Microsoft Office is now Microsoft 365
News|by Alanna|14 November 2022

Microsoft first announced that Office 365 would become Microsoft 365 in April 2020, with the changes effective from November 2022.
Microsoft have stated they changed the name to be "more reflective of the range of features and benefits included within the subscription, to meet the unique needs of individuals and businesses".
The cost of all programmes included with Microsoft 365 are the same price as they were in Office 365, and there are no plans to change this.
Some Office 365 subscriptions automatically became Microsoft 365 subscriptions, and some users may have already noticed the new Microsoft 365 logo appear.
What's included with Microsoft 365?
All of the great features from Office 365 now sits under the Microsoft 365 umbrella. Microsoft 365 now comprises of:
- OneDrive
- Microsoft Word
- Microsoft Powerpoint
- Microsoft Excel
- Microsoft Teams
- Microsoft Outlook
Plus much more. To see a full list of Microsoft 365 features, click here.
How secure is Microsoft 365?
Microsoft 365 is a highly secure platform, used by more than a million companies across the globe. Its data centers are protected by state-of-the-art security infrastructure and processes, which make them almost impossible to breach directly.
Microsoft 365 security is based on four main pillars:
- Identity & Access Management
- Threat Protection
- Information Protection
- Security & Risk Management
Identity & Access Management
- Microsoft Identity & Access Manager helps you fend off suspicious login attempts and protect user credentials with risk-based access controls, identity protection tools and strong authentication options. It allows your IT administrators to assign the right access levels using role-based access control to efficiently manage which user has access to what resources.
Threat Protection
- Microsoft threat protection includes integrated, automated security solutions that help secure your email, data, applications, devices and identities against emerging cyber threats.
Information Protection
- Microsoft Information Protection (MIP) helps you locate, organise and protect your company’s sensitive information across clouds, apps and endpoints. MIP capabilities and solutions help you know your data, protect your sensitive information and prevent data loss.
Security & Risk Management
- Microsoft 365 security and risk management helps you quickly identify and remediate risks from both malicious and unintentional activities to protect your organisation’s critical information.
Learn more about all of Microsoft 365's features here.
If you have any questions around Microsoft 365, get in touch with our experts today on 01364 654100 or email us at info@greymatter.com
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Alanna
Related News
ESET Threat Report H1 2023
Twice a year ESET collates its threat research to bring you an overview of the key trends and findings. Businesses can use this to gain insight into the cyber security landscape, and use it help identify areas that need further...
[WORKSHOP] Microsoft Azure: Cloud Native Apps
Thu 14 September 2023 3:30 pm - 5:00 pm BST
Our Azure Solution Specialist covers modernising existing applications and building new apps in a cloud native way
JetBrains .NET Day Online ’23
Tue 26 September 2023 8:50 am - 8:00 pm BST
A free .NET community event Join JetBrains on 26 September 2023 for this free annual online event for .NET developers. Ten amazing community speakers will share what they’re passionate about in the .NET world. Topics include C#, F#, Blazor, Avalonia,...
[WEBINAR] How and why penetration testing is your secret weapon
Wed 27 September 2023 3:00 pm - 4:00 pm BST
In this session with Secure Impact, we’ll run through several common industry myths around penetration testing, and discuss best practices.