{"id":279871,"date":"2020-01-20T09:00:59","date_gmt":"2020-01-20T08:00:59","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=279871"},"modified":"2020-01-03T14:56:00","modified_gmt":"2020-01-03T13:56:00","slug":"fa2-compliance","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa2-compliance\/","title":{"rendered":"How to disarm the threat of Shadow IT"},"content":{"rendered":"<p class=\"intro\">One of the biggest threats to business security comes from within. Are you equipped to deal with the threat of shadow IT?<\/p>\n<p>Microsoft\u2019s extensive <a href=\"https:\/\/resources.office.com\/en-landing-WE-M365-CNTNT-FY20-11Nov-12-Work-ReWorked-SRGCM3077.html\" target=\"_blank\" rel=\"noopener noreferrer\">Work Reworked<\/a> report shows that with change becoming the new norm for businesses everywhere, the challenges to security lie not just from outside the organisation but also from within.<\/p>\n<p>Throwing open the doors to cybercrime is the extensive use of non-compliant applications. As younger generations enter the workforce and expect the same kind of freedoms in the workplace that they enjoy in their personal lives, there\u2019s never been a more pressing need to stay ahead of the game.<\/p>\n<h2>Single-minded on safety<\/h2>\n<p>The scale of the problem is highlighted in Microsoft\u2019s eBook <em><a href=\"https:\/\/resources.office.com\/ww-landing-m365e-identify-weaklinks-in-your-security-interactive-ebook.html?LCID=EN-GB\" target=\"_blank\" rel=\"noopener noreferrer\">How to Identify the Weak Links in Your Security<\/a><\/em> which reveals that while 42% of data breaches are caused by technical faults, 58% is down to human error.<\/p>\n<p>In recognition of the challenges facing its compliance, the <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/727515-mediterranean-shipping-company-logistics-office-365\" target=\"_blank\" rel=\"noopener noreferrer\">Mediterranean Shipping Company<\/a> (MSC) streamlined its IT offering to give easy access to approved data and tools across the company.<\/p>\n<p>MSC is comfortable dealing with business on a global scale. So, when it came time to standardising IT tools in 148 countries it demanded an approach that reflected the way it manages its 460-strong fleet of container ships around the world: decide on the best route to a destination, and arrive there as quickly and safely as possible.<\/p>\n<p>\u201cWe looked at Google, but Microsoft showed us that it has a more complete vision about the communication environment today and what it needs to be tomorrow,\u201d says Fabio Catassi, Chief Technology Officer at MSC.<\/p>\n<p>In addition to Microsoft Exchange Online Protection hosted email filtering service, MSC has adopted Office 365 Advanced Threat Protection to help protect its mailboxes in real time against sophisticated attacks. \u201cThe beauty of the Microsoft approach to multilevel security is that from a central console, we can control malware detection and check attachments and unsafe links\u2014all as part of our Office 365 solution,\u201d says Catassi.<\/p>\n<h2>Security with agility<\/h2>\n<p>Global protective coatings provider, <a href=\"https:\/\/customers.microsoft.com\/en-US\/story\/hempel-manufacturing-m365-d365-azure-denmark\" target=\"_blank\" rel=\"noopener noreferrer\">Hempel<\/a>, helps to protect all sorts of structures from damage and corrosion\u2014from ships to wind turbines, and from hospitals to containers. While its legacy platform was secure, the company realized the external threat landscape was evolving faster and faster, and knew the time had come to upgrade.<\/p>\n<p>By switching to <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/business\/office-365-enterprise-e5-business-software?activetab=pivot:overviewtab\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 E5<\/a> with Windows Defender Advanced Threat Protection, Hempel has now optimized its security posture, and reduced complexity by centralizing security management. \u201cCyber criminals are becoming ever more agile. Migrating to the cloud allows us to remain current all the time, and to be agile, too,\u201d says Mark Sutton, Digital Infrastructure &amp; Operations Director at Hempel.<\/p>\n<p>Sutton has made a shrewd move. An incredible 23% of social engineering phishing attacks are successful due to recipients opening messages they receive from increasingly creative attacks. Even the savviest end user can fall victim which is why making compliance easy for employees is paramount.<\/p>\n<p>In response, Hempel has also rolled out Office 365 which, according to CEO Henrik Andersen, has reduced the use of Shadow IT and encouraged employees to collaborate like never before. \u201cWe didn&#8217;t want to say, we have a new intranet, new teams, new groups, and so on. We just say, \u2018It\u2019s all on the collaboration platform, and this is the toolbox that it contains.\u2019\u201d<\/p>\n<p>And, with 67% of IT security practitioners unable to detect which employees use insecure mobile devices, sensitive data is at risk with each new device and every new user adding another potential entry point of attack.<\/p>\n<h2>One step ahead<\/h2>\n<p>The expansion of <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/drylock-technologies-manufacturing-skype-business-online-office365-officee5-belgium\" target=\"_blank\" rel=\"noopener noreferrer\">Drylock Technologies<\/a>, a leading manufacturer of ultra-thin absorbent hygiene products, was so rapid that there had been no time focus on IT. The impetus for radical change came in February 2017, five years after the company was founded, when Drylock acquired a manufacturing plant in Eau Claire, Wisconsin, US.<\/p>\n<p>Realising each site was an island, with employees using \u2018fifty different ways\u2019 to communicate, Drylock sought a more secure, more intelligent communication solution. Its ambition? To future-proof the company and create a unified workplace where everybody could work anytime, anyplace, and be reachable anywhere.<\/p>\n<p>A one-month trial of Office E5 with Calling Plan in Eau Claire confirmed Microsoft as the right choice. Further rollouts across other locations swiftly followed and has been so successful that Group Infrastructure and Operations Director Jurgen De Wolf is determined to migrate all remaining sites to Calling Plan as soon as it is available.<\/p>\n<p>\u201cIt has revolutionised our company\u2019s way of communicating,\u201d says De Wolf. \u201cIt has optimized all operations in all ways, and we can quantify what people are doing, which was impossible before.\u201d<\/p>\n<p>What these stories tell us is that those who have made the decision to simplify their ways of working are not only reducing their risk to compliance, but reaping benefits beyond expectation. In the new world order of constant change, surely that\u2019s a step worth taking today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the biggest threats to business security comes from within. Are you equipped to deal with the threat of shadow IT? Microsoft\u2019s extensive Work Reworked report shows that with change becoming the new norm for businesses everywhere, the challenges to security lie not just from outside the organisation but also from within. Throwing open [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":285751,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1829],"class_list":["post-279871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en","specials-work-productivity-en","stories-how-can-i-work-secure","stories-working-secure-en","businessPriorities-modern-workplace"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/279871"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/comments?post=279871"}],"version-history":[{"count":8,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/279871\/revisions"}],"predecessor-version":[{"id":285816,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/279871\/revisions\/285816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media\/285751"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media?parent=279871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/categories?post=279871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}