Securing Microsoft Teams: 4 Tactics For Regulated Organisations
How to improve your management of workspaces, document permissions, data retention, and external sharing to comply with HIPPA, GDPR, state record regulations, and more
Tuesday, October 27 @ 2:00 PM BST
Duration: 1 Hour
Principal Solutions Engineer, AvePoint
Jay LeaskPrincipal Solutions Engineer, AvePoint
A seasoned consultant with a focus on digital collaboration and stakeholder engagement, Jay uses 20 years of IT experience to engage customers in designing solutions to increase the value and decrease risk of their Microsoft investments. Jay Leask is a Solutions Architect for AvePoint Public Sector and co-host of the "Speed of Technology Podcast, On the SPOT."
What Regulated Industry Organisations Need to Be Aware of
With the uptick in Microsoft Teams usage, organisations need to protect the data being generated and shared without slowing down collaboration.
While the regulated data types differ, nearly all industry data regulations state sensitive data:
- Needs to be retained for a specific period of time
- Should only be accessed by the minimum number of people who need access
This webinar will cover 4 different tactics, using native and third-party tools, for how to ensure sensitive data is retained and accessed appropriately—and how organisations can audit and prove their compliance!
What We Will Cover:
Tactic 1: Create Team templates for Teams hosting sensitive information and monitor for configuration/membership drift.
Microsoft Teams allows administrators to create templates for common use cases that can be leveraged for Teams that will host sensitive information. We’ll show you the best practices for leveraging this native feature and the challenges of monitoring configuration drift throughout a Team’s lifecycle (and what you can do about it).
Tactic 2: Review, monitor and audit permissions to sensitive data and documents
Now that you have your Teams and workspaces secured, you need to be able to review who has access to what sensitive information. We’ll show you how to find sensitive content using native tools, the challenges of combing through permission reports, and best practices for mitigating oversharing of sensitive information.
Tactic 3: Ensure adequate data protection and retention
Microsoft 365 retention policies can help protect your sensitive data. We will show you the best practices for leveraging this tool while demonstrating the gaps that exist and provide real-world examples of how regulated companies have covered them.
Tactic 4: Review guest access and external sharing settings
Guest access and external sharing are complicated! It can be impacted by settings across half a dozen admin centers. Additionally, guest access is now enabled by default in new Microsoft Teams deployments. We will show you how to right-size your guest access and external sharing settings across your organisation (as well as how to create different settings for each department or business unit) along with best practices for guest governance.