SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Protect Your Data:
7 Ways to Improve
Your Security Posture
Enterprise mobility, the flood of workplace devices,
Software-as-a-Service application, and the cloud
have transformed the way business operates, allowing
business owners and employees to become both more
mobile and more productive.
But the shift to mobile, cloud-based business has produced other changes
as well, like a proliferation of personal mobile devices being used in work
situation, dissolving business perimeters, and a greater use of public – or
off domain – networks. While these shifts often result in increased produc-
tivity, they can also put businesses’ sensitive data at greater risk of security
threats, attacks, or breaches.
Is it possible to give employees the mobility and productivity they need in
a modern workplace while also protecting your data? Yes.
In this eBook, we will discuss seven ways businesses can better protect data,
and the actionable steps they can take to reduce vulnerability.
Protect Your Data: 7 Ways to Improve Your Security Posture is the first in a
series of eBooks from Microsoft on the topic of security.
Reduce threats with identity and access management
Manage mobile device and apps
Leverage conditional access
Increase enterprise data protection
Prevent data loss
Enable secured collaboration
Reduce malware exposure
7 Ways to Improve Your Security Posture
3 Data Protection
Reduce threats with identity and access management
Identity and access management can help reduce the risk.
  •  Eliminate the need for multiple credentials with a single identity to access 	
cloud and on-premise resources
  •  Limit individual access to what employees need to do their jobs.
  •  Revoke access privileges when an employee changes roles, leaves the com- 	
pany, or no longer requires access to certain shares.
  •  Enforce second factor authentication based on risky behaviors.
Often the weakest links in security are employees, whether by accidentally leak-
ing sensitive data or exposing their credentials in social networks. This is in part
because maintaining control over applications across corporate data centers and
public cloud platforms has become an increasingly complicated challenge.
Workers want to access resources and technology from a variety of locations
and devices. This increased mobility can result in a number of complications
from a security perspective including password and location-based access man-
agement concerns.
External attackers seek corporate vulnerabilities – like leaked credentials – to access
networks and steal customer information, intellectual property, or other sensitive
data. This puts your business at severe risk of financial, legal, or public relations
damage. Internal breaches can expose your data to risk as well. How do you ensure
control of the what, the when, the where and the who of application access?
•	 More than 80 percent of employees
admit to using non-approved soft-
ware-as-a-service (SaaS) applications
in their jobs1
1
Source: “The hidden truth behind shadow IT – six trends 	
impacting your security posture” (Frost & Sullivan)
Learn more:
•  Identity + Access Management
4 Data Protection
Begin with the basics:  
  •  Don’t disrupt the user flow; make it easy and natural for them to comply. 	
Consider managing important applications rather than the entire device.
  •  Be transparent about what IT is doing to employee devices.
  •  Protect only the corporate data. Look for solutions that enable employees 	
to freely use the device for their personal purposes.
Anytime devices are stolen, lost, or simply left unattended data is left vulner-
able and under-protected. It’s also vulnerable when your corporate data leaks
into personal applications. In this age of BYOD, how do you help protect your
data without compromising employee productivity?
As the Bring Your Own Device (BYOD) trend grows and the use of Software-as-
a-Service (SaaS) applications proliferates, security concerns multiply. Critical data
is being stored with greater frequency in the public cloud, which is not always
governed by the same security standards as private cloud or on-premises solu-
tions. This reality is forcing businesses to adapt quickly to maintain tight security.
Manage mobile device and apps
•  An estimated 52 percent of informa- 	
tion workers across 17 countries report	
using more than three devices for 		
work1
   1
Source: “Employee devices bring added security concerns,” 	
by Cindy Bates (Microsoft US Small and Midsize Business Blog)
Learn more:
•  Microsoft Intune
5 Data Protection
Leverage conditional access
Conditional access restricts access to corporate resources based on either user
identity, or device health. It’s also about enforcing policies based on location
and application data sensitivity. For example, accessing a Customer Relationship
Management (CRM) application from a café requires multi-factor authentication
because of both the location of the user and the sensitive data of the CRM sys-
tem. Another example would be in email. A device must be compliant with poli-
cies, like encryption and PIN, to access corporate email. Properly enforcing con-
ditional access policies across a company can improve an overall security posture.
What are your first steps to getting a policy in place?
  •  Define a mobile device access policy that works for your business. You 	
can either require full management of the device or just management of 	
critical applications like Outlook to access corporate email.
  •  Leverage dynamic groups to give employees access to the applications 	
they need based on their roles.
  •  Enforce multi-factor authentication this adds a layer of protection by 	
requiring users to authenticate themselves two ways. The first method 	
may be the traditional user name and password combination. The second 	
often involves a physical component that would be virtually impossible 	
to duplicate. For example, swiping a card key and entering a PIN, logging 	
into a website and using a one-time password, logging in via a VPN client	
with a digital certificate, or scanning a user’s fingerprint.

