Chapter 6

Configuring Security Features

IN THIS CHAPTER

Bullet Enhancing your security posture

Bullet Using built-in security features in Microsoft 365

Bullet Implementing encryption capabilities, the easy way

John Chambers, former Cisco CEO, said that there are only two types of companies: those that have been hacked, and those who don’t know they have been hacked. Considering that Cisco is the worldwide leader in IT, networking, and security solutions, notable personalities in the industry (including James Comey) have echoed the same sentiment for a good reason.

Sadly, that statement is today’s reality and the new normal for anyone running a business of any size. On any given day, we face the risk of being attacked by malicious threat actors whose intent is to cause business disruption or harvest valuable company data to be resold on the dark web. Companies that have vulnerable servers and devices from lax (or the lack of) patch management and outdated practices are usually the entry points for hackers.

And if that weren’t enough, we also face risks from the inside, with users intentionally or unintentionally leaking critical data. In fact, most confirmed data breaches are due to weak or stolen ...

Get Microsoft 365 Business for Admins For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.