<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>blog</title>
    <link>https://vahti.ai/en/blog</link>
    <description />
    <language>en</language>
    <pubDate>Mon, 04 May 2026 07:16:46 GMT</pubDate>
    <dc:date>2026-05-04T07:16:46Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Multi-stage identification (MFA) alone will not keep your business safe</title>
      <link>https://vahti.ai/en/blog/pelkk%C3%A4-monivaiheinen-tunnistatuminen-mfa-ei-pid%C3%A4-yrityst%C3%A4si-turvassa</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://vahti.ai/en/blog/pelkk%C3%A4-monivaiheinen-tunnistatuminen-mfa-ei-pid%C3%A4-yrityst%C3%A4si-turvassa?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://vahti.ai/hubfs/Blog%20feature%20image-8.jpg" alt="Microsoft 365 Multi-factor authentication MFA" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Many organisations still think like this:&lt;br&gt;&lt;i&gt;"We have multi-factor authentication in place, so user accounts are secure."&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Many organisations still think like this:&lt;br&gt;&lt;i&gt;"We have multi-factor authentication in place, so user accounts are secure."&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The idea is understandable, as MFA has been and still is one of the single most effective ways to protect user accounts. However, the threat landscape has changed and companies are required to have a better understanding of security.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The fact is that today, MFA alone no longer provides the level of security that is often expected.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Attacks are not only targeting passwords - but also people&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;In the past, an attacker's goal was simply to crack or steal a password.&lt;br&gt;Now the goal is different.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Today's attacks do not necessarily try to circumvent the MFA technically, but &lt;strong&gt;exploit the user himself.&lt;/strong&gt; The attacker wants the user to log in as normal - but on behalf of the attacker.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;A common example of this is the so-called &lt;i&gt;Adversary-in-the-Middle&lt;/i&gt; attack. The user is redirected to a login page that looks genuine, enters their credentials and accepts the MFA request as usual. Most of the time, everything seems normal to the user, but the login session ends up in the hands of the attacker.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The multi-factor authentication worked technically exactly as it was supposed to, but it did not prevent the attack.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;MFA fatigue is a real phenomenon&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Another widespread phenomenon is the so-called MFA bombing. An attacker triggers login attempts repeatedly, resulting in constant requests for approval to the user's phone.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Eventually, the user will either:&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;ul style="list-style-type: disc;"&gt; 
  &lt;li&gt;&lt;span&gt;accidentally accept the request&lt;/span&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;span&gt;or accepts it in order to stop the notifications&lt;/span&gt;&lt;/li&gt; 
 &lt;/ul&gt; 
&lt;/ul&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;As a reader, you may feel that no one would really fall for such an obvious scam. In reality, such a mistake can happen to a user in a hurry, when tired, or just by accident.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;You yourself may, for example, have sometimes just "acknowledged a notification" from your phone in the middle of a meeting. Unfortunately, for the less alert user, an MFA alert may be just one distraction among others. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Even in this case, the MFA is not "broken". The problem is that &lt;strong&gt;the system does not understand the context&lt;/strong&gt; and the user does not always stop to think about why the request came at that particular moment.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;The real problem is not the MFA. The problem is what is missing around it&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;When people say "MFA alone is not enough", it is sometimes misinterpreted. It is not that the MFA is unnecessary or outdated.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="color: #0e0e0e;"&gt;On the contrary, MFA is still a very viable cornerstone for protecting user logins - &lt;/span&gt;&lt;/span&gt;&lt;span style="color: #0e0e0e;"&gt;even though other methods, such as passkey, have become more common.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The problem arises if:&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;ul style="list-style-type: disc;"&gt; 
  &lt;li&gt;&lt;span&gt;logins are not continuously monitored&lt;/span&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;span&gt;abnormal behaviour is not detected&lt;/span&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;span&gt;risks are not responded to quickly&lt;/span&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;span&gt;the environment is viewed in terms of individual settings rather than the whole&lt;/span&gt;&lt;/li&gt; 
 &lt;/ul&gt; 
