Category: Security & Compliance

Things to Know Before Your Organization Opens Up to Use Private Channels in Microsoft Teams

Let me start by saying that I love new functionality that creates opportunities and solves concrete needs, BUT: Having a holistic perspective when managing your organization’s productivity platform is a puzzle with many pieces. In my opinion, there are mainly three pieces you need to fit together as soon as possible if you are to succeed in introducing new functionality into an organization. These pieces are: Continue reading “Things to Know Before Your Organization Opens Up to Use Private Channels in Microsoft Teams”

Do you use Private chats instead of Channel Conversations? Think about it and do it right.

Private chats in Microsoft Teams is super easy and intuitive to use but are you sure you are using it for the right purpose? When you start a Private Chat and share files in this chat, the files are saved on your OneDrive for Business folder and they are only available to the participants in the chat conversation. Are you sure it is so smart to save these files to your OneDrive? Continue reading “Do you use Private chats instead of Channel Conversations? Think about it and do it right.”

Helpful tips and useful sources of information about Office 365 Governance

Are you in the situation that you feel you do not have sufficient control of Office 365 and its applications? Does it feel a bit overwhelming and you don’t know where to start looking for how to take control and, not least, what to take control of? It may be time to take the first steps when it comes to Office 365 Governance? Continue reading “Helpful tips and useful sources of information about Office 365 Governance”

Some basic steps to protect your organization’s devices, users and information

An important part of Governance is to have good documentation that shows how you protect your devices, users and information. But before you can document this in your governance plans, you must of course have made some assessments and implemented necessary measures. Continue reading “Some basic steps to protect your organization’s devices, users and information”

Office 365 Retention, Disposal and archiving. How hard can it be?

If you are using Office 365 and want to define rules for retention, disposal and archiving, it is not something that is particularly difficult to activate (It is rare that features are difficult to activate…). Continue reading “Office 365 Retention, Disposal and archiving. How hard can it be?”

Don’t let your cloud-based platform be “The Ugly Duckling”.

How do you think about buying a new or upgrading your house?

Should you build new or should you buy a used one? Whichever option you choose, the most important thing is that the new house meets the needs and requirements you have. It should be reasonably maintenance free. The roof must be tight. You want a modern kitchen and a laundry room where you know that the appliances are working. The home electronics and automation you want is something you carefully select before you mount it.

You want everything to work and it should be safe. After all, it’s your home it’s all about… Continue reading “Don’t let your cloud-based platform be “The Ugly Duckling”.”

Awareness does not hurt but not bothering will cause pain sooner or later.

You brush your teeth every day to avoid getting toothache (and thus expensive and painful dental visits) but do you care for your information and your devices at work just as well to avoid future pain and costs?

Can you be sure that your company has taken all necessary steps to protect the information you store and work with? Sometimes the answer is YES but often it is difficult to be absolutely sure of it. Whether it is expressed formally or informally, you have a personal responsibility for, and interest in helping to secure your own- and your company’s information. You as an individual can- and should contribute to information security by using the security mechanisms / controls offered by Office 365 and Windows 10. It may sound complicated but You do not need to be an information security expert to help keeping things (information and/or devices) that are important safe and protected.

It is usually the users who are the weakest link. Make sure you become a strong link
It is usually the users who are the weakest link. Make sure you become a strong link!

To get an overview of what you can do to stay secure and private at work you should download the infographic “Stay safe and secure“. Here You will get some great and easy-to-use tips of how You can protect your files, manage file sharing, secure your devices, scan for threats and also how to recover your OneDrive after ransomware, file corruption or accidental deletes and edits.

Have a safe working day!