Securing the End User

Securing the user is a priority for any organization serious about preventing a data breach. That’s because hacking a user is much easier than hacking a firewall.

Hackers can take a company’s data through phishing and spear fishing schemes for which users are often unaware. All of the big manufacturers are moving to address this issue.

Preventing transmission of sensitive data

Microsoft (and now Google) offer Data Loss Prevention for email and SharePoint – a service that monitors outgoing communication for sensitive data (social security, credit card numbers, etc.) and blocks their transmission.

Securing documents – regardless of where they are saved

Azure Rights Management confirms user rights to open a document, no matter where the document is stored; so if the bad guys (or former employees) get a hold of a file, they cannot open it without first authenticating.

Unifying and managing authentication

Microsoft Enterprise Mobility Suite unifies authentication with Active Directory Premium for hundreds of apps so that data stored in apps on the periphery of the IT Department’s control are still secure, and former employees can’t take the data with them.

These tools help users follow security best practices even if security isn’t top of mind.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s