Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1259810%22%20slang%3D%22en-US%22%3EProtecting%20SMB%20data%20with%20Microsoft%20365%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1259810%22%20slang%3D%22en-US%22%3E%3CP%3EAccording%20to%20an%20internal%20survey%2C%20over%2080%25%20of%20SMBs%20collect%20Personally%20Identifiable%20Information%20(PII)%20and%20over%2030%25%20collect%20Social%20Security%20Numbers%20(SSNs).%20Given%20the%20amount%20of%20sensitive%20information%20being%20processed%2C%20it%20becomes%20imperative%20for%20SMBs%20to%20have%20IT%20processes%20in%20place%20to%20protect%20sensitive%20data.%20That%E2%80%99s%20where%20Microsoft%20365%20Business%20can%20help.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20365%20Business%20is%20a%20comprehensive%20suite%20of%20enterprise%20grade%20security%20tools%20curated%20specifically%20for%20SMBs%20with%20less%20than%20300%20employees.%20It%20provides%20a%20layered%20approach%20to%20protecting%20sensitive%20data%20that%20spans%20Identity%2C%20Device%2C%20Email%20and%20Documents.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EProviding%20a%20layered%20approach%20to%20protecting%20data.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESince%20data%20traverses%20across%20devices%2C%20applications%20and%20documents%2C%20it%20becomes%20difficult%20for%20a%20single%20point%20solution%20to%20protect%20it.%20The%20security%20features%20in%20Microsoft%20365%20Business%20protect%20your%20data%20across%20Identity%2C%20Device%2C%20Application%20and%20Documents%20%E2%80%93%20giving%20you%20a%20robust%20set%20of%20protections%20that%20spans%20various%20IT%20layers%20while%20also%20providing%20your%20users%20a%20seamless%20experience.%20Let%E2%80%99s%20show%20you%20how%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EProtecting%20Identity%3A%3C%2FSTRONG%3E%20Identity%20policies%20are%20key%20to%20determining%20who%20gets%20to%20access%20to%20sensitive%20data.%20With%20features%20like%20Conditional%20Access%20%26amp%3B%20MFA%2C%20you%20have%20the%20ability%20to%20define%20granular%20access%20policies%20to%20control%20who%20accesses%20your%20data.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EConditional%20Access%3A%3C%2FSTRONG%3E%20This%20feature%20helps%20you%20control%20access%20on%20the%20basis%20of%20location%2C%20app%2C%20device%20state%20and%20user%20state.%20In%20case%20a%20user%20is%20using%20an%20app%20or%20a%20device%20that%20is%20not%20company%20authorized%2C%20you%20can%20use%20conditional%20access%20feature%20to%20restrict%20access%20in%20these%20cases.%20For%20Example%2C%20you%20can%20restrict%20access%20to%20corporate%20data%20from%20unmanaged%20home%20computers.%20CA%20is%20extremely%20effective%20in%20sage%20guarding%20access%20based%20multiple%20criteria%20rather%20than%20simply%20relying%20on%20username%20and%20password.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EMFA%3A%3C%2FSTRONG%3E%20If%20you%20are%20concerned%20that%20hackers%20can%20gain%20access%20to%20your%20business%20data%20by%20simply%20figuring%20out%20your%20username%20and%20password%2C%20then%20Multi%20Factor%20Authentication%20(MFA)%20adds%20the%20crucial%20second%20layer%20of%20security%20to%20keep%20your%20business%20data%20secure.%20By%20enabling%20MFA%2C%20users%20can%20gain%20access%20by%20putting%20in%20a%20code%20sent%20to%20them%20via%20text%20or%20phone%20call%20along%20with%20their%20username%2Fpassword.%20By%20enabling%20MFA%2C%20you%20can%20ensure%20that%20malicious%20actors%20will%20not%20gain%20access%20to%20your%20system%20even%20if%20they%20somehow%20manage%20to%20get%20hold%20of%20a%20user's%20username%20and%20password.