How often last year did you hear about the impact of GDPR and the impending huge fines for any data breach?
GDPR reminders were everywhere on the countdown to the implementation date. Thereafter, everything went quiet.
However, it hasn’t gone away. But when was the last time you discussed it? Or is it another case of “it’ll never happen to me”? GDPR should have become a standing item on the management meeting agenda in every business.
Our role with data means we have an obligation to help businesses understand the importance of data management, provide the tools to support and make it as easy and effective as possible.
“Data is the new crown jewels of every business today.”
GDPR is too often seen as a tick box exercise, Step 1: Ensure you audit your data and document what has happened in the event of a breach, aiming to demonstrate you did at least try to do something to protect your data. Unfortunately, without further steps, this is a reactive measure and is too little too late.
Add this onto an ever-increasing number of security threats facing businesses and you have a huge risk on hand. Which affects businesses of all sizes, not only major corporations like many believe.
So, what to do to reach Step 2?
Major vendors are constantly releasing software and updates to improve security and functionality of protecting your data, but this can be a mine field of options and seem overwhelming to implement on an individual scale.
For most businesses, Microsoft remains as the main software provider in use, and increasingly businesses Office365 is the de-facto standard of everyday use.
For those non-IT orientated businesses, here are some benefits of using each type of data protection product:
Device and Application Management with Microsoft 365
A tool to protect and secure an organisation’s resources and data, providing all the necessary features in one environment in order to keep data safe.
Whilst Office365 alone comes with some options to manage and protect your data. If devices are lost or stolen, we can wipe mobile devices with Exchange Online, create content policy rules and Data Loss Prevention policies in the Security and Compliance, but we can’t manage the device itself.
Mobile device management
With Microsoft 365 you get Microsoft Intune included to manage your mobile devices. Intune allows you to control multiple types of devices and business apps used on each. Device policies and application policies (Intune Application Protection Policy (APP)) may also be set to secure devices in a way that works for your business.
Using APP, you don’t need to control the device itself. You can simple apply the policy to the application, for example Outlook. This means that when Outlook is usedit may require a pin code to access any corporate data, check that the device is not jail broken, or prevent copies of corporate data being sent to other apps such as personal mail.
Furthermore, the Selective Wipe is a welcome option when your users are working from their own devices (BYOD). Allowing you to remove the managed apps and data while keeping the personal data intact.
Managing Windows devices
It is not only mobile devices that can be managed with Microsoft 365, you also manage and even deploy your Windows 10 devices. Don’t expect a full System Centre Configuration Manager replacement – you can’t install third party apps with it. But what you can haveis Windows 10, and make sure the required Office applications are installed and kept up to date.
Why stop there, you can also configure your Windows Defender, update management and firewall policies with Microsoft 365 if you don’t have a separate third-party endpoint management solution in place.
Advanced Security Features
Keeping your data safe is one part managing your devices and on the other hand, protecting your actual data. Microsoft 365 gives access to multiple tools to help protect data.
Azure Information Protection is one of these tools, designed to protect your data. Based on classifications and protection information,Azure will protect your data no matter where it’s stored. Pretty much in the same way as you can do with most PDF files. You can prevent printing, sharing, editing or copying of those files.
Other features included in Microsoft 365 are Windows Hello, Device Guard and Credential Guard. These features are aimed to strengthen the security of your devices by using virtualization-based security features to isolate your secrets and configurable code integrity policies to protect your devices against unwanted apps or code.
All the options above deal with how you can protect your data using software. These can be either configured to match your existing policies, or as a basis to create them.
People matter when it comes to security
There is however one rather large area missing here, staff. After data, your staff are undoubtedly the most important asset in the business, and it is imperative that the whole team are educated to understand the great importance of information and data management.
Unfortunately, a quick chat at a meeting, or a poster on the wall in the staff room is enough any more. There needs to be a planned approach to schedule regular training, and updates to ensure every employee clearly understands their personal responsibility when dealing with company information daily.
One of the options for such scheduling is a product called knowbe4. This is managed approach to training and simulation of threats to staff to keep everyone on their toes. It allows small, bite size training to be delivered directly to desktops, simultaneously recording how well the staff member completes the training. Training can be followed by simulating a threat or an attack to a user, ensuring they adhere to regulations and avoid clicking on a suspicious link or agree to send confidential information in an email for example. Reports can then be easily analysed to know the effectiveness of the training and attacks.
Like all areas of technology, change happens at an incredibly fast pace and it is harder for small and medium-sized businesses who are not technology experts to keep up with this pace. Which is why it is imperative to create a trusted partner relationship with a managed IT provider who can guide you through the pitfalls of information management and ensure you have the best practices in place to protect your data and business.