7 Ways Office 365 Prioritizes Your Data Security

7 Ways Office 365
Prioritizes Your
Data Security
Introduction
Experts estimate that 60% of businesspeople in the U.S. will be working
in the cloud by 2022.1 And with good reason—cloud computing
enables unprecedented agility, productivity, and cost savings.
But IT, HR, and legal leaders worry that migrating
to the cloud will increase their exposure to hackers
and other threats. It’s no surprise considering
the number of data breaches in 2015
represented the second highest year on record
since 2005.2
How does an organization innovate and expand
with an ever-present concern about security
and compliance? That’s when it’s valuable to
have a trusted partner like Microsoft f
or cloud
infrastructure—a partner already supporting more
than one billion customers around the world with
essential features that deliver enhanced security and
threat mitigation.
The business sector topped the ITRC
2015 Breach List with nearly 40% of the
breaches publicly reported in 2015 in
the U.S., an increase of 8.1% from 2014
figures.2
1
2
“Cloud Office Questions Begin the Shift from ‘If’ to ‘When,’” Gartner, 2015
“Identity Theft Resource Center Breach Report Hits Near Record High in 2015,” ITRC, 2015
02
Introduction
To be proactive means to put measures in place
that prevent problems before they start. Imagine
having peace of mind with proactive protection,
keeping your cloud data safe from cyber threats.
Empower your organization to overcome
common fears surrounding security and capitalize
on the promise of cloud computing. Read on to
learn how Office 365 can help you do all of
that—and actually improve data security and
administrative control.
3
“State of The Cloud Report,” Right Scale, 2016
03
Cloud Benefits 2016
% of U.S. Respondents Reporting These Benefits3
Table of
Contents
05
Chapter 1
Safety Starts With Trust
08
Chapter 2
10
Chapter 3
12
Chapter 4
15
Chapter 5
17
Chapter 6
19
Chapter 7
Working Around The Clock
Stay Secured On The Go
Compliance Reassurance
Advanced Security Management
Keep What’s Yours, Yours
Safety On An Organizational Level
Chapter 1
Safety Starts
With Trust
Safety Starts With Trust
We understand that a move to the cloud causes worry about losing
control of where your data is stored, who has access to it, and how
it gets used.
After all, the data shared between and generated by your business applications is essential to your
operations. You may even be mandated to safeguard that data to comply with industry regulations.
Let’s be clear, some of that data is what gives your company its competitive edge; that’s the last thing
you want falling into the wrong hands. Here’s how we handle security, privacy, and compliance—and
give you ultimate control over your data.
Privacy and the cloud:
ISO/IEC 27018 was created to allow cloud
service customers control over how
personally identifiable information (PII)
is used. For example, it prevents PII
entrusted to a cloud service provider from
being used for advertising without the
customer ’s consent. Microsoft was among
the first to comply with this standard.
06
Safety Starts With Trust
Own your data
Office 365 takes the extra measures to safeguard
your privacy and prevent any unauthorized
access to your data. You control your
information—we keep it safe; even if you decide
to leave the service, you can take your data
with you.
Maintain control
With Office 365’s built-in privacy controls, every
employee can configure Office 365 to grant—or
deny—access to their data across any device.
Even those with administrator-level status
cannot access your data without your authorization
(but they can make sure less proactive employees
are protected). And because you can take
advantage of multiple proven measures to
protect your data in transit, you can protect
users and their managed devices.
Stay ahead of the
compliance curve
Be confident about satisfying key regulations,
because Office 365 applications can help you
attain and maintain compliance with HIPAA,
FISMA, and many other regulations. We work
with regulatory bodies to comply with the latest
standards. Just as important, through our Security
and Compliance Center you can easily save and
find important business content, and help Office
365 users perform their own compliance tasks.
“The bottom line is that
any system, whether cloud
or on-premises, is only as
secure as the amount of
planning and technology
that goes into the data and
applications.”
