Transforming Your Secure Score Into a Cybersecurity Roadmap
In This Article Where Secure Score Falls Short Turning a Score Into a Roadmap Bridging the IT-Executive Gap Building Continuous Improvement ...
Information Security Compliance
Add security and compliance to Microsoft 365
BI Reporting Dashboards
Realtime pipeline insights to grow and refine your learning operation
Integrations for Banks & Credit Unions
Connect LOS, core platforms, and servicing system
Productivity Applications
Deploy customized desktop layouts for maximum efficiency
Server Hosting in Microsoft Azure
Protect your client and company data with BankGrade Security
7 min read
Justin Kirsch : Sep 27, 2024 11:00:00 AM
Verizon's 2025 Data Breach Investigations Report delivered a number that should keep every financial institution IT director awake: third-party involvement in breaches doubled to 30% year over year. Your vendors, your integrations, your MSP's remote monitoring tools. Each connection is an attack surface your team did not build and cannot fully control.
Reactive security waits for the alert. Proactive security eliminates the conditions that cause the alert. For mortgage lenders, credit unions, and banks under constant regulatory scrutiny, the distinction is not academic. It is the difference between passing your next exam and explaining a breach to your board.
ABT's Guardian operating model builds proactive security into the daily rhythm of your Microsoft 365 tenant. Not as a product you buy. As an operating discipline that runs continuously, surfaces risks before they become incidents, and gives your team the specific actions to close gaps fast.
Most financial institution IT teams operate in reactive mode. An alert fires. Someone investigates. The issue gets resolved or escalated. The team moves to the next alert. This cycle repeats hundreds of times per week.
The problem is not that reactive teams are lazy. The problem is structural:
Reactive mode is a survival strategy, not a security strategy. Your team is fighting fires instead of fireproofing the building.
Proactive security is not a mindset. It is a set of measurable practices that reduce your attack surface before adversaries find the gaps. For financial institutions running Microsoft 365, proactive security means:
Microsoft reports that 99% of password spray attacks target legacy authentication protocols like IMAP, SMTP, and POP3. These protocols do not support MFA. Every tenant with legacy auth enabled has an unlocked door that attackers check daily.
Blocking legacy authentication is a Conditional Access policy change that takes minutes to deploy and stops the most common attack vector cold. Guardian implements this in the first week of every onboarding. Most lenders ABT works with had legacy auth enabled for years because "some users might need it." Those users never materialized.
Tenant configurations drift. An admin creates a Conditional Access exclusion for a vendor during a migration and forgets to remove it. A user's device falls out of Intune compliance. A DLP policy gets modified during troubleshooting and never gets restored.
Guardian scans for configuration drift every night. Each drift event is logged, categorized by severity, and surfaced in the next morning's report. Your team does not discover the exclusion during the audit. They discover it the morning after it was created.
Standard MFA reporting shows users as "registered" once they begin the enrollment process. But registration is not completion. A user who started MFA setup but never finished the second factor is counted as MFA-enabled in most dashboards while remaining completely unprotected.
Guardian distinguishes between MFA-registered and MFA-enrolled. It identifies users who appear compliant on paper but have not completed their setup. This gap is where account takeovers happen, and most IT teams do not know it exists until after the breach.
IBM's 2025 breach report found that 20% of organizations experienced breaches related to unsanctioned AI tools, adding roughly $670,000 to breach costs. Loan officers uploading borrower documents to ChatGPT. Processors using free OCR tools with unclear data retention policies. Compliance teams testing AI assistants with real client data.
Proactive security governs AI usage before it becomes a compliance incident. Conditional Access policies can restrict access to unapproved AI services. Purview audit trails track what data moves where. Guardian surfaces AI-related activity in the daily monitoring reports so your team can address policy violations immediately.
Guardian operates on four stages that run continuously. This is not a one-time assessment. It is the operating cadence for your tenant security.
ABT configures your tenant to a hardened baseline based on 25+ years of managing financial institution tenants. Conditional Access policies, Intune device compliance, Entra ID configuration, email authentication (SPF/DKIM/DMARC), and DLP policies. Each configuration is tuned for your institution's regulatory requirements and operational needs.
Nightly scans check for policy drift, new unmanaged devices, incomplete MFA enrollments, stale accounts, and Conditional Access exclusions. ABT's security operations team reviews the results daily. Your team receives a filtered, prioritized action list.
Guardian's security insights show sign-in anomalies, MFA coverage rates, device compliance trends, and Secure Score movement across all four categories. The data tells a story: are you improving, drifting, or stalling? Leadership gets dashboards they can read without an IT glossary.
When findings require action, Guardian provides the exact steps. Not "review your MFA settings" but "these 12 users have not completed MFA enrollment, here are their names and departments, here is the enrollment link to send them." Specificity drives completion. Vague recommendations drive inbox burial.
Proactive security and compliance are not separate workstreams. Every proactive action produces compliance evidence.
