Page 286 - MS Office 365 for Dummies 3rd Ed (2019)
P. 286
And then it happened. Somewhere between the huge industry conference with all your company’s competitors and the big closing party, Johnny lost his phone. You freaked out, especially since you know Johnny’s phone had all kinds of confiden- tial, competitive data in it. Fortunately, some hotel personnel found the phone and Johnny got it back.
With mobile device management (MDM) in Office 365 and Intune, you never have to go through that stress again. With MDM, security policies are enforced on Bring Your Own Devices (BYODs) to ensure compliance with corporate policies. Your IT department can remotely wipe all the data on the device, lock it, and reset the password in the event of loss or theft.
You Don’t Want to Be the Next Hacking Victim
The last several years have been banner years for hacking. Just as you start think- ing this isn’t going to happen to your organization, you read about a ransomware attack on a Los Angeles hospital whose administrators had to shell out $17,000 to restore their computer network. So now, you start to panic.
You can relax. You can protect your data with Office 365 with built-in, integrated security and compliance services across applications and devices. Multi-factor authentication, data loss prevention, anti-spam, anti-virus, advanced threat pro- tection, and encryption are just the start of the story. Encryption in Office 365 comes in two layers: from the service level (Microsoft manages this) and from the part you, the customer, control.
On the service-level side, when your data is sitting or “at rest” in Office 365 data centers, they are encrypted so even in the unlikely event that a hacker gets access to the data, all the hacker sees will be garbled, unreadable text.
When your data is in transit, Office 365 applies a sophisticated data protection service to encrypt your file. You can specify the permissions for your email or documents to restrict what the recipients can do to the document. For example, you can apply a restriction that prevents a recipient from forwarding or printing an email. You can even revoke access to a document after it has left your mailbox.
There are a lot of Microsoft partners who can help you move your business to the cloud. Don’t hesitate to reach out to them — they’d be more than happy to assist you in your cloud journey.
270 PART7 ThePartofTens