&lt;/ul&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Modern identity attacks do not stop at a single layer of protection. Therefore, defences should not be based on a single attribute either.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;What is really needed beyond MFA?&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;If the goal is a truly protected Microsoft 365 environment, MFA is only the starting point. Around it, you need an entity that lives and reacts.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;In practice this means, for example:&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;strong&gt;&lt;span&gt;Continuous monitoring&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt; Suspicious&lt;span&gt;logins, anomalous changes and risk signals are detected while they can still be reacted to.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;strong&gt;&lt;span&gt;Understanding the context&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;br&gt;Not all anomalies are threats. The key is to distinguish normal activity from genuine risk.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;strong&gt;&lt;span&gt;Clear policies&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;br&gt;When something happens, it should be clear what to do next - without everyone having to be a security expert.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;strong&gt;&lt;span&gt;The big picture&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;br&gt;A single alert doesn't tell you much. It's only by combining multiple signals that you can see what's really going on in the environment.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Why is continuous identity monitoring so important in a Microsoft 365 environment?&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Microsoft 365 is the most business-critical platform for many organisations: email, files, Teams conversations and management rights all go through the same identity. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;This makes user accounts an attractive target for attackers, but at the same time it also offers the potential for better protection if the environment is actively monitored. By looking at login credentials, anomalous signals and user behaviour as a whole, threats can be identified before they can cause damage. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;This is where continuous monitoring and contextual understanding come into play: they turn individual events into a controlled whole, supporting both security and business continuity.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Why are MFA attacks often detected too late?&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;In many organisations, identity-related anomalies are only discovered after the fact - if at all. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;One reason for this is that logins are often viewed as individual events, rather than as part of a broader behavioural picture. A single successful login may not attract attention, even if it is preceded by an unusual location, a new device or an unusual time. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;With MFA in place, it is easy to assume that all logins that are accepted are also correct. This mindset leaves room for the attacker to operate in peace. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Without constant monitoring, an attack can continue for days or weeks before the first clear signs appear. This is precisely why identity security is not just about blocking logins, but about understanding what kind of logins are involved and reacting in time when something no longer looks normal.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Summary&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;MFA remains an important and necessary part of identity security, but on its own it can give a false sense of security.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Real protection only comes from continuous monitoring of authentication, users and the environment as a whole, and from the ability to react in a timely manner to identified risks.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Security in an M365 environment is not a single setting or feature. It is an ongoing process.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147921880&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fvahti.ai%2Fen%2Fblog%2Fpelkk%C3%A4-monivaiheinen-tunnistatuminen-mfa-ei-pid%C3%A4-yrityst%C3%A4si-turvassa&amp;amp;bu=https%253A%252F%252Fvahti.ai%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Microsoft 365</category>
      <category>Security</category>
      <category>Blog</category>
      <pubDate>Mon, 04 May 2026 07:15:41 GMT</pubDate>
      <author>jari-pekka@vahti.ai (Jari-Pekka Hyyppä)</author>
      <guid>https://vahti.ai/en/blog/pelkk%C3%A4-monivaiheinen-tunnistatuminen-mfa-ei-pid%C3%A4-yrityst%C3%A4si-turvassa</guid>
      <dc:date>2026-05-04T07:15:41Z</dc:date>
    </item>
    <item>
      <title>Why Microsoft 365 security requires constant monitoring</title>
      <link>https://vahti.ai/en/blog/tietoturvan-jatkuvaa-seurantaa-ei-kannata-unohtaa</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://vahti.ai/en/blog/tietoturvan-jatkuvaa-seurantaa-ei-kannata-unohtaa?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://vahti.ai/hubfs/Blog%20feature%20image-9.jpg" alt="Microsoft 365 security monitoring" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In many companies, Microsoft 365 security is seen as a project.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;In many companies, Microsoft 365 security is seen as a project.&lt;/p&gt; 
&lt;p&gt;&lt;span style="background-color: transparent;"&gt;You do a&lt;/span&gt;&lt;span style="background-color: transparent;"&gt;mapping, get the settings right and deploy MFA. &lt;/span&gt;&lt;span style="background-color: transparent;"&gt;Then they think it's done and move on with their lives without security concerns and worries.&lt;/span&gt;&lt;span style="background-color: transparent;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;While this is a good start, the reality is that security is not a one-off project. The security environment in which we live is constantly changing and therefore constant monitoring of the Microsoft 365 environment is absolutely essential.&lt;/p&gt; 
&lt;p&gt;Often, information about risks is already present in the Microsoft 365 environment but is not systematically exploited.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;The security environment is constantly changing, even if you may not realise it&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The security environment, like your Microsoft 365 environment, is never static.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&lt;em&gt;Your company's Microsoft 365 environment&lt;/em&gt;&lt;/span&gt; is constantly changing:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;users come and go&lt;/li&gt; 
 &lt;li&gt;permissions are added and removed&lt;/li&gt; 
 &lt;li&gt;applications are integrated&lt;/li&gt; 
 &lt;li&gt;settings are modified&lt;/li&gt; 
