Is Your IP Address Safe with Microsoft Office 365?

November 12, 2019

|

|

BY CYBRI Admin

If you have been trying to use Office 365’s webmail service as a buffer for your IP address, your efforts may have been futile. When sending emails using the service, your IP address is automatically added as a header to the email.

Many people choose webmail hosts to reply to emails, as they protect your IP address. With phishing attacks, ransomware, and cybercrime campaigns running rampant, protecting your IP address and your information online is vital. However, it turns out some of these webmail services aren’t actually doing anything.

According to a report on Cyware, “when sending out emails via Office 365 webmail, the service will inject an additional header into the email called ‘x-originating-ip’ that contains the IP addresses of the sender.”

Microsoft removed this feature from its other web service Hotmail, for safety and security reasons. But unfortunately, Microsoft left the feature in Office 365 so admins could easily retrieve the IP addresses of emails sent to their networks.

Furthermore, they state that if you want to protect yourself online using this service, then you have to take extra steps to protect yourself, including using a VPN and using Tor browser—which uses a proxy to mask your true IP address.

On one hand, protecting your IP address can be useful, as it masks your location and other sensitive information about your network. On the other, for the purposes of security and auditing emails in the network, it can be useful to have access to a sender’s IP address. Whether or not to keep this feature enabled is dependent on your and your organization’s specific needs.

Sources:

Related Content

Penetration testing, or PenTesting for short, has become all the rage in cybersecurity

AMCA Data Breach Displays Importance of Cybersecurity in Healthcare

Cybersecurity remains a pressing issue for healthcare in the United States—with more than 20 million patient record exposed in the AMCA data breach.

Incident-Response

Responding to a breach or Incident Response. Incidence response (next steps after a

cybri-logo

stay informed!

Subscribe to receive exclusive content and notifications