Making The Most Of Your O365 Implementation: Securely | With Lisa Lee, Hannah Tun, Smith Thomas

47:24
 
Share
 

Manage episode 257945141 series 1535672
By ITSPmagazine | Technology. Cybersecurity. Society.. Discovered by Player FM and our community — copyright is owned by the publisher, not Player FM, and audio is streamed directly from their servers. Hit the Subscribe button to track updates in Player FM, or paste the feed URL into other podcast apps.
Host: Sean Martin Guests: Lisa Lee, Microsoft Hannah Tun, Indiana University Smith Thomas, Big Networks Are you ready to "geek out" again? This time on Office 365 (O365)? Good! I have some fantastic guests joining me for this conversation where I planned to cover the following: What are some of the most used components in O365 that we should be looking at from an access control and configuration perspective? What are some of the elements—and related settings—that are enabled by default that many companies may not need and, therefore, should consider disabling or configuring differently? What are some of the elements/settings that are disabled by default that many companies should look to enable—what do they need to consider, if anything, before they do that? What do we know about the human element here—are there programs or other things companies should explore to help ensure their users are aware and informed about the risks they face? Fortunately, we covered all of this and more: What can IT and security teams rely upon when it comes to the tech, automation, and the end-users? Where do InfoSec teams need to step in to ensure that things are functioning as they expected? How can IT and InfoSec work together to identify anomalies and exceptions in operations so they can respond in a way that not only keeps business running but does so securely? What tools are available to IT and security admins, and how can they be leveraged? Tips to ensure effective secure communication and collaboration. Tips to ensure adequate access control and authentication mechanisms. Tips for dealing with business email compromise (BEC) and ransomware Phew! That's a ton of stuff. Trust me… you'll want to listen to this one with your admin console open and ready to go. And, more importantly, take my advice at the end of this if you find you need some help. Ready? Good! GO! ________ This episode of At The Edge is made possible by the generosity of our sponsors, Nintex. Be sure to visit their directory pages on ITSPmagazine - Nintex: https://www.itspmagazine.com/company-directory/nintex To catch more stories At The Edge, be sure to visit https://www.itspmagazine.com/at-the-edge The complete series of SMB CyberSecurity webcasts, podcasts, articles, and supporting material can be found on ITSPmagazine at: https://itspmagazine.com/cybersecurity-for-small-medium-business Learn more about NCSA's CyberSecure My Business: www.itspmagazine.com/company-directory/ncsa#csmb Consider sponsoring this series to help raise awareness for small and medium businesses/enterprises all around the world: https://www.itspmagazine.com/podcast-series-sponsorships

602 episodes