General context Nowdays it is really important to being able to monitor and control the IT infrastructure of a company against security threats, identity risks, data breaches, etc. From a general viewpoint, it is clearly fundamental to have full control of the security of your infrastructure, but also from a EU GDPR perspective you have… READ MORE
GDPR Q&A Session Webinar Speakers: Nick Brattoli, Lead Consultant at Byrdttoli Enterprise Consulting, USA Paolo Pialorsi, MCM, MVP, Italy Raphael Köllner, MVP, MODE, IT-lawyer, Lead Consulting Alegri International Service GmbH, Germany “What is the role of the GDPR Activity Hub?” “Where can I find a list of all the actions needed to be compliant with… READ MORE
Microsoft 365 to support client GDPR needs Speaker: David Bjurman-Birr, Security Architect, Microsoft Webinar Description: David Bjurman-Birr Security Architect with Microsoft, currently focused on developing security and compliance solutions for Microsoft partners. Previously Bjurman-Birr managed the Microsoft Certified Master (MCM) program for Exchange Server. In fact, Bjurman Birr worked previously as a consultant and architect… READ MORE
If you have read my previous post “Who’s next? Bill Gates?”, then, you may think I am going crazy. Talking about Bill Gates and saying Excel is dead is absurd! Surely, Excel is, and remains, one of the key Microsoft products. The title is very similar to the BI is dead one, provocative… But in a sense… READ MORE
What is Secure Score in Office 365? This post is on a new service which was introduced by Microsoft couple of months back called as “Office 365 Secure Score “. If you’ve ever wondered how secure your Office 365 tenant really is, then it’s time about time now to stop wondering because we have “Secure… READ MORE
One of the biggest concerns companies have out there is that by switching to SharePoint, companies will loose the ability to keep private data private. This is an absolutely wrong assumption. In fact, SharePoint is rock solid when it comes to security and security configuration. It uses a concept called “Security Trimming”. I personally call it… READ MORE
When managing a SharePoint solution, there are an infinite number of ‘best practice guides’ to resort to. On one hand, some are written by knowledgeable and reputable authors, and on the other, they are written by basement System Administrators. In reality, it is hard to know what information is reliable and what is not. Managing… READ MORE
Last year Paul Olenick, Microsoft MVP, published a blog all about Delve and the Office Graph for the European SharePoint Conference. In that post, Paul included one paragraph about how to exclude content from Delve. In this blog we’ll explore that topic more deeply in terms of Privacy, Security and Compliance with Delve.
Security is a real issue when we are discussing SharePoint Management. You know that. No wonder one of the most common mistakes enterprises are facing when dealing with SharePoint, is having end users with more access privileges to documents that they should.
It seems a simple problem to solve, but the reality of controlling employee’s access to confidential content, and making sure their access is not too broad, is a challenge for many.
That is why I decided to include, as one of the coverage points of our SharePoint Document Management blog series, some tips about SharePoint permissions, sharing how to give access to resources correctly, how to prevent SharePoint security breaches, and how to plan your permissions without compromising your document management and automation system in SharePoint.
With the widespread growth of cloud applications, we surveyed organizations to look at adoption of the Microsoft Office 365 platform. The survey addressed how organizations are utilizing Office 365 and SharePoint, where they have limitations, what applications they are using from the platform, and how organizations perceive the security of Office 365 for controlling sensitive data.