recommended reading

Fed Tech

Brought to you by: CDW-G

Sponsor Content What's this?

How Office 365 Helps Feds Handle Sensitive Data on Mobile Devices

Federal officials often tread slowly when it comes to adopting new technologies to handle sensitive information. Relying on employees to follow policies on classified information is also a challenge. But Microsoft Office 365 can reduce the likelihood of staff falling prey to phishing scams, accidentally copying classified information, or forwarding files to personnel who aren’t authorized to view them. Here are four ways Office 365 keeps sensitive information safe.

1. Conditional Access Rules Limit Breaches 

Compliance policies only allow users access to Office 365 services if a device meets predefined requirements. This may include whether a password is required to unlock a device or whether a device is encrypted. If a device doesn’t comply, Microsoft guides users through the steps to resolve the issue and prevents access to emails or files. This level of protection requires an Azure Active Directory Premium license.

2.  Advanced Threat Protection from Attachments 

Microsoft added two features, URL Detonation and Dynamic Delivery, to Office 365 to improve protection and performance. URL Detonation scans links to Office files, PDFs and executables. In a sandboxed environment, advanced threat protection checks whether a file might involve malicious behavior and, if so, blocks access to that link. Dynamic Delivery lets users read messages as attachments are scanned. Previously, Microsoft scanned files with an anti-malware engine, but this feature led to a delay in users accessing email as it analyzed attachments. Users must activate both options.

3. Data Loss Prevention Keeps Information Inside Agencies 

This feature analyzes content in Exchange Online, SharePoint Online and OneDrive for Business sites to determine if sensitive and personally identifiable information (including credit card numbers and civilian pay grades) should be protected and monitored. DLP ensures that information doesn’t leave an agency or is forwarded to the wrong people. It also uses Exchange transport rules to determine whether Outlook should act on a message before it is delivered, such as warning users they may be violating a policy on classified information.

4. Rights Management Protects Files Anywhere 

Office 365 Rights Management is designed to secure files and email no matter their location, meaning that even when documents are emailed to an outside organization, it’s possible to control who can view the information and what can be done with it. Office 365 Rights Management Services (RMS) uses simple transport rules to classify files, label them and protect them in one step. Users can manually select a classification. In addition, users can revoke access to documents. While the Office mobile apps for iOS, Android, and Windows Mobile can consume RMS-protected content, they cannot create it.

This content is made possible by FedTech. The editorial staff of Nextgov was not involved in its preparation.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.