fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Microsoft 365 Adds Endpoint Data Leak Protection In Public Preview

Microsoft 365 Adds Endpoint Data Leak Protection In Public Preview

Microsoft 365 adds endpoint data leak protection in public preview

Microsoft announced today the extension of Data Loss Prevention (DLP) to Microsoft 365 customers’ endpoints, making it easier for organizations to prevent data leaks, inappropriate or unintentional data sharing or transfer, and other similar risks.

Microsoft 365 Endpoint Data Loss Prevention (DLP) extends DLP’s activity monitoring and protection capabilities to sensitive data and items on Windows 10 devices. 

“Once devices are onboarded into device management, the information about what users are doing with sensitive items is made visible in activity explorer and you can enforce protective actions on those items via DLP policies,” Microsoft explains.

Microsoft 365 services like Microsoft Teams, SharePoint, Exchange, apps such as Word, PowerPoint, Excel, and Outlook, as well as third-party cloud apps with Microsoft Cloud App Security already come with built-in data loss prevention capabilities provided through Microsoft Information Protection (MIP).

Also read: 7 Client Data Protection Tips to Keep Customers Safe

Builds upon Microsoft Information Protection

The public preview of Microsoft Endpoint Data Loss Prevention (DLP) now extends MIP protection to devices and allows customers to deploy the same information protection strategy across all environments.

For instance, organizations can use Endpoint DLP to block their employees from printing sensitive documents or from copying sensitive data to USB drives.

“Today we are excited to announce that we are now extending data loss prevention to the endpoint with the public preview of the new Microsoft Endpoint Data Loss Prevention (DLP),” Microsoft 365 Senior Director Alym Rayani said today.

“Endpoint DLP builds on the labeling and classification in Microsoft Information Protection and extends the existing DLP capabilities in Microsoft 365, helping you to meet compliance requirements and protect sensitive information on endpoints.”

Creating DLP policies, DLP popup on device
Creating DLP policies, a DLP popup on a Windows 10 device (Microsoft)

Right now, Endpoint DLP allows organizations to enforce policies for a wide range of activities unique to each endpoint including:

  • Copying a sensitive file to an external USB media device
  • Copying a sensitive file to a network share
  • Uploading a sensitive file to a cloud service
  • Printing a sensitive file
  • Copying sensitive content to the clipboard
  • Accessing a sensitive file by an unallowed app

Data loss prevention policies can be managed from the compliance center across an entire Microsoft 365 environment, for an organization’s software, services, and Windows devices.

“All that is required is for the endpoint to be onboarded in your environment using your established device management onboarding process,” Microsoft said.

Microsoft 365 compliance center
Microsoft 365 compliance center (Microsoft)

Rolling out today

According to Microsoft, Endpoint DLP has already begun rolling out to customers’ tenants today in Microsoft 365 E5/A5 (EDU), Microsoft 365 E5/A5 Compliance, and Microsoft 365 E5/A5 Information Protection and Governance.

Microsoft 365 customers can learn more about Endpoint DLP on the feature’s dedicated documentation page. You can also go here for more info on how to get started with Endpoint DLP and here to get more details on how to use it.

You can sign up for a Microsoft 365 E5 trial to take Endpoint DLP for a spin today or navigate to the Microsoft 365 compliance center to get started if you already have a relevant Microsoft 365 subscription or add-on.

To deploy Endpoint DLP on a Windows 10 device, that endpoint has to meet these requirements:

  1. Must be running Windows 10 build 1809 or up.
  2. Must be Azure Active Directory (AAD) joined.
  3. Must have Microsoft Chromium Edge browser installed to enforce policy actions for the upload to cloud activity.

Microsoft is also rolling out Double Key Encryption in public preview today, a Microsoft 365 E5 feature that enables customers to protect highly sensitive data while also keeping full control of their encryption keys.

“Double Key Encryption for Microsoft 365 uses two keys to protect your data, with one key in your control and the second in Microsoft’s control,” the company explained.

“To view the data, one must have access to both keys. Since Microsoft can access only one key, your data and key are unavailable to Microsoft, helping to ensure the privacy and security of your data.”

Also read: 7 Phases Of Data Life Cycle Every Business Must Be Informed

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us