Microsoft Information Protection Solutions in Microsoft 365 protect data throughout its Lifecycle

Protect Your Business Against Malware

What is Malware?

 

Malware, or malicious software, are programs or codes that are harmful to your systems. There are different kinds of malware, such as viruses, worms, spyware, ransomware, trojans, and botnets, all destructive in different ways: some are capable of stealing or deleting your data, some spy on your computer activity without your permission, while others can disable your systems or lock down files, making them inaccessible. One thing they all have in common : they are bad news for you and your business. 

 

According to the 2017 Microsoft Security Intelligence Report, the Philippines is the 8th most vulnerable to malware in the world, so we have even more reason to worry. Malware has become so commonplace and continues to become more sophisticated, that most businesses today have malware without them realizing it. In fact, it takes about 146 days before an attacker is detected after they penetrate your network. 

How Microsoft Helps

Malware presents a very real risk for businesses of all sizes. Most of us today have anti-virus software installed on our devices. However, with new malware constantly being released, not even an anti-virus can recognize and defend against all of them. Microsoft has solutions designed to protect your users and prevent malware from infecting your systems, and for remediating the threats:

First you need to know what counts as sensitive data and where it resides. 

“Sensitive data” for your organization will be determined by things like your industry (e.g., healthcare, financial services), governmental regulations and policies, as well as your organization’s internal policies.

How Microsoft 365 can help protect you:

  • Search for sensitive documents within items such as email, documents, and instant messaging conversations and even cloud storage and 3rd-party SaaS apps
  • Automatically detect common sensitive information types, such as financial information, healthcare related information, PII and others or create your own custom sensitive information types

You need to have a way of classifying data according to how sensitive it is in order to assign security levels and policies accordingly. Applying sensitivity labels (eg public, internal only, confidential) can help your organization monitor the transmission and usage of documents that are potentially sensitive. 

How Microsoft 365 can help protect you:

  • Use sensitivity labels to enforce protection settings

 

These days, simply labeling files as confidential will not be enough to prevent unauthorized access or sharing of those files. Even employees with the best of intentions may forget to secure confidential files; in fact 58% of enterprise users admit to having sent sensitive info to the wrong person at some point. 

Also, while sensitive data may initially be created on an individual device, it is frequently shared or stored in other locations, like cloud-based storage, on-premises file shares, or email. You need the ability to protect sensitive information wherever it lives or travels.

How Microsoft 365 can help protect you:

  • Search for sensitive documents within items such as email, documents, and instant messaging conversations and even cloud storage and 3rd-party SaaS apps
  • Automatically detect common sensitive information types, such as financial information, healthcare related information, PII and others or create your own custom sensitive information types
  • Block the sharing of a file that is detected to have sensitive information, such as credit card information or social security numbers.
  • Prevent sensitive information from being copied onto 3rd-party apps like Twitter or Gmail

There are two key activities in the “Monitor” phase of the information protection lifecycle:

First, you need to gain visibility into all the events impacting your environment. You can review reports and alerts on policy violations, sensitive document access and sharing.  Or you can look at anomalous activity such as a large download of data from a specific cloud app within a certain period of time. 

Second, you need to take action or remediate, based on the event. For example, if you discover anomalous activity or inappropriate sharing, you can immediately revoke app access or quarantine a file or a user.

How Microsoft 365 can help protect you:

  • Aggregate label insights so that you can see how sensitivity and retention labels are being used for both Office 365 and non-Office 365 data.
  • Access reports on data governance, compliance and potential threats, as well as audit logs

Start a conversation.

 

Start a conversation.