{"id":151609,"date":"2018-06-21T16:45:26","date_gmt":"2018-06-21T15:45:26","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=151609"},"modified":"2018-06-22T17:46:21","modified_gmt":"2018-06-22T16:46:21","slug":"fa3-data-in-motion-how-to-protect-it-5-key-considerations","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en-ie\/technology-lifestyle-en-ie\/na\/fa3-data-in-motion-how-to-protect-it-5-key-considerations\/","title":{"rendered":"Data in motion &#8211; how to protect it \u2013 5 Key Considerations"},"content":{"rendered":"<p style=\"font-weight: 400\"><strong>Data in motion &#8211; how to protect it \u2013 5 Key Considerations\u00a0<\/strong><\/p>\n<p style=\"font-weight: 400\">Now, more than ever, it\u2019s critical to protect your data at the file level.<\/p>\n<p style=\"font-weight: 400\">Data is the most valuable asset you control. Losing intellectual property, a customer&#8217;s personally identifiable information (PII), financial information, and confidential memos can cause substantial damage. But it\u2019s not just malicious attacks you must worry about\u2014it&#8217;s crucial to prevent data from escaping during everyday operations.<\/p>\n<p style=\"font-weight: 400\">The nature of work itself is changing rapidly. Employees are no longer tethered to a single computer or device \u2013 they are often using multiple devices to get their work done. That means that information is being created and shared in a variety ways, across a variety of locations. This is all hugely impactful for increasing productivity and improving collaboration but it makes protecting our sensitive data much more challenging.<\/p>\n<p style=\"font-weight: 400\">The growth of cloud-based services means that companies are more and more likely to have sensitive data in a cloud environment, in addition to on devices or even on premise.\u00a0 Recent research shows:<\/p>\n<ul>\n<li>8 out of 10 employees admit to using non approved Saas apps\u00b9<\/li>\n<li>Data theft has more than doubled\u00b2<\/li>\n<li>88% of organisation feel they are losing control of data\u00b3<\/li>\n<li>$158 is the average cost of each lost or stolen file containing sensitive info 4<\/li>\n<li>1 in 5 mobile devices will be lost or stolen in their lifetime 5<\/li>\n<\/ul>\n<p style=\"font-weight: 400\">A typical network today is only secure in that you have control over your data inside your network boundaries. Once it leaves your network, beyond the firewall, you lose the ability to protect or track it.\u00a0\u00a0 In today\u2019s environment this is not enough. And your perimeter is very much dissolving.<\/p>\n<p style=\"font-weight: 400\"><strong>Protect your sensitive data at the file level\u00a0<\/strong><\/p>\n<p style=\"font-weight: 400\">Every day, data is traveling between users, devices, apps, and services outside of your control. Now, more than ever, it\u2019s important to protect your data in motion and at the file level. In our environment today you need to be able to classify and add security directly to your sensitive data so that it&#8217;s always protected and identifiable no matter where it travels.<\/p>\n<p style=\"font-weight: 400\"><strong>Here are 5 key things to consider when creating a data protection framework for your organisation\u2019s sensitive data\u00a0<\/strong><\/p>\n<ol>\n<li><strong>Configure:<\/strong> create policies for data labelling, classification and protection. Typically on my customers\u2019 sites, all data and documents created within the finance team will be automatically labelled as confidential, and only people in that team have the rights to access those documents but if the documents move beyond that team, say into HR, no one in HR can open, save or do anything with those documents. So protection is automated.<\/li>\n<li><strong>Classify:<\/strong> ensure when files are created they can be automatically (or manually) classified so automated encryption and permissions occur. Remember your teams and users don\u2019t always know the correct label, or level of confidentiality that should be attributed to certain information? So this type of automation is very powerful. But in general when it comes to security and compliance, it is vital to educate your people so they understand which information is sensitive and how it should be treated. But I\u2019ll talk more about that in a moment.