—David Linthicum, “The public cloud is more
secure than your data center,” Info World,
2015
07
Chapter 2
Working Around
The Clock
Working Around The Clock
Staying ahead of digital attacks
is critical to protecting your
organization’s data. But those
security threats are continually
evolving. We understand your
security concerns and we take
them seriously.
You can rest easy knowing we are on constant
vigil to ensure your data is secure 24/7. We
continuously invest in advanced security tactics
and recruit world-class experts to quickly detect
intrusions, minimize their impact, and recover
more quickly. We call upon two highly skilled
and dedicated teams of security experts: one
tasked with launching simulated attacks and the
other charged with detecting and defending
against intrusions.
By constantly testing and challenging our
security capabilities, we stay abreast of emerging
threats and constantly improve the security
measures in Office 365. That means your data is
safe now and in the future.
4
2015 Data Breach Category Summary, IRTC, 2015
09
U.S. Data Breaches by Industry in 2015⁴
Chapter 3
Stay Secured On The Go
Stay Secured On The Go
Mobile devices like smartphones and tablets are increasingly used to
access work email, calendars, contacts, and documents. In other words,
they play a big part in ensuring that your employees get their work
done anytime, from anywhere.
But as more businesses adopt a “bring your own
device” approach to phones and tablets, keeping
corporate data secure on mobile devices is
becoming a top challenge.
With Office 365, you can keep your personal
and company apps separate using built-in
mobile device management (MDM) features.
These features allow you to set device security
policies and access rules, wipe data, and prevent
unauthorized users from accessing corporate
email and data on lost or stolen mobile devices.
Plus, you can set security policies on all your
devices and establish protocols to manage your
Office 365 apps that are accessed by these
devices. And you can handle all of this through
the easy-to-use interface featuring a wizardbased setup, enabling you to see which devices
are connected to Office 365 and identify devices
that have been blocked due to non-compliance.
11
And to protect the data traveling between
devices, Office 365 message encryption and
rights management services enables any two
parties to communicate securely, regardless of
the servers or services between them, while
protecting your data at every stage.
By managing access to Office 365 data across a
diverse range of phones and tablets, including
iOS, Android, and Windows Phone devices,
you can:
• Help secure and manage corporate
resources: Apply security policies on devices
that connect to Office 365 to ensure
that corporate email and documents are
synchronized only on phones and tablets
managed by your company.
• Preserve productivity: Because MDM is
built directly into the productivity apps your
employees already know and love, you
can protect company data while keeping
employees productive.
According to Consumer
Reports, 5.2 million
smartphones were stolen
or lost in the U.S. in 2014.
Chapter 4
Compliance
Reassurance
Compliance Reassurance
While it’s okay to hope for the best,
it’s always wise to be prepared.
Companies must address the challenges of storing,
organizing, and sifting through vast and exponentially
increasing quantities of data so they can quickly be
responsive to a litigation, internal investigation, or
regulatory data request. Time is of the essence when
responding to legal data requests, especially those
related to your organization’s innovative developments
or a competitor ’s patent. That’s why a smooth
electronic discovery (or eDiscovery) process—the
process of identifying and delivering electronic
information that can be used as evidence—is vital.
After all, most discovery orders today require email to
be produced as part of the discovery process. And the
Federal Rules of Civil Procedure guidelines require you
to do so in a timely manner.
Plan ahead now, thank yourself later.
With the Office 365 Security and Compliance Center, your
organization gains the ability to conduct all eDiscovery
in-house—without the need for external parties or addon compliance tools. The Security and Compliance Center
serves as a portal for managing eDiscovery cases, providing
a central place where you can discover content in Office
13
365 applications, allowing you to control who has access
to the case, place content sources on hold, and conduct
content searches across mailboxes (active or inactive), public
folders, OneDrive for Business sites, SharePoint sites, and
Office 365 groups. Office 365’s Advanced eDiscovery is a
solution that strengthens your capabilities to detect threats
quicker, customize and refine your security policies, and give
you insights faster without the need for an endpoint agent.
It integrates machine learning, predictive coding, and text
analytics to improve the quality and reduce the challenges
that come with eDiscovery capabilities. Finally, you can
also use searches to identify data to be analyzed with
Advanced eDiscovery, which reduces the volume of data
sent for eDiscovery review by finding near-duplicate files,
reconstructing email threads, and identifying key themes
and data relationships.
Overall, Advanced eDiscovery makes the discovery
process run smoother should any case present itself in
your company’s future, and further strengthens the rich set
of eDiscovery capabilities already present in Office 365 to
help you quickly investigate and meet legal and regulatory
obligations from the Security and Compliance Center.
Compliance Reassurance
Near-duplicate detection
Predictive coding
Save time and money by structuring your review in a more
efficient way, giving one person the ability to review a
group of similar documents, rather than multiple people
reviewing different versions of the same document.
Train Advanced eDiscovery to distinguish between relevant
and non-relevant documents using a small sample of
documents. Once the initial training is complete, the system
can apply a relevance score to all other documents in the
data set being examined. Then you can select the right level
of review.
Email threading
Easily identify unique messages in an email thread, so that
time isn’t wasted sifting through repetitive information.
Themes
Group contextually related documents to identify cross
sections or patterns of related data.
Export for review applications
Get a CSV file of document properties and analytics
metadata by exporting data from Office 365, then load
the file into eDiscovery review applications and save the
analytics information.
14
Advanced eDiscovery provides the percentage of documents
required to be reviewed to achieve a certain percentage
of relevant documents. For example, reviewing 20% of
documents may yield 84% of the relevant files present in the
document set.
Decrease the cost and risk associated with the eDiscovery
process. Advanced eDiscovery tools in the Office 365
Compliance Center enable you to quickly analyze and
identify relevant data sets.
Chapter 5
Advanced Security
Management
Advanced Security Management
Protecting Your Office Environment
For many organizations, shadow IT is an ongoing concern. Advanced Security Management gives
you insights into suspicious activity in Office 365 so you can investigate situations that are potentially
problematic and, if needed, take action to address security issues.
Powered by Microsoft’s Cloud App Security, Advanced Security
Management offers:
Threat Detection
• Set up anomaly detection policies that alert
you when suspicious incidents occur, and
evaluates the risk of user activity over 70
different indicators.
• Anomaly Detection will learn normal user
behavior to better detect abnormal activity,
protecting you from possible breaches.
• Customize the notification settings for risky
activity, and control how you’d like IT to
be notified.
• Shut down user access or processes upon
receiving a flagged notification.
• Manage the use of third party applications
that access Office 365.
Discovery and Insights
Enhanced Control
• Create security policies from out-of-the-box
templates for your IT to effectively monitor
user activity.
5
• Get a dashboard that allows IT Pros to
visualize your organization’s usage of Office
365 and other productivity cloud services, so
you can maximize investments in IT-approved
solutions.
“Data Breach Protection and Readiness Guide,” OTA - Online Trust Alliance, 2016
16
According to a 2016
report by Online
Trust Alliance, 93%
of data breaches in
the U.S. could have
been prevented,
and 15% were due to
employees.5
Chapter 6
Keep What’s Yours, Yours
Keep What’s Yours, Yours
Worrying about accidental data breaches caused by unaware
employees can keep a chief security officer up all night.
But expecting employees to know every data
security policy—and whether or not sending a
certain file via email is exposing the organization
to risk—is impractical. Now you can protect
sensitive data more easily than ever before and
stop data leakage before it starts, without
affecting worker productivity.
Data loss prevention at work
Imagine being able to identify, monitor, and protect
sensitive data and even help users understand and
manage data risk. Better yet, what if you could
notify workers in the context of where they are
working and empower them to make the right
decisions when dealing with sensitive data?
You can. The data loss prevention (DLP) technology
embedded into Office 365 helps your employees
comply with data protection policies without
disrupting their normal routine. Calling upon built-in
templates, you can set up and execute data-loss
prevention policies with little training. You can
also define and adapt rules and policies to your
organization’s needs, such as restricting viewing to
18
the intended recipient, and limiting forwarding and
printing. Plus, you can quickly respond to any data
loss violations.