The FFIEC retired its Cybersecurity Assessment Tool in August 2025 and pointed institutions to the NIST Cybersecurity Framework 2.0. The NCUA updated its ACET tool to align with the same framework. For mortgage lenders, the FTC Safeguards Rule requires a written information security plan, risk assessments, access controls, encryption, and monitoring.
Guardian maps to all of these frameworks because the underlying practices are the same. MFA enforcement satisfies FTC Safeguards Rule access control requirements. Stale account management satisfies NIST CSF identity management controls. Device compliance monitoring satisfies FFIEC examination expectations. The compliance evidence is a byproduct, not a separate project.
Mortgage lenders also face state-level regulation. NYDFS cybersecurity requirements apply to institutions operating in New York. California's CCPA adds data privacy obligations. Guardian's monitoring covers the controls these regulations require because they overlap almost entirely with strong Microsoft 365 security practices.
Most managed service providers run their security operations through third-party platforms: ConnectWise for remote monitoring, Kaseya for endpoint management, SolarWinds for network monitoring. Each platform is another vendor in your supply chain. Each one is another attack surface.
ABT runs a pure Microsoft technology stack. No ConnectWise. No Kaseya. No SolarWinds. No Nerdio. Guardian is built on Microsoft-native tools: Entra ID, Intune, Defender for Endpoint, Defender for Office 365, Defender for Identity, Purview, and Sentinel.
This architecture decision has real-world consequences. When ConnectWise ScreenConnect was breached in February 2024, every MSP running ConnectWise had to scramble. ABT's clients were unaffected. Zero exposure. When Kaseya VSA was compromised in July 2021, the same story. ABT's clients were not in the blast radius because ABT does not use the platform.
For financial institutions where regulators ask about your vendor supply chain, "our MSP runs entirely on Microsoft-native tools" is a clean answer that closes the conversation.
Proactive security needs metrics. Here is what ABT tracks for every managed tenant:
These metrics go into the dashboards your leadership team sees. They go into the reports your auditors receive. They tell the same story from two angles: this institution takes security seriously, and here is the proof.
Conditional Access: Microsoft Entra ID policy engine that controls access based on user identity, device state, location, and real-time risk assessment. The primary enforcement mechanism for zero-trust architecture in Microsoft 365.
Legacy Authentication: Older protocols (IMAP, SMTP, POP3, MAPI) that cannot enforce MFA. Blocking legacy auth is the highest-impact single action in Microsoft Secure Score and stops 99% of password spray attacks.
NIST Cybersecurity Framework 2.0: The updated federal cybersecurity risk management framework. Replaces FFIEC's retired Cybersecurity Assessment Tool as the primary reference for financial institution security assessments.
Shadow AI: Unauthorized use of AI tools by employees, such as uploading sensitive data to consumer AI platforms. IBM's 2025 report found shadow AI involvement added approximately $670,000 to breach costs.
Microsoft Defender XDR: Microsoft's extended detection and response platform that integrates Defender for Endpoint, Office 365, Identity, and Cloud Apps into a unified security operations console.
Proactive security eliminates the conditions that lead to breaches before adversaries exploit them. Financial institutions paid $6.08 million per breach in 2025 according to IBM. Guardian's nightly scans catch MFA gaps, stale accounts, and configuration drift within 24 hours of occurrence, reducing the attack surface that leads to costly incidents.
MFA-registered means a user started the MFA enrollment process. MFA-enrolled means they completed it with a verified second factor. Standard Microsoft admin dashboards count registered users as compliant, but they remain unprotected until enrollment is complete. Guardian tracks this distinction to close the gap that most reporting tools miss.
Legacy authentication protocols like IMAP, SMTP, and POP3 cannot enforce MFA, making them the primary target for password spray attacks. Microsoft reports 99% of password spray attacks use legacy auth. Blocking these protocols through Conditional Access is the single highest-impact Secure Score improvement and typically raises the Identity score by 10-15 points.
Loan officers and processors may upload borrower documents to consumer AI tools like ChatGPT or free OCR services with unclear data retention policies. IBM found shadow AI added $670,000 to breach costs. Guardian monitors for unauthorized AI usage through Conditional Access restrictions and Purview audit trails, flagging violations in daily reports.
Third-party MSP platforms add vendor supply chain risk. ConnectWise ScreenConnect was breached in February 2024. Kaseya VSA was compromised in July 2021. ABT runs a pure Microsoft stack with no third-party MSP platforms, meaning clients have zero exposure when those platforms are attacked. This simplifies vendor risk conversations with regulators and auditors.
Your next audit is coming. Your next breach attempt is already underway. The question is whether your team will catch it in the nightly scan or discover it in the incident response.
Talk to an ABT security specialist about building proactive security operations for your institution.
In This Article Where Secure Score Falls Short Turning a Score Into a Roadmap Bridging the IT-Executive Gap Building Continuous Improvement ...
A multinational bank that deployed Microsoft Teams across 12,000 employees saw a 3.5x improvement in cross-department collaboration and a 42%...
8 min read
In this guide: Encompass Hosting Models Explained Infrastructure Requirements Security Configuration for Compliance Performance Optimization ...