Join Pete Zerger for an in-depth discussion in this video Challenges of securing data on mobile devices, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Announcer] According to a 2016 Gartner Survey,…more than half of employees who used smartphones at work…rely on their personally-owned smartphone,…signaling that personally-owned devices in the workplace…have basically become the new standard.…Enabling users to be productive on a personal device,…or anywhere productivity, as I call it,…without putting sensitive corporate information at risk,…is the challenge we have to meet.…According to a 2016 survey, more than one quarter…of all data breaches since 2006 have been as a result…of lost or stolen mobile devices.…
This far outpaces hacking, unintended disclosure,…and leaks by company insiders.…In fact, lost or stolen devices were reported to be…the number one cause of data breaches…in the financial sector over the last decade.…While we don't know how many devices are lost,…nor how many of those might end up in the hands…of a malicious actor,…the fact that many employees have access to sensitive…corporate information means any loss…can have serious consequences.…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection