This the fourth in a series of posts documenting our experiences and impressions with Azure Information Protection. I’m pleased to report that we made a ton of progress today! We took a break from writing the series because we ran into issues with the Security and Compliance console that stopped our progress. I will say […]

Read More

This is the third in a series of posts documenting our experiences and impressions with Azure Information Protection. Today we wanted to use Office 365 Data Loss Prevention (DLP) to map AIP classification labels applied within an external domain to labels defined within our domain. The use case for this is a customer or partner […]

Read More

This is the second in a series of posts documenting our experiences and impressions with Azure Information Protection. Here are a few things we learned today: The Policy setting “All documents and emails must have a label (applied automatically or by users)” should be disabled. When doing manual classification of emails and files, forcing users […]

Read More

This is the first installment of a 4-part series chronicling our efforts to configure and use Azure Information Protection (AIP) for sensitive data in our Office 365 tenancy. AIP Microsoft’s suite of advanced security capabilities for Office 365 (and, sometimes, legacy on-premises environments). The concept is simple: manually or automatically classify files and emails and […]

Read More

As a member of your Human Resources department, no doubt you already have a clear idea of the importance of the privacy of employees’ personal information. If scam artists can wreak havoc with a single voided check or credit card number, it’s not hard to imagine the harm they can do with the motherlode of […]

Read More

The exposure of sensitive data in documents can create serious problems. Some types of information, such as Tax File Numbers (or other national identification number) and credit card numbers, are inherently sensitive. They always need to be kept out of public documents, and any internal documents that hold them need protection. Regulations and contractual obligations […]

Read More

Digital transformation and how to listen to your data It is estimated that 80% of organisations are currently undertaking or planning some form of business or digital transformation, with the aim of increasing revenues, improving efficiency, managing risks and reducing costs. While these efforts can be absolute game-changers for businesses and many of the strategies […]

Read More

I was working as a Security Architect when the Director of Strategy and Architecture made the announcement that our latest strategy was to “Encrypt Everything”. This was a telecoms company with a distributed IT infrastructure, thousands of staff, and a huge number of networks. The volume of confidential documents created daily numbered in the thousands, […]

Read More

How to boil the ocean Large enterprises are beginning to understand the risks of not properly governing and securing unstructured data (files and emails). A typical large enterprise has over a billion files and no real visibility into what information they contain and who is accessing them. This condition creates increased risk and decreased efficiency […]

Read More