Here’s an example of DLP
technology within Office 365
in action:
Picture an employee writing an email that
contains sensitive information, such as a credit
card number. DLP will pick up on the sensitive
information and alert the employee before the
message is sent. You decide which policies to
apply and how to respond. For example, you
could simply warn the employee about sensitive
information before she sends the email. You
could also completely block her from sending
sensitive information, and even quarantine
suspect messages.
Chapter 7
Safety On An
Organizational Level
Safety On An Organizational Level
To empower everyone to do their jobs anytime
and anywhere, cloud-based office productivity
applications need to be accessible from any device
and keep your data and enterprise environment
safe from exposure and vulnerabilities.
• Enable token-based authentication to
services. Integrate Azure Active Directory
with your on-premises Active Directory, other
directory stores and identity systems, or thirdparty systems.
With the built-in protection offered by Office
365, you can be sure that all your data is secure,
whether employees are in the office or working
remotely. Plus, the service enables you to
control access to your environments, data,
• Create additional authentication mechanisms.
Control how users access information from
specific devices or specific locations, or a
combination of both (for example, limiting
access from public computers or from public
open Wi-Fi).
and applications.
Help prevent suspicious activity
To easily manage user access, take advantage
of the cloud-based user authentication
service Azure Active Directory. Simply set
your personalized security policies and run
our advanced thread analytics to identify
and eliminate suspicious activity. Strong
authentication options provide you with
granular control over how users can access
and use Office 365.
20
• Exchange online protection adds advanced
threat protection to safeguard against spam,
malware, and viruses.
Security Checklist
If your organization hasn’t yet moved to the cloud, it’s only a matter of time.
And when you make that move, you want to make sure you and your employees can work without interruption.
That’s why it’s critical to address these top things when choosing a cloud provider. Use the handy checklist below
to vet your options and make the best choice for your organization.
Who owns the data we store in your
service? Will you use our data to build
advertising products? Find out if the service
provider does anything with your data and in
what ways it gives you control over your data.
Do you offer privacy controls in your
service? What privacy controls are enabled
by default and are you allowed to turn off/
on privacy-impacting features? Does the service
provider contractually commit to its privacy and
security promises?
Do we have visibility into where
you store our data in the service?
Ask the service provider where your data is
located, who can access it, and how they
report on data access.
What is your approach to security and
which security features do you offer to
protect your service from external attacks?
What does the service provider do to secure its
hardware, software, and the physical security
of its datacenters? Ask to see its policies and
controls, and security verification by independent
auditors. Find out which security measures the
provider enacts on your behalf and which it allows
you to configure to suit your own needs.
How do you ensure that your service is
reliable? What best practices does the service
provider apply in design and operations, such
as redundancy, resiliency, and distributed
services?
Can we get our data out of your service?
Find out if you can download a copy of your
data at any time, for any reason, without any
assistance from the service provider.
Will you inform us when things change
in the service, and will you let us know if
our data is compromised? Make sure the
service provider informs you of any important
changes to the service with respect to security,
privacy, and compliance.
What standards do you comply
with? Does the service provider comply with
standards like ISO 27001, FISMA, and FedRAMP?
Learn about the 4 ways to prevent security breaches in this infographic:
https://resources.office.com/landing-4-ways-to-prevent-security-breaches-infographic.html
For more information and proof points about how Microsoft Office 365 provides assurance to customers about the questions above,
please visit the Office 365 Trust Center: https://products.office.com/business/office-365-trust-center-welcome
Explore the new enterprise capabilities of Office 365 in an easy,
guided tour at http://aka.ms/O365guidedtour.
Start a free trial of the most comprehensive, most secure Office
365 for your business:
https://go.microsoft.com/fwlink/p/?LinkID=698279.
© 2016 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. This document is
provided “as-is.” Information and views expressed in this document, including URL and other Internet
website references, may change without notice.
This document does not provide you with any legal rights to any intellectual property
in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
microsoft.com