<\/li>\n<li><strong>Label:<\/strong> make sure your metadata defining sensitivity of information stays with the file. So this means only identified and authorised people can open, print, save or copy the document. The caching of names in any email systems (when you\u2019re prompted to send an email to Ciara Gallavan instead of Ciara Gallagher) make it so easy to send information to the wrong person, sometimes without us even knowing it. Let\u2019s face it we\u2019ve all done this once! This little gem of functionality completely mitigates this risk.<\/li>\n<li><strong>Protect:<\/strong> set up encryption with permissions to ensure only authorised users can access the file, so even if a file containing sensitive data gets emailed to somebody in error, they are unable to open the file. A word of caution here, is NOT to label everything sensitive with encryption. If you do, you will indeed impact your people\u2019s productivity and inhibit a sensible level of data sharing<\/li>\n<li><strong>Monitor:<\/strong> track shared files everywhere they go. Not only is this great to see who has reviewed your work? But If a file does get sent to an unauthorised user in error then you get notified and you can recall the document immediately.<\/li>\n<\/ol>\n<p style=\"font-weight: 400\">So you can see how technology can help protect your sensitive data in motion but a key factor is adopting a culture where your\u00a0 teams truly understand why you must be vigilant and what their roles is in the process. Most breaches are not made through malicious intent but by human error.<\/p>\n<p style=\"font-weight: 400\">Technology is making great strides in helping you to create a secure framework for your organisation\u2019s sensitive data, whereby you mitigate risk but your people and your processes will always be at the heart of the solution.<\/p>\n<p style=\"font-weight: 400\">If you would like to learn more about implementing your own underlying data protection policies and framework. Watch our OnDemand webinar series.<\/p>\n<ol>\n<li>\u201cMcAfee Finds Eighty Percent of Employees Use Unapproved Apps at Work.\u201d McAfee. December 4, 2013. http:\/\/newsroom.mcafee.com\/press-release\/mcafee-finds-eighty-percent-employees-use-unapproved-apps-work (accessed 1\/26\/17)<\/li>\n<li>\u201cTurnaround and transformation in cybersecurity: Key findings from The Global State of Information Security\u00ae Survey 2016.\u201d PwC. 2016. 24. http:\/\/www.pwc.com\/sg\/en\/publications\/global-state-of-information-security-survey.html<\/li>\n<li>\u201cCreating trust in the digital world: EY\u2019s Global Information Security Survey (GISS) 2015.\u201d EY. 2015. 4. http:\/\/www.ey.com\/Publication\/vwLUAssets\/ey-global-information-security-survey-2015\/$FILE\/ey-global-information-sec urity-survey-2015.pdf<\/li>\n<li>\u201cCost of a Data Breach Study: Global Analysis.\u201d Ponemon Institute. June 2016.<\/li>\n<li>\u201cBring your own device: Security and risk considerations for your mobile device program.\u201d EY. September, 2013. http:\/\/www.ey.com\/Publication\/vwLUAssets\/EY_-_Bring_your_own_device:_mobile_security_and_risk\/%24FILE\/Bring_your_ own_device.pdf (accessed 1\/26\/17).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Data in motion &#8211; how to protect it \u2013 5 Key Considerations\u00a0 Now, more than ever, it\u2019s critical to protect your data at the file level. Data is the most valuable asset you control. Losing intellectual property, a customer&#8217;s personally identifiable information (PII), financial information, and confidential memos can cause substantial damage. But it\u2019s not [&hellip;]<\/p>\n","protected":false},"author":107,"featured_media":151627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1752],"class_list":["post-151609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-en-ie","specials-technology-lifestyle-en-ie","stories-how-can-i-keep-my-data-safe-en-ie","stories-your-online-security-en-ie"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/151609"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/comments?post=151609"}],"version-history":[{"count":11,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/151609\/revisions"}],"predecessor-version":[{"id":151857,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/posts\/151609\/revisions\/151857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media\/151627"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/media?parent=151609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en-ie\/wp-json\/wp\/v2\/categories?post=151609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}