{"id":13995,"date":"2018-04-18T00:00:00","date_gmt":"2018-04-18T05:00:00","guid":{"rendered":"https:\/\/centricconsulting.com\/post\/protect-your-assets-in-office-365-azure_portal\/"},"modified":"2021-12-15T00:14:54","modified_gmt":"2021-12-15T05:14:54","slug":"protect-your-assets-in-office-365-azure_portal","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/protect-your-assets-in-office-365-azure_portal\/","title":{"rendered":"How to Protect Your Most Valuable Assets in Office 365 and Azure"},"content":{"rendered":"
Security is a broad topic, but the goal is the same. Most of us just want to know answers to questions like:<\/p>\n
Security used to be a scary topic, somewhat inaccessible and best reserved for nerds and cyber sleuths. Now it\u2019s critical.<\/p>\n
While working as a consultant at a global manufacturer in the 1990\u2019s, I first heard the phrase, \u201cSecurity is everybody\u2019s business.\u201d This company had, and still has I imagine, a robust security-training program with videos and classes and such.<\/p>\n
I admit that I scoffed at this effort until the first time I flew somewhere for business. Across the aisle and one row up, a well-dressed man extracted a laptop and shared with all of us the financial information of his company. Ah, I thought, now I understand.<\/p>\n
We\u2019ve come a long way since those days. Yet I still get questioned today about why I use complex passwords and two-factor authentication for everything. Hint: Some service passwords in Azure require 12 characters and I will always recommend multi-factor authentication.<\/i><\/p>\n
With everything in the cloud, security is now more important than ever. Especially when it comes to protecting your two biggest assets: identity and information.<\/p>\n
This focus on those two assets \u2013 from the tools available to how they work together to achieve a holistic and security-centric approach to your cloud investment in Office 365 and Azure.<\/p>\n
While the focus won\u2019t be on the technical procedures to implementing these tools, rest assured that I\u2019ll direct you to the technical references everywhere possible.<\/p>\n
Read the blogs:<\/p>\n
Up first, Office 365 and Azure Encryption. This topic will serve as a platform for baseline security in the cloud and thus is involved in most of the other topics. Bookmark this page and check back weekly.<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" In this blog series, we explain the tools available and how they work together to protect your assets in Microsoft Office 365 and Azure.<\/p>\n","protected":false},"author":147,"featured_media":17663,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[18559,19110],"coauthors":[],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-21 20:49:45","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/13995"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=13995"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/13995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/17663"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=13995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=13995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=13995"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=13995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Want to learn more about Office 365 and Azure implementations or protecting your organization\u2019s information assets? Contact us<\/a>.<\/em><\/h3>\n<\/header>\n