3 Retention benefits beyond compliance
Data retention is an essential part of every modern information protection strategy. Classifying sensitive data types, implementing policies to determine their handling, and deploying technology to enforce those policies is a process we all have to go through. Contrary to popular
Get a handle on privacy with Microsoft Priva
As a business taking part in the modern digital economy, you’re inevitably going to have to handle personal information at some point or another. Protecting this data – and the privacy of the data subject – is a substantial responsibility
6 Critical success factors for deploying Zero Trust
Our first article in this series introduced the “what” and “why” of Zero Trust. Today, we’re turning our attention to the preliminary stages of “how to”. Transitioning to Zero Trust isn’t like flipping a switch. It takes some pretty extensive groundwork
Zero Trust Security – how close are we?
The concept of “Zero Trust” was first coined by University of Stirling doctoral candidate, Stephen Paul Marsh, in 1994. It was 16 years later that Forrester Research analyst, John Kindervag, used the term “Zero Trust Model” to describe a stricter
Getting security right during tenant-to-tenant migrations
No two tenants are ever identical in their deployment of features, functionality and settings. A big part of tenant-to-tenant migration is reconciling these security and governance differences to create a robust, secure and compliant tenant at the end of the day. While
Office 365 vs Mimecast, Proofpoint & Forcepoint
5 questions you should ask when choosing your threat protection solution Not too long ago, we wrote an article on why we believe Microsoft’s Advanced Threat Protection is rendering equivalent 3rd-party solutions for Office 365 users obsolete. This opinion raised some fascinating
Microsoft’s answer to threat protection
Office 365 Advanced Threat Protection spells trouble for 3rd party solutions Email is notorious for being one the most common sources of malware and ransomware, and protecting against these cyber threats is a critical concern for most organisations. In the past, the