Blog Banner

Category Archives: Security

Securing Sensitive Information in Office 365

Screen shot of results viewer in Security Sheriff

Shows the Office 365 library with the Privacy module deployed and pass/fail results for the files displayed

Microsoft’s quarterly earnings call at the end of January touted strong demand for its cloud services. Commercial revenue grew 5 percent to $13.3 billion, driven by Office 365, Azure, and Dynamics CRM Online.

Office 365 is growing rapidly. Public disclosures from Redmond reveal a triple digit growth rate, and an annual revenue run rate above $2.5 billion. Office 365 is a collaboration tool enabling you to create, store and work together on content. Organizations are opting to work with Microsoft to help control their enterprise collaborative content. However, these organizations need to understand where users save sensitive data and who is using it, so it can automatically be secured.

Today we announced HiSoftware Security Sheriff for Office 365, which extends the features and functions of our on-premises solution for inspecting, classifying, securing, auditing and processing content to Office 365, SharePoint Online, OneDrive and hybrid environments.

Our CEO, Kurt Mueffelmann said in today’s announcement, “The SharePoint capabilities of Office 365 make it simple to create content and share it with a global audience. However, its ease of collaboration and the resulting upsurge of content also come with increased risk. We recently surveyed SharePoint users during a webinar, and 81% of respondents said user mistakes have been the leading source of actual damage from breaches. Security Sheriff provides organizations with the ability to apply granular security controls around content, to limit the damage that can be done by unfettered collaboration.”

Security Sheriff for Office 365 uses our full-text, high-speed policy scanning for real-time monitoring and control of the full document information lifecycle. We’re also finding enterprises planning cloud-centric or exclusive use of the cloud with Office 365. To support this model, Security Sheriff is now available on Microsoft Azure, giving organizations the flexibility to deploy best of breed compliance without any legacy on premises servers.

Screen Shot of Screen shot of Site Sheriff View Results

Screen shot of Site Sheriff View Results

More information can be found online. You can also stop by and visit us at the HiSoftware booth (#702) during SPTechCon in Austin, Texas, from Feb. 8-11, 2015 to discuss more about Security Sheriff for Office 365.

HiSoftware Sheriff and Chris McNulty to Arrive in Austin for SPTechCon

Logo for SPTechCon TexasNext week, the Sheriff is in town at SPTechCon in Austin Texas. HiSoftware and Cryptzone (if you haven’t heard we’re merging) will offer advice on how to keep SharePoint content secure while maximizing your investment in the collaboration platform. Head on over to the HiSoftware/Cryptzone Booth (702) to learn more about our award-winning solutions for secure collaboration and what we have in store for Office 365 – check our blog for the announcement on Feb 9th.

Chris McNulty’s On Demand Webinar on Securing Office 365

Control Key on Computer KeyboardSharePoint has come a long way since 2001. As the next generation, SharePoint Online, gains momentum with Office 365, security admins need to rethink their approaches to securing sensitive information.

California Data Breach Report Says Encryption for Healthcare is a Must

Decorative image of gray padlockAt the forefront of privacy and security issues, California has recently released its 2014 California Data Breach Report. Detailed within the report is an overview of the damaging data breaches impacting California as well as the state’s nine recommendations for data security. Why should we care about what California is doing?

Best Compliance and Security Resources of 2014

Decorative image of 2014It feels like we just started 2014, but somehow it is already December. With the year coming to a close, it is a great time to reflect back on lessons learned. Over the past year, we’ve blogged on topics ranging from data privacy, SharePoint security, Web accessibility, content compliance, HIPAA, ITAR and much more, to help any organization seeking to improve content compliance and security with suggestions on where to start, what to avoid and best practices.

As we wrap up another year, we thought we would share our top viewed blogs of 2014:

Keeping Data Safe This Black Friday

Decorative image of "E-Buy" Computer Key Tomorrow, most Americans will be enjoying Thanksgiving festivities with their family, celebrating what they are truly thankful for over a feast of plenty. However, the Friday after is a different story. While some might want to stay put and watch the shopping unfold on the news, others will be in the depths of shopping galore. And while I do like a little shopping myself, I’d like to take a minute to remind everyone about keeping data safe this black Friday.

High profile retail data breaches have also been of plenty over the last year. It was almost a year ago that Target was breached, and Sally Beauty, Neiman Marcus, Michaels, Kmart and Home Depot have all recently suffered data breaches that exposed their customers’ personal and payment card data. With billions to be spent on Black Friday, and a lot of that spent via credit and debit cards, retailers are responsible for a whopping amount of personally identifiable information (PII) and financial information.

What Every Business Can Learn from Snowden

Decorative image of 4News out that there is a second or even third leaker turning sensitive documents about the U.S. government’s terrorist watch list to a journalist reminds us all about the security of information. With this in mind, today we focus on what every business can learn from Snowden.

While you may not be keeping national secrets, content is the bread and butter for any organization. It might be customer information, HR details, intellectual property (IP) or financial and commercial information. For organizations to get the most out of content, we collaborate on it. We have it stored in platforms like SharePoint or in file shares. It is online, offline, in the cloud, on our desktops or mobile devices. We need it to achieve an end goal.

2014 Sees 25% Increase in Data Breaches

Decorative image of infographic on data breachesAnother year, another data breach; or so it seems. Year after year, the importance of securing personally identifiable information (PII), protected health information (PHI), credit card information or even company confidential information increases. In our globally connected world, data needs to be secured.

Discouragingly though, the Identify Theft Resource Center (ITRC) reports that as of this week’s total of 644 breaches, there has been a 25.3 percent increase over the same time period last year (514 breaches).

Trick or Treat? IT Security Pros Beware

IT security professionals, beware! Here are four individuals you’ll want to avoid this Halloween and steps you can take to protect your organization against them throughout the year!

Decorative image of vampire mouth and teethThe Vampire

Vampires feed on the blood of living creatures and cause mischief amongst the neighborhoods they live. This Halloween, avoid vampires in the workplace. These are the employees that maliciously suck information like client contacts, internal communications on products and confidential information from the organization. With 50% of employees admitting to taking corporate data with them when they leave a job, it’s important these vampires are stopped.

HiSoftware’s New Product and Accessibility Training Portal

Screenshot of  training video portalWant to learn more about using HiSoftware’s products? Now we have the tool for you. Today we announced the availability of a new on-demand, video-based Product and Accessibility Training Portal to improve customers’ working knowledge of products and provide in-depth Web accessibility training for developers.

Powered by WordPress