 &lt;li&gt;Microsoft makes updates&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;And &lt;em&gt;&lt;span style="font-weight: bold;"&gt;the security environment&lt;/span&gt;&lt;/em&gt; in which we live is changing:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;attacks come in waves - sometimes more, sometimes less&lt;/li&gt; 
 &lt;li&gt;attack methods evolve&lt;/li&gt; 
 &lt;li&gt;the level of security of the applications you use may change&lt;/li&gt; 
 &lt;li&gt;artificial intelligence makes attacks more effective&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Constant monitoring of security is absolutely essential in today's world. Today, a properly configured environment will not remain secure forever - especially if risk signals are not constantly monitored.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Without monitoring, risks emerge unnoticed&lt;/strong&gt;&lt;/h2&gt; 
&lt;h3&gt;&lt;strong&gt;Changes to the Microsoft 365 environment are easily hidden&lt;/strong&gt;&lt;/h3&gt; 
&lt;p&gt;Most security risks do not arise from one big mistake, but from small, everyday changes. A new user is given slightly too many permissions, an old one is not removed, or a new application gains access to data without stopping to assess the whole picture.&lt;/p&gt; 
&lt;p&gt;Individually, these may not seem significant. The problem arises because no one sees the big picture. Changes accumulate slowly, while the level of risk in the environment rises without being noticed.&lt;/p&gt; 
&lt;p&gt;Many companies rely on the idea that "once the regulations are in place, they are in place". In reality, the level of security is constantly evolving with the environment and without monitoring there is no certainty about what the situation looks like today.&lt;/p&gt; 
&lt;h3&gt;&lt;strong&gt;Events also indicate risk - if they are monitored&lt;/strong&gt;&lt;/h3&gt; 
&lt;p&gt;However, not all risks are related to settings alone. Some of them are visible as events: suspicious logins, anomalous behaviour or changes that may indicate an ongoing attack.&lt;/p&gt; 
&lt;p&gt;These signals are constantly being generated, but without active monitoring they can easily go unnoticed or get buried with other data. Often the data is there, but no one is looking at it at the right time - or understanding what is relevant.&lt;/p&gt; 
&lt;p&gt;Another real challenge is that the data on events is large and quite fragmented. Interpreting and using it without proper tools is very difficult or at least laborious.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Continuous monitoring makes Microsoft 365 security manageable and predictable&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;By continuously monitoring security, you move from reactive to predictable security.&lt;/p&gt; 
&lt;p&gt;It's no longer about one-off checks or reports, but a continuous understanding of where you are right now and where the environment is heading.&lt;/p&gt; 
&lt;p&gt;Watchdog provides a clear structure for this. It continuously monitors the status and events in your Microsoft 365 environment, identifying the relevant risks and highlighting the issues that really need to be addressed. Instead of having security scattered across different views and logs, you get a single, holistic view of the state of security.&lt;/p&gt; 
&lt;p&gt;In practice, this means that you can see:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;where risks currently exist in your environment&lt;/li&gt; 
 &lt;li&gt;how these risks have arisen&lt;/li&gt; 
 &lt;li&gt;what to do about them next&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;But it's not just visibility that matters, it's the fact that something is being done about it. Watch is not just a reporting tool, it guides you to concrete action - in a clear and understandable way, without deep technical knowledge.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147921880&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fvahti.ai%2Fen%2Fblog%2Ftietoturvan-jatkuvaa-seurantaa-ei-kannata-unohtaa&amp;amp;bu=https%253A%252F%252Fvahti.ai%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Microsoft 365</category>
      <category>Security</category>
      <category>Blog</category>
      <pubDate>Mon, 04 May 2026 07:14:31 GMT</pubDate>
      <author>jari-pekka@vahti.ai (Jari-Pekka Hyyppä)</author>
      <guid>https://vahti.ai/en/blog/tietoturvan-jatkuvaa-seurantaa-ei-kannata-unohtaa</guid>
      <dc:date>2026-05-04T07:14:31Z</dc:date>
    </item>
    <item>
      <title>Microsoft 365 security changes even when you do nothing</title>
      <link>https://vahti.ai/en/blog/microsoft-365-tietoturva-muuttuu-silloinkin-kun-et-muuta-mit%C3%A4%C3%A4n</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://vahti.ai/en/blog/microsoft-365-tietoturva-muuttuu-silloinkin-kun-et-muuta-mit%C3%A4%C3%A4n?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://vahti.ai/hubfs/Blog%20feature%20image-2.png" alt="Security is constantly changing Microsoft 365" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;You might think that your Microsoft 365 environment will remain unchanged if you don't touch it. But when logins work, users do their work as normal and no alerts appear, everything is probably fine.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="line-height: 20px;"&gt;&lt;span&gt;You might think that your Microsoft 365 environment will remain unchanged if you don't touch it. But when logins work, users do their work as normal and no alerts appear, everything is probably fine.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;But over time, the Microsoft 365 environment lives on in ways that you don't notice at all in everyday life. It's these imperceptible changes that are one of the biggest reasons why the true state of the environment drifts away over time from what was originally thought to be secure.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Microsoft 365 is constantly updating and evolving&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The first and often underestimated force for change is Microsoft itself.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Microsoft 365 is a constantly evolving service. Microsoft releases new features, updates existing features and develops the services in the background. These changes can include how a particular setting works, what security options are available, or what aspects of the environment are visibly reported in general.