Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data

Bringing Microsoft Purview and Copilot Together to Protect Sensitive Data Over the past 5 months, this blog series has covered the fundamentals of Microsoft Purview. As we have shown, Purview provides a powerful layer of data-aware visibility and protection that complements more traditional security controls like identity management, access control lists, group memberships, endpoint security, […]

Use Data Retention to Reduce Risk

Purview Data Lifecycle Management:Use Data Retention to Reduce Risk In the past few months, I have discussed the first three foundational elements of Microsoft Purview Compliance: Use Purview Content Explorer searches to identify where sensitive data exists in your tenant, Use Purview Data Loss Prevention (DLP) policies to prevent sensitive data from being shared outside […]

How to Create Data Loss Prevention Custom SITs

How to Create Data Loss Prevention Custom SITs Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network, accidentally or intentionally.  Adoption of DLP is being driven by insider threats and by more rigorous state privacy laws, many of which have […]

Availability = Survival

As IT veterans, I’m certain we all have stories like the one I shared previously – many of those without the happy ending. It reminds me of the prime concepts of a (fascinating) survival book I read several years ago by Laurence Gonzales called “Deep Survival: Who Lives, Who Dies, and Why,” where the key themes of […]

How Secure is Your Environment?

Most companies today understand the very real need to protect their data. Most invest significant funds to mitigate or prevent the threats that aim to compromise their data. Typically, the go to investment is a firewall on the edge of the network to protect against outside attacks. And that is a great start. But that […]

How Strong are Your Passwords?

Recently, I learned of a significant – and honestly quite brilliantly executed – security breach of a major company. The breach infiltrated a sophisticated system secured with some great security equipment. This company invested large sums of money to make their system very secure, and they accomplished that. But the brilliant hackers thought outside the […]