Data Leak Protection (DLP)
is the name of several policies in Office 365, setting up what data can, and can’t be, shared and with whom.
Imagine being able to automatically identify private information like passport numbers, Health IDs or bank account details and make sure that those are only being shared with people that are authorised to see them.
The good news is that you can do this with 365, provided you turn on the policies and set them up correctly, and monitor when data is shared.
Under the NZ Privacy Act, we’re all expected to take care of personal data entrusted to us and to make sure it’s only used for the purpose for which is being obtained.
With Office 365, there’s no excuse for that to be breached provided that we understand what data should be kept, what might be kept incorrectly, and how its being shared. With this we can set up rules to monitor your Office 365 system and report on how records are shared.
We include a basic set up of DLP in our KARE for Security S2 plan to get you started.
Avoiding Subscription Bombs
If 10,000 emails suddenly flooded your inbox, what would you do? Suddenly any real messages will be lost in the blitz of spam that's overloading your screen. It is hard enough to delete all those messages, let alone filter out the genuine ones from the flood. This...
Gotcha!
"GROUP-IB" are a Singapore-based cyber-security provider. They go deep into the cyber-crime sphere and it's paid off. After 30+ attacks, and over $US30M stolen, "OPERA1ER" have been caught! They describe a bad actor who, from 2019, had used the same MO over and...
Look before you click
The latest trend in phishing is pictures! It might be a thumb nail of a picture - a cute pet, interesting garden scene, or some other curiosity. It might be in the form of advertisement. Maybe it is offering a time sensitive, and urgent deal. It might even be a...
REWATCH Cyber Lessons from the field.
What can we learn from recent NZ cyber-events? What is real and what is hyperbole? Scroll down for the MFA revelation - it will surprise you!Introducing Campbell McKenzie from Incident Response, the team called in after cyber-events to help clean up and manage the...
Get ready for your AI Copilot
We’re excited about Copilot. It was announced a few weeks ago, Introducing Microsoft 365 Copilot – your copilot for work - The Official Microsoft Blog and promises to help us do what Microsoft call ‘the drudgery of work on tasks that zap our time, creativity and...
Free AI images: Have you tried Microsoft Designer yet?
What is Microsoft Designer? If you have had fun with ChatGPT, (ChatGPT, write me a security policy in the theme of a country and western ballad) then you’ll love experimenting with Microsoft Designer. Like ChatGPT, designer brings AI to the desktop, in this case to...
A move to the cloud for TBB: Kinetics advances prominent law firm’s digital journey
Faced with a legacy practice management system coming towards end of support, Auckland city firm TBB tested the market and decided on partnering with Kinetics for the delivery of a replacement. Through the engagement, Kinetics has not only successfully migrated TBB to...
REWATCH Did you know that, on average, 1.2 million Microsoft accounts get compromised every month?
Did you know that, on average, 1.2 million Microsoft accounts get compromised every month? According to Microsoft, 99.9% of hacked accounts didn't use MFA, and only 11% of all accounts have MFA enabled. The average cost of a ransomware security breach is $4.62...
What level of cyber-security is right for my organisation?
The world is changing. Your company's cyber security is increasingly under threat and the costs of mitigation are often unwelcome. The first question organisations need to ask is whether they are exposed, and to what level. All the available data from sources like...
How many of these 10 layers of cyber protection do you use?
"A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.” - Combating Ransomware - A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force. The message we hear from governance boards over...