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EProtecting%20Email%3A%3C%2FSTRONG%3E%20Since%20email%20is%20the%20key%20gateway%20to%20business%20data%2C%20it%20becomes%20a%20strategic%20imperative%20to%20protect%20your%20sensitive%20information%20from%20being%20shared%20externally.%20Preservation%20of%20your%20business%20data%20is%20also%20important%20from%20a%20business%20continuity%20standpoint.%20Microsoft%20365%20Business%20has%20features%20like%20Data%20Loss%20Prevention%2C%20Exchange%20Online%20Archiving%20%26amp%3B%20Office%20365%20Information%20Protection%20capabilities.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EData%20Loss%20Prevention%3A%3C%2FSTRONG%3E%20Small%20businesses%20deal%20with%20a%20variety%20of%20sensitive%20information%20like%20Customer%20credit%20card%20numbers%2C%20SSN%2C%20DOB%20or%20even%20intellectual%20property%20that%20is%20core%20to%20the%20running%20of%20the%20business.%20Keeping%20this%20information%20safe%20can%20be%20a%20challenge%20because%20expecting%20employees%20to%20manually%20check%20every%20email%20or%20document%20shared%20for%20sensitive%20information%20can%20be%20hard.%20The%20Data%20Loss%20Prevention%20policies%20in%20M365B%20help%20businesses%20easily%20identify%2C%20monitor%2C%20and%20protect%20sensitive%20information%20through%20deep%20content%20analysis%3CUL%3E%0A%3CLI%3EIncludes%20pre-configured%20templates%20that%20can%20help%20businesses%20detect%20specific%20types%20of%20sensitive%20information%20being%20communicated%20%26nbsp%3Bsuch%20as%20Credit%20Card%20Numbers%2C%20SSN%2C%20Date%20of%20Birth%20or%20even%20locale-specific%20personally%20identifiable%20information%20(PII).%3C%2FLI%3E%0A%3CLI%3EIt%20also%20provides%20policy%20tips%2C%20which%20can%20help%20educate%20and%20prevent%20end%20users%20from%20accidental%20sharing%20of%20sensitive%20info%20by%20displaying%20a%20policy%20tip%20in%20Outlook.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EExchange%20Online%20Archiving%3A%3C%2FSTRONG%3E%20Small%20businesses%20have%20a%20need%20to%20keep%20all%20company%20data%20safe%2C%20preserved%20in%20the%20event%20of%20lost%2F%20stolen%20devices%2C%20infrastructure%20failure%20or%20to%20meet%20litigation%20and%20compliance%20obligations.%20Exchange%20online%20archiving%20safeguards%20data%20by%20allowing%20for%20messages%20to%20be%20easily%20archived%20that%20is%20accessible%20anytime%2Fanywhere.%20It%20preserves%20user%20information%20including%20deleted%20items%20for%20discovery%20or%20restoration%20at%20a%20later%20date%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EInformation%20Protection%3C%2FSTRONG%3E%20%3CSTRONG%3EPolicies%20for%20Email%3A%3C%2FSTRONG%3E%20%26nbsp%3BA%20challenge%20that%20Small%20businesses%20have%20is%20controlling%20%26amp%3B%20managing%20who%20has%20access%20to%20the%20company%E2%80%99s%20sensitive%20email.%20Enabling%20these%20controls%20without%20hindering%20productivity%20is%20also%20hard.%20Azure%20Information%20Protection%20Policies%20in%20M365B%20provides%20capabilities%20to%20control%20%26amp%3B%20manage%20how%20information%20is%20accessed%20and%20making%20sure%20that%20only%20the%20right%20folks%20have%20access%20to%20the%20right%20data.%3CUL%3E%0A%3CLI%3EHelps%20you%20communicate%20and%20collaborate%20securely%20while%20controlling%20access%20to%20sensitive%20information%20with%20email%20controls%20like%20%E2%80%9CDo%20No%20Forward%E2%80%9D%3B%20%E2%80%9CDo%20not%20copy%E2%80%9D%20etc%3C%2FLI%3E%0A%3CLI%3EHelps%20you%20classify%20sensitive%20information%20like%20%E2%80%9CConfidential%E2%80%9D%20and%20enable%20specific%20restriction%20for%20how%20classified%20can%20be%20shared%20outside%20and%20inside%20the%20business%3C%2FLI%3E%0A%3CLI%3EEnables%20you%20to%20securely%20share%20sensitive%20content%20with%20authorized%20external%20parties%20through%20easy%20to%20enable%20encryption%20controls.%20For%20Example%3A%20A%20healthcare%20practice%20that%20needs%20to%20share%20an%20email%20containing%20PHI%20with%20their%20patients.%20A%20fully%20encrypted%20email%20is%20sent%20to%20the%20patient%20and%20they%20can%20then%20access%20it%20after%20authenticating%20with%20their%20Microsoft%20or%20Gmail%20account%20or%20through%20a%20one-time%20generated%20passcode%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EProtecting%20data%20on%20mobile%20devices%3A%3C%2FSTRONG%3E%20Since%20most%20users%20use%20their%20personal%20mobile%20devices%20to%20access%20corporate%20data%20like%20email%20and%20documents%2C%20it%20becomes%20imperative%20to%20protect%20corporate%20data%20on%20unmanaged%20personal%20mobile%20devices.%20Intune%E2%80%99s%20Mobile%20Application%20Management%20(MAM)%20feature%20helps%20you%20do%20that.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EIntune%20Mobile%20Application%20Management%20(MAM)%3A%3C%2FSTRONG%3E%20Through%20this%2C%20you%20are%20able%20to%20restrict%20users%20from%20Copy%2C%20Pasting%20or%20saving%20corporate%20data%20%26amp%3B%20documents%20from%20their%20Microsoft%20365%20Apps%20to%20their%20personal%20apps.%20For%20Example%2C%20when%20this%20feature%20is%20enabled%2C%20a%20user%20is%20unable%20to%20copy%2Fpaste%20information%20from%20an%20email%20into%20their%20iOS%20Notes%20app.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EProtecting%20Documents%3A%3C%2FSTRONG%3E%20Since%20a%20majority%20of%20our%20productivity%20occurs%20in%20Office%20documents%2C%20we%20now%20have%20the%20ability%20to%20protect%20sensitive%20documents%20through%20Azure%20Information%20Protection%20capabilities%20in%20Microsoft%20365%20Business.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EAzure%20Information%20Protection%3A%3C%2FSTRONG%3E%26nbsp%3BGives%20you%20the%20ability%20to%20classify%20documents%20according%20to%20various%20degrees%20of%20sensitivity%20like%20%E2%80%98Highly%20Confidential%E2%80%99%2C%20%E2%80%98General%E2%80%99%20or%20%E2%80%98Public%E2%80%99.%20You%20can%20then%20enable%20sharing%20restrictions%20based%20on%20the%20classification%20labels.%20For%20Example%20%E2%80%93%20A%20document%20classified%20%E2%80%98Highly%20Confidential%E2%80%99%20can%20only%20be%20accessed%20a%20restricted%20group%20of%20pre-determined%20individuals.%20So%20even%20if%20a%20highly%20classified%20document%20is%20forwarded%20outside%20the%20organization%20or%20widely%20inside%20the%20organization%2C%20it%20can%20only%20be%20accessed%20by%20the%20chosen%20few%20who%20have%20pre-determined%20access.%20In%20this%20way%20you%20can%20%E2%80%98Lock%E2%80%99%20documents%20and%20share%20them%20securely.%20Even%20if%20this%20document%20landed%20in%20the%20wrong%20hands%2C%20they%20won%E2%80%99t%20be%20able%20to%20access%20it%20unless%20they%20had%20permission%20to%20do%20so.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20hope%20that%20through%20this%20blogpost%2C%20you%20have%20confidence%20that%20Microsoft%20365%20Business%20has%20robust%20features%20to%20help%20protect%20your%20sensitive%20data%20across%20various%20IT%20layers.%26nbsp%3B%3CSPAN%3EFor%20more%20details%20on%20Microsoft%20365%20Business%2C%20please%20visit%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fm365b%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eaka.ms%2Fm365b%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1259810%22%20slang%3D%22en-US%22%3E%3CP%3EAccording%20to%20an%20internal%20survey%2C%20over%2080%25%20of%20SMBs%20collect%20Personally%20Identifiable%20Information%20(PII)%20and%20over%2030%25%20collect%20Social%20Security%20Numbers%20(SSNs).%20Given%20the%20imperative%20to%20protect%20sensitive%20data%2C%20that%E2%80%99s%20where%20Microsoft%20365%20Business%20can%20help.%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

According to an internal survey, over 80% of SMBs collect Personally Identifiable Information (PII) and over 30% collect Social Security Numbers (SSNs). Given the amount of sensitive information being processed, it becomes imperative for SMBs to have IT processes in place to protect sensitive data. That’s where Microsoft 365 Business can help.

 

Microsoft 365 Business is a comprehensive suite of enterprise grade security tools curated specifically for SMBs with less than 300 employees. It provides a layered approach to protecting sensitive data that spans Identity, Device, Email and Documents.

 

Providing a layered approach to protecting data.

Since data traverses across devices, applications and documents, it becomes difficult for a single point solution to protect it. The security features in Microsoft 365 Business protect your data across Identity, Device, Application and Documents – giving you a robust set of protections that spans various IT layers while also providing your users a seamless experience. Let’s show you how:

 

Protecting Identity: Identity policies are key to determining who gets to access to sensitive data. With features like Conditional Access & MFA, you have the ability to define granular access policies to control who accesses your data.

  • Conditional Access: This feature helps you control access on the basis of location, app, device state and user state. In case a user is using an app or a device that is not company authorized, you can use conditional access feature to restrict access in these cases. For Example, you can restrict access to corporate data from unmanaged home computers. CA is extremely effective in sage guarding access based multiple criteria rather than simply relying on username and password.

  • MFA: If you are concerned that hackers can gain access to your business data by simply figuring out your username and password, then Multi Factor Authentication (MFA) adds the crucial second layer of security to keep your business data secure. By enabling MFA, users can gain access by putting in a code sent to them via text or phone call along with their username/password. By enabling MFA, you can ensure that malicious actors will not gain access to your system even if they somehow manage to get hold of a user's username and password.

Protecting Email: Since email is the key gateway to business data, it becomes a strategic imperative to protect your sensitive information from being shared externally. Preservation of your business data is also important from a business continuity standpoint. Microsoft 365 Business has features like Data Loss Prevention, Exchange Online Archiving & Office 365 Information Protection capabilities.

  • Data Loss Prevention: Small businesses deal with a variety of sensitive information like Customer credit card numbers, SSN, DOB or even intellectual property that is core to the running of the business. Keeping this information safe can be a challenge because expecting employees to manually check every email or document shared for sensitive information can be hard. The Data Loss Prevention policies in M365B help businesses easily identify, monitor, and protect sensitive information through deep content analysis
    • Includes pre-configured templates that can help businesses detect specific types of sensitive information being communicated  such as Credit Card Numbers, SSN, Date of Birth or even locale-specific personally identifiable information (PII).
    • It also provides policy tips, which can help educate and prevent end users from accidental sharing of sensitive info by displaying a policy tip in Outlook.

  • Exchange Online Archiving: Small businesses have a need to keep all company data safe, preserved in the event of lost/ stolen devices, infrastructure failure or to meet litigation and compliance obligations. Exchange online archiving safeguards data by allowing for messages to be easily archived that is accessible anytime/anywhere. It preserves user information including deleted items for discovery or restoration at a later date

  • Information Protection Policies for Email:  A challenge that Small businesses have is controlling & managing who has access to the company’s sensitive email. Enabling these controls without hindering productivity is also hard. Azure Information Protection Policies in M365B provides capabilities to control & manage how information is accessed and making sure that only the right folks have access to the right data.
    • Helps you communicate and collaborate securely while controlling access to sensitive information with email controls like “Do No Forward”; “Do not copy” etc
    • Helps you classify sensitive information like “Confidential” and enable specific restriction for how classified can be shared outside and inside the business
    • Enables you to securely share sensitive content with authorized external parties through easy to enable encryption controls. For Example: A healthcare practice that needs to share an email containing PHI with their patients. A fully encrypted email is sent to the patient and they can then access it after authenticating with their Microsoft or Gmail account or through a one-time generated passcode

Protecting data on mobile devices: Since most users use their personal mobile devices to access corporate data like email and documents, it becomes imperative to protect corporate data on unmanaged personal mobile devices. Intune’s Mobile Application Management (MAM) feature helps you do that.

  • Intune Mobile Application Management (MAM): Through this, you are able to restrict users from Copy, Pasting or saving corporate data & documents from their Microsoft 365 Apps to their personal apps. For Example, when this feature is enabled, a user is unable to copy/paste information from an email into their iOS Notes app.

Protecting Documents: Since a majority of our productivity occurs in Office documents, we now have the ability to protect sensitive documents through Azure Information Protection capabilities in Microsoft 365 Business.

  • Azure Information Protection: Gives you the ability to classify documents according to various degrees of sensitivity like ‘Highly Confidential’, ‘General’ or ‘Public’. You can then enable sharing restrictions based on the classification labels. For Example – A document classified ‘Highly Confidential’ can only be accessed a restricted group of pre-determined individuals. So even if a highly classified document is forwarded outside the organization or widely inside the organization, it can only be accessed by the chosen few who have pre-determined access. In this way you can ‘Lock’ documents and share them securely. Even if this document landed in the wrong hands, they won’t be able to access it unless they had permission to do so.

 

We hope that through this blogpost, you have confidence that Microsoft 365 Business has robust features to help protect your sensitive data across various IT layers. For more details on Microsoft 365 Business, please visit aka.ms/m365b