Learn more:
•  Azure Active Directory conditional
access
•  Conditional access overview
•  Conditional access with Microsoft
Intune
•  Office 365 with Mircosoft Intune
•  Windows 10
6 Data Protection
To get started:  
  •  Ensure devices are fully encrypted in case they are lost or stolen.
  •  Enable EDP in your enterprise environment, which will allow you to manage 	
and regulate apps and data without making unnecessary changes.
Mobile workplaces can greatly increase productivity and access to work-related
resources, but they also increases the risk of accidental data leaks through apps
and services like email, social media, and the cloud. Providing a safer environment
for employees to work remotely is key to maintaining a more secure business while
enabling mobile productivity. For example, an employee might send the latest
engineering pictures from their personal email account, copy and paste information
into social media, or save an in-progress report to their personal cloud storage.
How can you allow personal devices, but without compromising the security of your
data?
Enterprise data protection (EDP) helps protect against potential data leakage to
unauthorizedappsorlocationswithouttakingawayfromanemployee’sworkexperience.
Increase enterprise data protection
For more information, see:
•  Windows 10 Enterprise Data
  Protection
•  BitLocker Overview
•  Microsoft Intune
7 Data Protection
Prevent data loss
Start by reducing the likelihood of a leak:
  •  Learn more about the data loss prevention (DLP) capabilities within your 	
ecosystem to protect your data where it is stored, when it is moved, and	
when it is shared. For example, an email can be limited to distribution 	
within an organization or carry a digital rights management qualification 	
that restricts who can open it.
  •  Extend DLP beyond email as well. Certain word processor, spreadsheets, 	
and presentation programs also offer restricted access options that pre-	
vent unauthorized users from opening files.
Sharing documents through email and other online tools is an important pro-
ductivity tool for workers, but to err is human. Employees can easily send in-
formation to the wrong recipient, or attach the wrong document, inadvertently
sharing access to sensitive data. Security professionals must understand the risks
and benefits of data sharing and develop appropriate plans to minimize data loss
to keep greater security. That said, how do you allow employees to share files in
email without endangering your sensitive information?
For more information, see:
•  Office 365 Data Loss Prevention (DLP)
•  Microsoft Office 365
8 Data Protection
Enable secured collaboration
Offer a flexible, easy-to-use, secured solution that meets their needs.
  •  Establish secured tools for sharing information, and ensure the right 	
workers have access. This includes a secured document sharing solu-	 	
tion, such as a SharePoint, restricted-access network share, or cloud-	
based solution.
  •  Require a digital rights management or other secured email solution to 	
be used when sending sensitive materials through email.
  •  Provide easy and secured information-sharing workflow to enable both 	
internal and external collaboration
When it comes to sharing information, convenience often trumps security, which
makes for a security professionals living nightmare. Workers can get creative with
how they share information, putting your data in jeopardy and your company at
risk of losing critical data. How do you encourage workers to collaborate while
minimizing risks of compromised information?
Learn more:
•  Azure Rights Management
•  Sharing protected files
•  Sending encrypted emails
•  Mircosoft Office 365
•  SharePoint
•  Microsoft Azure
Malware infections can often be traced back to user error. Phishing and spoof-
ing schemes have become extremely sophisticated, tricking users with fake emails
from trusted brands, luring them in with fake news stories, and convincing them
to download innocuous-seeming apps that contain hidden attacks. You can’t stop
users from surfing the web, using social media or accessing personal email on their
own devices. How can you help them do these everyday tasks more safely?
Education is your first line of defense.
  •  Ask employees to read basic guidance and/or complete training that details	
common methods of malware attack.
  •  Teach users to double check URLs in email to make sure they seem rele-	
vant, accurate, and legitimate. And consider implementing email pro- 	
tection solutions that can help prevent malware and phishing attempts 	
from reaching employees’ inboxes.
  •  Suggest that workers limit their app usage to those downloaded from a 	
reputable source.
9 Data Protection
Reduce malware exposure
Learn more:
•  Windows 10
•  Windows Defender
•  Windows Device Guard
•  Mircosoft Office 365
© 2016 Microsoft Corporation. All rights reserved. This document is for informational
purposes only. Microsoft makes no warranties, express or implied, with respect to the
information presented here.
Allowing workers to be mobile does not have to mean endangering your data’s
security. With proper planning, the right tools, and education, you can give your
employees the freedom to work anywhere, anytime while minimizing risk.
Learn more about cybersecurity
Focusing on these 7 areas and stand
to improve your organization’s security

Mais conteúdo relacionado

Mais procurados

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talkritupande
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! EMC
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware anAKHIL969626
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss preventionssuser1eca7d
 

