essential part of the business.