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;A single change usually requires no action and does not cause problems. But over time, these individual changes accumulate and affect&lt;strong&gt; how the environment behaves compared to the moment it was originally defined as safe&lt;/strong&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Users and patterns of use change, even if policies do not&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The second major change is in the company's own operations - often completely unnoticed.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Even if security policies remain the same on paper, the day-to-day life around them is constantly changing. People change roles, ways of working change and the pressure to make changes to the way things are done is under pressure to make things run more smoothly. Access rights are "temporarily" increased, new tools are introduced and access rights are extended as needed.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;These changes are business as usual and often necessary. The challenge only arises when no one is monitoring the overall impact of the changes on security.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Without a complete picture, it is easy to think that nothing has changed, when in reality the environment is constantly evolving.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;What used to be the exception is now the norm&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The third change relates to what is considered normal.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;In a Microsoft 365 environment, logins, file sharing, application access and automated activities are constantly taking place. Over time, patterns of behaviour change.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;In concrete terms, this means that, for example, remote logins, file sharing with outsiders or the introduction of a new application, which were rare in the past, may have been interpreted as anomalies in the past. These attracted attention and were examined separately. Today, these things happen so often and so smoothly in everyday life that they are hardly noticed.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;This means that the "normal state" of the environment is not constant. It evolves with the users. Risks do not necessarily appear as sudden deviations, but are gradually integrated into everyday activities.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Without a constant snapshot of the situation, it is difficult to perceive &lt;strong&gt;at what point the normal starts to slip into the risk zone.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Apparent stability can be misleading&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;One of the misconceptions associated with Microsoft 365 is that a calm everyday life means stability. When there are no alerts and the service is up and running, everything seems to be under control.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;In reality, many changes happen so slowly and imperceptibly that they go unnoticed. The environment does not suddenly "break down". It gradually drifts into a state where no one is quite sure &lt;strong&gt;whether it is still as good as they think it is.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;At this stage, a report or a single inspection often gives only a partial picture - it tells of that fleeting moment, not of the actual trend.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;The most recent check is a reflection of the past&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;If a Microsoft 365 environment is only occasionally checked, the moment of the check quickly becomes history. After that, the environment moves on: changes accumulate, usage changes and services evolve.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;Without continuous monitoring, a company does not really know &lt;strong&gt;when the environment has changed significantly&lt;/strong&gt;. Often this is only discovered when something no longer works as expected or when a risk materialises.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;The detection of attacks is often delayed&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;It is often the case that even serious cyber-attacks go undetected for long periods of time. In the vast majority of cases, an attacker can be active on systems for several weeks or even months before being detected. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;For example, according to IBM's 2025 Data Breach Report, it takes an average of 204 days to detect an attack, with a further 73 days for remediation. This shows that a momentary check is not enough, and continuous monitoring is essential. Source: IBM Cost of a Data Breach Report 2025.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span&gt;Finally,&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;The Microsoft 365 environment changes even when you do nothing. This is not a bad thing, in fact it is quite the opposite. M365 is constantly evolving to become a more secure and efficient way to improve everyday life. Problems only arise when these changes are ignored or not acknowledged.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 20px;"&gt;&lt;span&gt;As the pace of change in the environment is understood, the whole mindset of information security changes. It is not a question of whether everything was fine once, but of &lt;strong&gt;what is happening in the environment now and in what direction it is evolving.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=147921880&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fvahti.ai%2Fen%2Fblog%2Fmicrosoft-365-tietoturva-muuttuu-silloinkin-kun-et-muuta-mit%C3%A4%C3%A4n&amp;amp;bu=https%253A%252F%252Fvahti.ai%252Fen%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Microsoft 365</category>
      <category>Security</category>
      <category>Blog</category>
      <pubDate>Mon, 04 May 2026 07:13:14 GMT</pubDate>
      <author>jari-pekka@vahti.ai (Jari-Pekka Hyyppä)</author>
      <guid>https://vahti.ai/en/blog/microsoft-365-tietoturva-muuttuu-silloinkin-kun-et-muuta-mit%C3%A4%C3%A4n</guid>
      <dc:date>2026-05-04T07:13:14Z</dc:date>
    </item>
  </channel>
</rss>
