Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

archTIS

Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

With the introduction of various compliance requirements such as HIPAA, PCI and GDPR (just to name a few from around the world), there is an increasing need for organizations to determine where their sensitive data is located, secure access to it and protect it accordingly. There are many products that incorporate the ability to Discover and Classify data. NC Protect is no different.

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365

In July, the Pentagon’s acquisition office issued a memo reminding acquisition officials of the DoD’s requirements for handling controlled unclassified information (CUI). The standard which applies Defence contractors is not new. The original Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 requirement went into effect in 2017.

Tips for Managing Unstructured Data Security

All information is an attractive target for bad actors, but some is inherently more valuable than others. State-sponsored and hacktivist attacks constantly probe enterprise networks seeking to identify the location of sensitive information. Attackers historically targeted core enterprise systems but as the defenses for those systems have matured, attackers now target the same information but in less secured unstructured (broadly speaking, file and email based) repositories.

Managing Microsoft 365 Guest Access

Speaking with clients, I find one of the biggest issues they struggle with how to properly secure Guest access in Microsoft 365 applications. While many organizations had already begun outsourcing their email to M365, most had really only begun looking at the rest of the M365 offering (Teams, SharePoint Online and OneDrive) when COVID hit. Most organizations wound up diving headfirst into this offering in an attempt to deal with the sudden need to work and collaborate with colleagues from home.

DFARS Compliance in Microsoft 365

Cybersecurity has become an important topic for the defense supply chain. The ever-increasing number of digital channels that data can be exchanged through, has exponentially increased the risk of data breaches and leaks. This puts a lot of pressure on these organizations to ensure that the risks associated with the handling of sensitive data are as low as possible.

Introducing NC Protect's New CUI Designator Labelling Capability for US Defense Requirements

Protecting Controlled Unclassified Information (CUI) is a top priority for companies that have government and defense contracts, especially with the changes being rolled out in CMMC 2.0. We’re pleased at announce a new NC Protect watermarking feature to support CUI Designator labelling capability to assist US Defense and the Defense Industrial Base (DIB) with meeting the new CUI document handling and tagging requirements. The feature will be globally available during the July 2022 timeframe.

Zero Trust A Data-Centric Strategy for Success

Now more than ever the Boardroom, Chief Executive Officer and Chief Information Officer have information security front of mind and keeping them awake at night. Every day a new attack, incident or vulnerability is announced that has a significant impact on reputation, compliance, cost or service delivery. Chief Information Security Officers must now adapt to this changing landscape and lead their organizations to adopt new security methodologies to both protect and enable their data whenever and wherever it is required in a cost effective, risk managed way. So how do they achieve it?

Guiding and Managing the Implementation of Attribute Based Access Control

Business demands information management that meets their needs. From an IT perspective, it means that stakeholders are demanding access to information services that reach far beyond the boundaries of the organisation. At the same time, they are also expecting the IT department to protect their high-value information assets and intellectual property. How can you ensure that enabling remote and mobile access to your protected information services will not compromise your high-value information assets?