SlideShare a Scribd company logo
1 of 12
Download to read offline
 Table of Contents
 Encrypt Files On OneDrive
 Why Encrypt OneDrive Folder?
 A Life With No Encryption
 Step-by-Step How To Encrypt OneDrive
Folder
 If there was a betting agency that would take
my money for this, I would bet everything I
have… Okay, maybe not everything I have.
But, maybe £10?
 In this economy, that’s almost enough to buy
a small tub of Lurpak!
 So, what exactly am I betting a tub of Lurpak
on? I’m betting on the likelihood that your
Onedrive account harbours the majority of
the private and confidential information your
business holds.
 Finding ways to encrypt Onedrive folder is
crucial in today’s digital world. With cloud
storage services becoming increasingly
popular for storing and sharing files,
ensuring the security of your data has never
been more critical.
 Encrypting your OneDrive folder is one of the
most effective ways to enhance your security
whilst you and your employees work with
‘The Cloud’.
 OneDrive offers convenient access to your
files from any device with an internet
connection. But, whilst this accessibility is a
great advantage, it also introduces potential
risks to your business’s stored confidential
data.
 Without encryption, your files are vulnerable
to unauthorized access – especially if your
Microsoft account is compromised!
 Unauthorized Access: Without encryption, anyone
who gains access to your OneDrive account can
freely view and download your files.
 Data Breaches: In the unfortunate event of a data
breach on Microsoft’s servers or your account,
any unencrypted files are left wide open to be
easily accessed by unauthorized parties.
 Corporate Espionage: Any encrypted business
files could also be targeted by your enemies (also
known as your competitors) who are looking to
gain a competitive advantage. Your sensitive
company data, proprietary information, and
strategic plans could be compromised.
 Step 1: Evaluate Your Encryption Options
Jera it persentation.pdf
Jera it persentation.pdf
Jera it persentation.pdf
Jera it persentation.pdf

More Related Content

Similar to Jera it persentation.pdf

uLaw - Practice Management Security Simplified
uLaw - Practice Management Security SimplifieduLaw - Practice Management Security Simplified
uLaw - Practice Management Security SimplifieduLawPractice Jillian Lim
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentationJoan Dembowski
 
Cloud Computing siya.pptx
Cloud Computing siya.pptxCloud Computing siya.pptx
Cloud Computing siya.pptx1447SwatiKoli
 
What's New with OneDrive
What's New with OneDriveWhat's New with OneDrive
What's New with OneDriveDrew Madelung
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16William Mann
 
Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!Henge Systems
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRBJohn Mayfield
 
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSCLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSStuart Crawford
 
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp
 
One Drive Document (draft).docx
One Drive Document (draft).docxOne Drive Document (draft).docx
One Drive Document (draft).docxM.Saadat Nawaz
 
SPUnite17 SharePoint and Data Loss Prevention
SPUnite17 SharePoint and Data Loss PreventionSPUnite17 SharePoint and Data Loss Prevention
SPUnite17 SharePoint and Data Loss PreventionNCCOMMS
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011John Mayfield
 
Oracle_Documents_Cloud_Service
Oracle_Documents_Cloud_ServiceOracle_Documents_Cloud_Service
Oracle_Documents_Cloud_ServiceSimone Gray
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudLiwei Ren任力偉
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...
CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...
CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...Jasper Oosterveld
 
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365DavidNicholls52
 

Similar to Jera it persentation.pdf (20)

uLaw - Practice Management Security Simplified
uLaw - Practice Management Security SimplifieduLaw - Practice Management Security Simplified
uLaw - Practice Management Security Simplified
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
It’s in the clouds
It’s in the cloudsIt’s in the clouds
It’s in the clouds
 
Cloud Computing siya.pptx
Cloud Computing siya.pptxCloud Computing siya.pptx
Cloud Computing siya.pptx
 
What's New with OneDrive
What's New with OneDriveWhat's New with OneDrive
What's New with OneDrive
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16
 
Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!Debunking the mysteries of cloud computing!
Debunking the mysteries of cloud computing!
 
Working in the Cloud for the CRB
Working in the Cloud for the CRBWorking in the Cloud for the CRB
Working in the Cloud for the CRB
 
Dart Key ENG
Dart Key ENGDart Key ENG
Dart Key ENG
 
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESSCLOUD SERVICE IS NOW OPEN FOR BUSINESS
CLOUD SERVICE IS NOW OPEN FOR BUSINESS
 
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
 
One Drive Document (draft).docx
One Drive Document (draft).docxOne Drive Document (draft).docx
One Drive Document (draft).docx
 
SPUnite17 SharePoint and Data Loss Prevention
SPUnite17 SharePoint and Data Loss PreventionSPUnite17 SharePoint and Data Loss Prevention
SPUnite17 SharePoint and Data Loss Prevention
 
Nice, France Talk. Working in the Cloud, 2011
Nice, France Talk.  Working in the Cloud, 2011Nice, France Talk.  Working in the Cloud, 2011
Nice, France Talk. Working in the Cloud, 2011
 
Oracle_Documents_Cloud_Service
Oracle_Documents_Cloud_ServiceOracle_Documents_Cloud_Service
Oracle_Documents_Cloud_Service
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Cloud for everyone
Cloud for everyoneCloud for everyone
Cloud for everyone
 
CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...
CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...
CDBRE2024 - Protect and govern your sensitive data with Microsoft Purview in ...
 
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
Pure Bookkeeping Webinar, Productivity and Security with Microsoft Office 365
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Jera it persentation.pdf

  • 1.
  • 2.  Table of Contents  Encrypt Files On OneDrive  Why Encrypt OneDrive Folder?  A Life With No Encryption  Step-by-Step How To Encrypt OneDrive Folder
  • 3.  If there was a betting agency that would take my money for this, I would bet everything I have… Okay, maybe not everything I have. But, maybe £10?  In this economy, that’s almost enough to buy a small tub of Lurpak!  So, what exactly am I betting a tub of Lurpak on? I’m betting on the likelihood that your Onedrive account harbours the majority of the private and confidential information your business holds.
  • 4.  Finding ways to encrypt Onedrive folder is crucial in today’s digital world. With cloud storage services becoming increasingly popular for storing and sharing files, ensuring the security of your data has never been more critical.  Encrypting your OneDrive folder is one of the most effective ways to enhance your security whilst you and your employees work with ‘The Cloud’.
  • 5.
  • 6.  OneDrive offers convenient access to your files from any device with an internet connection. But, whilst this accessibility is a great advantage, it also introduces potential risks to your business’s stored confidential data.  Without encryption, your files are vulnerable to unauthorized access – especially if your Microsoft account is compromised!
  • 7.  Unauthorized Access: Without encryption, anyone who gains access to your OneDrive account can freely view and download your files.  Data Breaches: In the unfortunate event of a data breach on Microsoft’s servers or your account, any unencrypted files are left wide open to be easily accessed by unauthorized parties.  Corporate Espionage: Any encrypted business files could also be targeted by your enemies (also known as your competitors) who are looking to gain a competitive advantage. Your sensitive company data, proprietary information, and strategic plans could be compromised.
  • 8.  Step 1: Evaluate Your Encryption Options