The Enabling Technologies Blog


Chris Stegh / / Categories: Microsoft, Microsoft Ignite, Security

5 Key Security Takeaways From Microsoft Ignite

SecurityTakeaways-01.png

Security was mentioned or top of mind in most Microsoft Ignite sessions.  Here are the top 5 takeaways.

Secure your Office 365 and Azure admin accounts with MFA.

Even the speaker at the SharePoint security session urged this!  Enabling Technologies also suggests the admin identity be kept separate from the daily login account, which is more likely to be phished.

Passwords aren't working, so will newer models be more secure?

With 90% of attacks starting with a Phish/identity heist, there were customers in hallways chatting about using the smartphone as a second factor of authentication, and eliminating passwords altogether, with Microsoft Authenticator. Another convenience is to reduce login prompts for users, with the “Keep me signed in” capability of Azure AD, now in Public Preview.

 You're going to be breached, but sifting through logs to track a hack isn't scalable.

To detect and respond quickly, there's yet another product that leverages the Microsoft graph to parse logs to create 'incident reports,' combinations of risky events that on their own are benign, but in combination represent a likely attack.  The latest addition to the growing "Advanced Threat Protection" family is Azure ATP, now in Public Preview.

Starting a data classification policy to protect PII and intellectual property needn’t be a cripplingly daunting task.

With only 10% of corporate data on average being confidential, organizations should use labels to start tagging confidential data as a simple way to get started. Then later applying Azure information protection to encrypt and protect the data becomes easier. Also with Azure Information Protection Scanner, you will soon be able to scan file shares OneDrive in SharePoint to locate old data that hasn't been labeled or classified yet. Public Preview starts next month. 

Tools are emerging to help identify compliance requirements and how to use Microsoft's tools to meet those requirements.

If you are following ISO, SOC, etc. rules, then log in to Trust Center and under Compliance Guides, grab the Customer Security Considerations Workbook. It helps make practical recommendations to comply using MSFT products.

At Enabling Tehcnologies, we’ll help secure your cloud and on-premises users, data, and devices using Microsoft’s EMS, Azure, and Office 365 security tools.             

Subscribe to Email Updates

Refine by

To expand the list, please click on the double arrows.

 

Search by Category or Author: