When you willingly share data, how do you stop it leaking?

by | Jun 16, 2021 | Security

Data Leak Protection (DLP)

is the name of several policies in Office 365, setting up what data can, and can’t be, shared and with whom.

Imagine being able to automatically identify private information like passport numbers, Health IDs or bank account details and make sure that those are only being shared with people that are authorised to see them.

The good news is that you can do this with 365, provided you turn on the policies and set them up correctly, and monitor when data is shared.

Under the NZ Privacy Act, we’re all expected to take care of personal data entrusted to us and to make sure it’s only used for the purpose for which is being obtained.

With Office 365, there’s no excuse for that to be breached provided that we understand what data should be kept, what might be kept incorrectly, and how its being shared. With this we can set up rules to monitor your Office 365 system and report on how records are shared.

We include a basic set up of DLP in our KARE for Security S2 plan to get you started.

 

How to create passwords that hackers hate

How to create passwords that hackers hate

A guide to making your online accounts more secure and less boring Have you ever used your birthday, your pet's name, or the word "password" as your password? If so, you're not alone. According to a study by NordPass, these are some of the most common and worst...

Securing your Mac

Securing your Mac

It does not seem that long ago I would hear Mac users say “I don’t need Anti-Virus”, or "Mac’s are not affected". To a certain extent they were right. Apple's use of tightly controlled application approvals reduced the surface area for attack. Mac users did not enjoy...

Service Alert

Service Alert

We're experiencing an extra heavy call volume today and it's proving challenging to respond as quickly as normal.  It's been brought on by an apparent Microsoft change resulting in unexpected Windows 11 upgrades.  These are happening to a number of devices even if...

Penetration Testing

Penetration Testing

Penetration testing is important for businesses because it helps them identify and fix security vulnerabilities before they can be exploited by attackers. It can be a significant job as it needs a team of security professionals to simulate a real-world cyberattack....

What would you do?

What would you do?

Imagine – you are busily going about your day when suddenly your meeting is interrupted.  “No one can access their files!!!” or “We just accidently paid $50,000 to a fraudulent account and we can’t get it reversed!!!” or something similar. What would you do? Where...