Struggles with Guest Access in Microsoft 365 Speaking with clients, I find one of the biggest issues they struggle with how to properly secure Guest access in Microsoft 365 applications. While many organizations had already begun outsourcing their email to M365, most...
Cybersecurity has become an important topic for the defense supply chain. The ever-increasing number of digital channels that data can be exchanged through, has exponentially increased the risk of data breaches and leaks. This puts a lot of pressure on these...
Since the introduction of the general data protection regulation (GDPR) in May 2018, organisations have been frantically developing plans to manage copious amounts of structured and unstructured data in a way that complies with both new and existing legislation. Read...
Safeguarding Mission-Critical Data Access & Sharing in Deployed Operational Military Environments Learn how the Australian Department of Defence (Defence) secures the collaboration and sharing of files and prevents accidental data loss while maintaining need to...
This template will help you define the core structure of your data classification policies. It offers a comprehensive overview of what is required from general information about the responsibilities and the terms used, to the detailed explanation of different impact...