Im neuen Memorandum des Office of Management and Budget (dem US-amerikanischen Amt für Verwaltung und Haushaltswesen - OMB) sind Datensicherheitsverletzungen und Standards für die Sicherung personenbezogener Informationen definiert; diese können IT-Teams helfen, besser auf Datensicherheitsverletzungen, wovon personenbezogene Daten betroffen sind, vorbereitet zu sein.
New OMB Memo defines data breaches and standards for securing PII and can better prepare IT teams for breaches involving PII. If you are stressed about data privacy, you can download our eBook that walks through how to keep your SharePoint content safe.
A few years ago, when I first started with Metalogix, there was a growing concern that SharePoint 2013 might be SharePoint’s last big rodeo. With increasing cloud functionality and massive growth in Office 365, I predicted to our CTO that SharePoint would become the infrastructure of Office 365 and lose its brand.
This week, he reminded me of that conversation. He was right, SharePoint wasn’t dead.
Managing the security of organizational content is a growing concern, particularly in the financial services sector. For many of these organizations, SharePoint functions as the 'one source of the truth' for storing and disseminating legal documentation and other sensitive customer financial data.
There is a widespread perception that creating a hybrid on-premises and cloud environment using Microsoft SharePoint is complicated and costly. This is far from the truth – in reality, it is really no different than when you’ve been tasked to join two systems together in the past.
Data Breach Landscape
As the Product Manager for the Replicator product, I’m excited to write about the release of version 7.1. It was a great experience learning from our solution engineers, developers and customers about all of the capabilities within Replicator. One consistent message from all my teachers was that replication/synchronization of SharePoint content isn’t a simple thing, and that there’s a lot that goes into monitoring the flow of content from one location to the next.
By the end of 2014, there were about 63.4 million iPhones in use around the United States according to Statista (Apple hasn’t released current user numbers). The takeaway is simple, tens of millions of iOS users have become accustomed to purchasing new devices and using their Apple ID to sync their photos, music, notes, contacts and bookmarks with iCloud.
So how do you get them to use content collaboration tools on those devices?
The NSA security data breach by Edward Snowden (much of it leaked from a SharePoint server); Sony Pictures hack of personal information; and a number of other high profile private and government system breaches in the past year have been a wakeup call for businesses and the public sector to review their security strategies. These attacks proved successful because privileged credentials were compromised and exploited. And the stakes are getting higher – perpetrators are no longer lone hackers, but organized groups, some allegedly sponsored by nation states.
Hopefully you've been able to read Part One that covered the features like app launcher, cloud UI, OneDrive for Business, Search, Sharing, and Durable links. No, there was no particular reason how these features are divided, it just worked out that way. Let's jump right in.