An important part of Governance is to have good documentation that shows how you protect your devices, users and information. But before you can document this in your governance plans, you must of course have made some assessments and implemented necessary measures. Continue reading “Some basic steps to protect your organization’s devices, users and information”
If you are using Office 365 and want to define rules for retention, disposal and archiving, it is not something that is particularly difficult to activate (It is rare that features are difficult to activate…). Continue reading “Office 365 Retention, Disposal and archiving. How hard can it be?”
How do you think about buying a new or upgrading your house?
Should you build new or should you buy a used one? Whichever option you choose, the most important thing is that the new house meets the needs and requirements you have. It should be reasonably maintenance free. The roof must be tight. You want a modern kitchen and a laundry room where you know that the appliances are working. The home electronics and automation you want is something you carefully select before you mount it.
You want everything to work and it should be safe. After all, it’s your home it’s all about… Continue reading “Don’t let your cloud-based platform be “The Ugly Duckling”.”
You brush your teeth every day to avoid getting toothache (and thus expensive and painful dental visits) but do you care for your information and your devices at work just as well to avoid future pain and costs?
Can you be sure that your company has taken all necessary steps to protect the information you store and work with? Sometimes the answer is YES but often it is difficult to be absolutely sure of it. Whether it is expressed formally or informally, you have a personal responsibility for, and interest in helping to secure your own- and your company’s information. You as an individual can- and should contribute to information security by using the security mechanisms / controls offered by Office 365 and Windows 10. It may sound complicated but You do not need to be an information security expert to help keeping things (information and/or devices) that are important safe and protected.
To get an overview of what you can do to stay secure and private at work you should download the infographic “Stay safe and secure“. Here You will get some great and easy-to-use tips of how You can protect your files, manage file sharing, secure your devices, scan for threats and also how to recover your OneDrive after ransomware, file corruption or accidental deletes and edits.
Have a safe working day!
Many of us are like squirrels. We collect and store more content than we can/should consume.
After some time the content of our Office 365 Tenant becomes a “Content Flea Market”. One of the challenges with a flea market is that it is difficult to get an overview of what is valuable and what is worthless.
What if we could have a function that cleans away old unimportant content and that also ensures that we keep current and important content as long as we need to keep it?
Surely You have a whole lot of various content stored in Your Office 365 Tenant. Probably some of this content should not be deleted and most likely You would benefit from deleting a whole lot of other content that does not qualify as useful, valid or current.
In Your Office 365 Environment (Exchange, OneDrive and SharePoint)
- Do you have a requirement to retain content for a minimum period of time?
- Do You want to permanently delete old content that you are no longer required to keep?
- Do You want to ensure that your users only work with content that is valid, current and relevant to them?
- Do You want to be able to select where the policy should be applied?
Here is an overview of retention policies in Office 365 works and how to do implement it!