Mais procurados (20)

Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
Running head hardware and software security14 hardware an
Running head hardware and software security14 hardware anRunning head hardware and software security14 hardware an
Running head hardware and software security14 hardware an
 
Case study
Case studyCase study
Case study
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 

Semelhante a En msft-scrty-cntnt-e book-protectyourdata

Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?The TNS Group
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 

Semelhante a En msft-scrty-cntnt-e book-protectyourdata (20)

Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 

Último

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 

Último (20)

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 

En msft-scrty-cntnt-e book-protectyourdata

  • 1. Protect Your Data: 7 Ways to Improve Your Security Posture
  • 2. Enterprise mobility, the flood of workplace devices, Software-as-a-Service application, and the cloud have transformed the way business operates, allowing business owners and employees to become both more mobile and more productive. But the shift to mobile, cloud-based business has produced other changes as well, like a proliferation of personal mobile devices being used in work situation, dissolving business perimeters, and a greater use of public – or off domain – networks. While these shifts often result in increased produc- tivity, they can also put businesses’ sensitive data at greater risk of security threats, attacks, or breaches. Is it possible to give employees the mobility and productivity they need in a modern workplace while also protecting your data? Yes. In this eBook, we will discuss seven ways businesses can better protect data, and the actionable steps they can take to reduce vulnerability. Protect Your Data: 7 Ways to Improve Your Security Posture is the first in a series of eBooks from Microsoft on the topic of security.
  • 3. Reduce threats with identity and access management Manage mobile device and apps Leverage conditional access Increase enterprise data protection Prevent data loss Enable secured collaboration Reduce malware exposure 7 Ways to Improve Your Security Posture
  • 4. 3 Data Protection Reduce threats with identity and access management Identity and access management can help reduce the risk.   •  Eliminate the need for multiple credentials with a single identity to access cloud and on-premise resources   •  Limit individual access to what employees need to do their jobs.   •  Revoke access privileges when an employee changes roles, leaves the com- pany, or no longer requires access to certain shares.   •  Enforce second factor authentication based on risky behaviors. Often the weakest links in security are employees, whether by accidentally leak- ing sensitive data or exposing their credentials in social networks. This is in part because maintaining control over applications across corporate data centers and public cloud platforms has become an increasingly complicated challenge. Workers want to access resources and technology from a variety of locations and devices. This increased mobility can result in a number of complications from a security perspective including password and location-based access man- agement concerns. External attackers seek corporate vulnerabilities – like leaked credentials – to access networks and steal customer information, intellectual property, or other sensitive data. This puts your business at severe risk of financial, legal, or public relations damage. Internal breaches can expose your data to risk as well. How do you ensure control of the what, the when, the where and the who of application access? • More than 80 percent of employees admit to using non-approved soft- ware-as-a-service (SaaS) applications in their jobs1 1 Source: “The hidden truth behind shadow IT – six trends impacting your security posture” (Frost & Sullivan) Learn more: •  Identity + Access Management
  • 5. 4 Data Protection Begin with the basics:     •  Don’t disrupt the user flow; make it easy and natural for them to comply. Consider managing important applications rather than the entire device.   •  Be transparent about what IT is doing to employee devices.   •  Protect only the corporate data. Look for solutions that enable employees to freely use the device for their personal purposes. Anytime devices are stolen, lost, or simply left unattended data is left vulner- able and under-protected. It’s also vulnerable when your corporate data leaks into personal applications. In this age of BYOD, how do you help protect your data without compromising employee productivity? As the Bring Your Own Device (BYOD) trend grows and the use of Software-as- a-Service (SaaS) applications proliferates, security concerns multiply. Critical data is being stored with greater frequency in the public cloud, which is not always governed by the same security standards as private cloud or on-premises solu- tions. This reality is forcing businesses to adapt quickly to maintain tight security. Manage mobile device and apps •  An estimated 52 percent of informa- tion workers across 17 countries report using more than three devices for work1    1 Source: “Employee devices bring added security concerns,” by Cindy Bates (Microsoft US Small and Midsize Business Blog) Learn more: •  Microsoft Intune
