0%

Book Description

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and distribution  of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365.  You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security  services in Office 365 to protect and manage your business.


What You’ll Learn
  • Manage security with the Azure Security Center and the Office 365 Compliance Center
  • Configure information protection for document and electronic communications
  • Monitor security for your business in the cloud
  • Understand Mobile Application Management (MAM) and Mobile Device Management (MDM)
  • Prevent data loss in Office 365
  • Configure and manage the compliance manager tools for NIST and GDPR

Who This Book Is For

IT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business

Table of Contents

  1. Cover
  2. Front Matter
  3. 1. Why Security and Compliance?
  4. 2. Azure and Office 365 Security
  5. 3. Microsoft Secure Score
  6. 4. Deploying Identity Management with EMS
  7. 5. Mobile Device Management with EMS
  8. 6. Using Office 365 Compliance Center
  9. 7. Step-by-Step Migration
  10. 8. Managing Office 365
  11. Back Matter
18.217.211.121