{"id":105267,"date":"2022-01-27T09:00:00","date_gmt":"2022-01-27T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=105267"},"modified":"2024-04-08T13:50:34","modified_gmt":"2024-04-08T20:50:34","slug":"3-considerations-for-a-holistic-approach-to-data-protection","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/01\/27\/3-considerations-for-a-holistic-approach-to-data-protection\/","title":{"rendered":"Discover 3 ways to take a holistic approach to data protection"},"content":{"rendered":"\n

The risk landscape for organizations has changed significantly in the past few years. Traditional ways of identifying and mitigating risks simply don\u2019t work. While traditionally, organizations have focused on external threats, risks from within the organization are just as prevalent and harmful. These risks include unprotected and ungoverned data, insiders doing or saying things they shouldn\u2019t, as well as ever-changing regulations. Also, with more than 300 million people working remotely, data is being created, accessed, shared, and stored outside of the traditional borders of business. Enterprises need to quickly move to a more holistic approach to data protection and reduce their overall risk.<\/p>\n\n\n\n

This means extending data protection across all aspects of a business: people, places, processes, and products. Risk and security practitioners will benefit from an end-to-end data governance<\/a> solution to help protect data, manage risks, and satisfy regulatory requirements. Let\u2019s explore how to introduce a comprehensive approach to data protection within your organization.<\/p>\n\n\n\n

1. Identifying and protecting sensitive data<\/h2>\n\n\n\n

Information protection<\/a> starts with data discovery<\/a>, understanding your data landscape, and identifying important data across your hybrid environment. The next priority is protection, working to strike a balance between security and productivity. The third is data loss prevention<\/a> (DLP). One of the biggest DLP challenges is responding to data exfiltration from within an organization. A holistic approach can detect such threats sooner, especially when coupled with an effective insider risk solution and program.<\/p>\n\n\n\n

2. Identifying and managing insider risks<\/h2>\n\n\n\n

Investigating and remediating both malicious and inadvertent activities within your organization is critically important. In conjunction with DLP, insider risk management<\/a> can offer the context necessary to better employ policies to help enforce the rules and identify risks.<\/p>\n\n\n\n

3. Managing compliance <\/h2>\n\n\n\n

When prioritizing which data to protect, enterprises must also consider internal and external requirements that dictate how their data is handled. Not abiding by regulations could mean costly fines and increased risk. A compliance manager solution<\/a> can help with everything from taking inventory of data protection risks and staying current on regulations to reporting for auditors. It should be included in a holistic solution.<\/p>\n\n\n\n

Expertise from the new season of Uncovering Hidden Risks<\/h2>\n\n\n\n

Interested in exploring this data protection<\/a> approach but not sure how to get started? Future episodes of the Uncovering Hidden Risks podcast will give risk, security practitioners, and C-suite leaders an expert resource as they tackle important questions and reduce their overall risk.<\/p>\n\n\n\n

Launching in March 2022, the third season of the podcast will offer monthly episodes featuring an expert panel of Microsoft leaders and community influencers. Podcast episodes will explore: <\/p>\n\n\n\n