Configuring Security Features
IN THIS CHAPTER
Enhancing your security posture
Using built-in security features in Microsoft 365
Implementing encryption capabilities, the easy way
John Chambers, former Cisco CEO, said that there are only two types of companies: those that have been hacked, and those who don’t know they have been hacked. Considering that Cisco is the worldwide leader in IT, networking, and security solutions, notable personalities in the industry (including James Comey) have echoed the same sentiment for a good reason.
Sadly, that statement is today’s reality and the new normal for anyone running a business of any size. On any given day, we face the risk of being attacked by malicious threat actors whose intent is to cause business disruption or harvest valuable company data to be resold on the dark web. Companies that have vulnerable servers and devices from lax (or the lack of) patch management and outdated practices are usually the entry points for hackers.
And if that weren’t enough, we also face risks from the inside, with users intentionally or unintentionally leaking critical data. In fact, most confirmed data breaches are due to weak or stolen ...