<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=705389681562533&amp;ev=PageView&amp;noscript=1">
whatsappChat

Cybersecurity Advisory Alert: Cyberattack Targeting SharePoint Servers

Attention: Head of IT and Business Leaders

We want to highlight this urgent alert issued by Microsoft on 19 July 2025, regarding active cyberattacks targeting On-Premise SharePoint Servers, which are impacting business and government agencies globally. And more importantly to advise you on the cybersecurity essentials to safeguard your organisation. 

Source: MicrosoftCISA (Cybersecurity and Infrastructure Security Agency)

 


What Happened

Attackers targeted an unknown vulnerability to gain unauthorised access to these servers used for document sharing and collaboration, posing critical risks to organisations. Note: This does not affect SharePoint Online. 

 

GettyImages-1324240484_525x350

Security Risks & Business Implications

    • Unauthorised Access: Attackers can access sensitive data in SharePoint
    • Data Manipulation: Critical data could be altered or deleted without detection
    • Ransomware & Malware: Increased risk of malicious software being installed
    • Operational Disruption: System downtime, disrupting workflows, collaboration and productivity
    • Reputational Damage: Erodes client trust and brand reputation with public breach disclosure
    • Compliance Violation: Potential PDPA non-compliance, leading to fines and legal consequences with personal data breach  

 


Improve Your Security Posture

>>  If you are using On-Premise Microsoft SharePoint, we advise the following corrective actions immediately:

    • Patching: Apply July 2025 security updates immediately 
    • Encryption: Rotate ASP.NET machine keys used by SharePoint
    • Vulnerability Management: Ensure Anti-malware Scan Interface (AMSI) is active and properly configured
    • Monitoring: Enable Endpoint Detection and Response (EDR) to spot for abnormalities and breaches

>>  To further boost cybersecurity within your IT environment, we advise the following proactive security measures: 

    • Risk Assessment: Evaluate risks, identify vulnerabilities, and review policies against security frameworks like the CIS benchmarks 
    • Tighten Access: Multi-Factor Authentication, Single-Sign-On, identity federation, least-privilege and role-based access for stronger identity security
    • Security Controls: Patch management, anti-malware with EDR, and network segmentation for robust, layered threat protection
    • Monitor & Response: Proactive SIEM monitoring and real-time alerts, and a tested incident response plan for swift recovery
    • User Education: Regular cybersecurity training and phishing exercises for employee cyber hygiene
    • Audit & Compliance: Regular audits, penetration tests, proper documentation for accountability and regulatory compliance

If you have any questions or are concerned that you may have been compromised, please contact us immediately.

 


Simplify IT. Boost Productivity on Microsoft 365 

Worry less and do more with our Managed Microsoft 365  for end-to-end remote support, M365 data backup, and 24x7 proactive security monitoring and alerts. Secure your M365 environment today. 

 


FOR FURTHER ENQUIRIES

Email us at TechConsultant@RSMSingapore.sg or call +65 6594 7594

 

Related Insights

Risk Management & Preparedness Every Step of the Way

Digitalisation Must-haves: Tips to Fueling Growth and Custom...

Formulate a Digitalisation Strategy using 3Ps

The Strategic Value of Technology Advisory for Business Succ...

AI Advisory for Successful AI Adoption - Microsoft Copilot C...

Importance of CISO

Deciphering ERP vs Accounting Software: Unveiling the Key Di...

IT Outsourcing vs IT Managed Services

Road to IPO

Why Backup Microsoft 365?

Best practices for performing data backups

Increase ROI on IT assets

8 Data-backup Tips for a Resilient Business

Recent PDPA Amendments - w.e.f. 1 Feb 2021

New MAS Ruling to Strengthen Cyber Resilience of the Financi...

The importance of IT policy

Four factors to consider in an outsourcing relationship

Trim the bloat to keep afloat

Windows 7 & Windows Server 2008 End of Life – Everything...

Achieving True Digital Transformation Success

Digital-First Strategy - Why it is important to re-examine T...

Cyber Safe Habits for SMEs and Employees

What is IT governance?

Microsoft Dynamics 365 Licencing Changes – What you should k...

Using IT Managed Services and IT Outsourcing to move beyond ...

Chief Technology Officer-as-a-Service (CTO-as-a-Service) - D...

Zero Trust – No Longer A Buzzword But Becoming A Necessity

IT Outsourcing & IT Managed Services for IT Infrastructu...

Data Protection Tips for Smes and Everyday Users

Digital AGM Made Easy

Have you been spending all your time firefighting? No time t...

Are you looking for the right IT vendor?

Digital Transformation DO’s and DON'Ts

Benefits of Outsourcing your IT function

Risk Management & Preparedness Every Step of the Way

Digitalisation Must-haves: Tips to Fueling Growth and Custom...

Formulate a Digitalisation Strategy using 3Ps

The Strategic Value of Technology Advisory for Business Succ...

AI Advisory for Successful AI Adoption - Microsoft Copilot C...

Importance of CISO

Deciphering ERP vs Accounting Software: Unveiling the Key Di...

IT Outsourcing vs IT Managed Services

Road to IPO

Why Backup Microsoft 365?

Best practices for performing data backups

Increase ROI on IT assets

8 Data-backup Tips for a Resilient Business

Recent PDPA Amendments - w.e.f. 1 Feb 2021

New MAS Ruling to Strengthen Cyber Resilience of the Financi...

The importance of IT policy

Four factors to consider in an outsourcing relationship

Trim the bloat to keep afloat

Windows 7 & Windows Server 2008 End of Life – Everything...

Achieving True Digital Transformation Success

Digital-First Strategy - Why it is important to re-examine T...

Cyber Safe Habits for SMEs and Employees

What is IT governance?

Microsoft Dynamics 365 Licencing Changes – What you should k...

Using IT Managed Services and IT Outsourcing to move beyond ...

Chief Technology Officer-as-a-Service (CTO-as-a-Service) - D...

Zero Trust – No Longer A Buzzword But Becoming A Necessity

IT Outsourcing & IT Managed Services for IT Infrastructu...

Data Protection Tips for Smes and Everyday Users

Digital AGM Made Easy

Have you been spending all your time firefighting? No time t...

Are you looking for the right IT vendor?

Digital Transformation DO’s and DON'Ts

Benefits of Outsourcing your IT function