  • 6. 5 Data Protection Leverage conditional access Conditional access restricts access to corporate resources based on either user identity, or device health. It’s also about enforcing policies based on location and application data sensitivity. For example, accessing a Customer Relationship Management (CRM) application from a café requires multi-factor authentication because of both the location of the user and the sensitive data of the CRM sys- tem. Another example would be in email. A device must be compliant with poli- cies, like encryption and PIN, to access corporate email. Properly enforcing con- ditional access policies across a company can improve an overall security posture. What are your first steps to getting a policy in place?   •  Define a mobile device access policy that works for your business. You can either require full management of the device or just management of critical applications like Outlook to access corporate email.   •  Leverage dynamic groups to give employees access to the applications they need based on their roles.   •  Enforce multi-factor authentication this adds a layer of protection by requiring users to authenticate themselves two ways. The first method may be the traditional user name and password combination. The second often involves a physical component that would be virtually impossible to duplicate. For example, swiping a card key and entering a PIN, logging into a website and using a one-time password, logging in via a VPN client with a digital certificate, or scanning a user’s fingerprint. Learn more: •  Azure Active Directory conditional access •  Conditional access overview •  Conditional access with Microsoft Intune •  Office 365 with Mircosoft Intune •  Windows 10
  • 7. 6 Data Protection To get started:     •  Ensure devices are fully encrypted in case they are lost or stolen.   •  Enable EDP in your enterprise environment, which will allow you to manage and regulate apps and data without making unnecessary changes. Mobile workplaces can greatly increase productivity and access to work-related resources, but they also increases the risk of accidental data leaks through apps and services like email, social media, and the cloud. Providing a safer environment for employees to work remotely is key to maintaining a more secure business while enabling mobile productivity. For example, an employee might send the latest engineering pictures from their personal email account, copy and paste information into social media, or save an in-progress report to their personal cloud storage. How can you allow personal devices, but without compromising the security of your data? Enterprise data protection (EDP) helps protect against potential data leakage to unauthorizedappsorlocationswithouttakingawayfromanemployee’sworkexperience. Increase enterprise data protection For more information, see: •  Windows 10 Enterprise Data   Protection •  BitLocker Overview •  Microsoft Intune
  • 8. 7 Data Protection Prevent data loss Start by reducing the likelihood of a leak:   •  Learn more about the data loss prevention (DLP) capabilities within your ecosystem to protect your data where it is stored, when it is moved, and when it is shared. For example, an email can be limited to distribution within an organization or carry a digital rights management qualification that restricts who can open it.   •  Extend DLP beyond email as well. Certain word processor, spreadsheets, and presentation programs also offer restricted access options that pre- vent unauthorized users from opening files. Sharing documents through email and other online tools is an important pro- ductivity tool for workers, but to err is human. Employees can easily send in- formation to the wrong recipient, or attach the wrong document, inadvertently sharing access to sensitive data. Security professionals must understand the risks and benefits of data sharing and develop appropriate plans to minimize data loss to keep greater security. That said, how do you allow employees to share files in email without endangering your sensitive information? For more information, see: •  Office 365 Data Loss Prevention (DLP) •  Microsoft Office 365
  • 9. 8 Data Protection Enable secured collaboration Offer a flexible, easy-to-use, secured solution that meets their needs.   •  Establish secured tools for sharing information, and ensure the right workers have access. This includes a secured document sharing solu- tion, such as a SharePoint, restricted-access network share, or cloud- based solution.   •  Require a digital rights management or other secured email solution to be used when sending sensitive materials through email.   •  Provide easy and secured information-sharing workflow to enable both internal and external collaboration When it comes to sharing information, convenience often trumps security, which makes for a security professionals living nightmare. Workers can get creative with how they share information, putting your data in jeopardy and your company at risk of losing critical data. How do you encourage workers to collaborate while minimizing risks of compromised information? Learn more: •  Azure Rights Management •  Sharing protected files •  Sending encrypted emails •  Mircosoft Office 365 •  SharePoint •  Microsoft Azure
  • 10. Malware infections can often be traced back to user error. Phishing and spoof- ing schemes have become extremely sophisticated, tricking users with fake emails from trusted brands, luring them in with fake news stories, and convincing them to download innocuous-seeming apps that contain hidden attacks. You can’t stop users from surfing the web, using social media or accessing personal email on their own devices. How can you help them do these everyday tasks more safely? Education is your first line of defense.   •  Ask employees to read basic guidance and/or complete training that details common methods of malware attack.   •  Teach users to double check URLs in email to make sure they seem rele- vant, accurate, and legitimate. And consider implementing email pro- tection solutions that can help prevent malware and phishing attempts from reaching employees’ inboxes.   •  Suggest that workers limit their app usage to those downloaded from a reputable source. 9 Data Protection Reduce malware exposure Learn more: •  Windows 10 •  Windows Defender •  Windows Device Guard •  Mircosoft Office 365
  • 11. © 2016 Microsoft Corporation. All rights reserved. This document is for informational purposes only. Microsoft makes no warranties, express or implied, with respect to the information presented here. Allowing workers to be mobile does not have to mean endangering your data’s security. With proper planning, the right tools, and education, you can give your employees the freedom to work anywhere, anytime while minimizing risk. Learn more about cybersecurity Focusing on these 7 areas and stand to improve your organization’s security