September 1, 2020

-
min read

4 Best Practices for Securing Enterprise Data in Microsoft Office 365

So, here we are, both as workers and employers. The COVID-19 environment hasn’t really changed much from a workforce perspective over the last six months. As researchers have highlighted in recent studies, even when the world returns to “normal” many of us will remain outside the traditional office setting. In support of all of this, and the general appetite for more flexible, accessible cloud-based collaboration tools, the growth of these platforms, most notably Microsoft Office O365, has taken off. By some estimates, the use of the Teams application alone has increased to a whopping 75 million active users per day.

It’s no surprise then that related security concerns are also rising to the forefront

Organizations must not only manage primary issues such as enforcing proper access to these cloud collaboration apps, but the data security challenges involved are also really and truly complex. Consider that as users attempt to carry out their work using O365 and Teams, security operations staff have to cover off on related workflows including data classification, privileged user monitoring, and even removal of third parties from channels that involve the sharing of sensitive data.

These are commonly approached as discrete and difficult actions in the on-premise world. Now we have moved them to the cloud. From a security tooling standpoint, as users embrace a nearly limitless variety of O365 data use cases – internally, and with external partners and customers – traditional email gateways and Data Loss Prevention (DLP) tools lack sufficient control over the cloud collaboration environment.

Security challenges on O365 are compounded further by the increased presence of unmanaged devices, siloed security solutions, inflexible data protection integrations, and limited data security controls resident in cloud collaboration tools themselves. Those native O365 data security solutions involve multiple consoles, additional integration obstacles and tools, and relatively high costs.

How to address O365 and Teams security issues

We hear practitioners asking the market for a “single pane of glass” that delivers some combination of data classification and protection, access controls, and device management without forcing them to jump through so many hoops or commit as much of their budget. As a CASB solutions provider, we are obviously positioning our approach as just the right combination of capabilities to address O365 and Teams security in an efficient manner. Lookout’s CASB solution was purpose-built to address specific use cases including::

Controlling unmanaged devices

Enabling users to access O365 from any device while ensuring that the right controls are in place. CASB offers adaptive controls that enable practitioners to disable the storage of sensitive data like PCI/HIPAA and configure policies based on business requirements.

Securing email and Teams collaboration

Protecting specific data sets across O365 Email and Teams collaboration models, Lookout CASB detects when users attempt to share sensitive information such as SSNs, card data, PHI data, etc., on email, Teams chats or channels with an unauthorized or external user; policies can be tailored to mask or delete that information.

Privileged user monitoring

Protecting against improper data handling. Lookout CASB detects anomalous user behavior such as logging from an unusual location and downloading an unusual amount of data. Administrators can move quickly to remove access and even wipe involved data.

Multi-level data security

Using Lookout CASB, O365 and Teams collaboration can be secured by controlling how, where and when sensitive data is shared, specifically through the use of integrated DLP and centralized policies.

Our customers consistently tell us that our CASB solution is their primary source of visibility and control as they expand their use of O365 and Teams to support their expanding remote workforce environments. For more information on these use cases and more, join us for our upcoming best practices webinar on Operationalizing Security for O365 Collaboration.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.