SlideShare a Scribd company logo
1 of 41
Download to read offline
Office 365 Security
Features that
Nonprofits Should
Know and Use
February 11, 2019
Using ReadyTalk
Chat to ask questions
All lines are muted
If you lose your Internet connection, reconnect
using the link emailed to you.
You can find upcoming and past webinars on
the TechSoup website:
www.techsoup.org/community/events-webinars
You will receive an email with this presentation,
recording, and links
Tweet us @TechSoup and use hashtag
#tswebinars
A Global Network
Bridging Tech Solutions
and Services for Good
Where are you on the map?
Acclivity
Adobe
Alpha Software
Atlas Business Solutions
Atomic Training
Autodesk
Azavea
BetterWorld
Bitdefender
Blackbaud
Bloomerang
Box
Brocade
Bytes of Learning
Caspio
CauseVox
CDI Computer Dealers
Cisco
Citrix
CitySoft
CleverReach
ClickTime
Closerware
Comodo
Connect2Give
Dell
Dharma Merchant Services
Digital Wish
Dolby
DonorPerfect
Efficient Elements
FileMaker
GoDaddy
GrantStation
Guide By Cell
Headsets.com
Horizon DataSys
HR Solutions Partners
Huddle
Idealware
InFocus
Informz
InterConnection
Intuit
JourneyEd
Litmos
Little Green Light
Mailshell
Microsoft
Mobile Beacon
NetSuite
Nielsen
NonProfitEasy
O&O Software
Quickbooks Made Easy
Reading Eggs
ReadyTalk
Red Earth Software
Sage Software
Shopify
Simple Charity Registration
Skillsoft
Smart Business Savings
Society for Nonprofit Organizations
Sparrow Mobile
Symantec
Tableau
TechBridge
Tech Impact
Teespring
Telosa
Tint
Ultralingua
Western Digital
Zoner
Presenters
Linda Widdop
Director of Client Solutions and Education - IT
Services
TechImpact
Cameron Jones,
Vice President, Solutions and Services
TechSoup
Sima Thakkar
Senior Manager, Content
TechSoup
Assisting with chat:
Zerreen Kazi, TechSoup
Sima Thakkar
Senior Manager, Content
TechSoup
Cameron Jones
Vice President,
Solutions and Services,
TechSoup
Linda Widdop
Director of Client
Solutions and Education -
IT Services, Tech Impact
Office 365 Security Features that Nonprofits Should Know and Use
February 11, 2019
ABOUT US
Providing high impact
services to nonprofits
since 2003
Tech Impact Philosophy & Team
Our mission
Empower communities and nonprofits
to use technology to better serve our
world.
Cloud Redundancy
Security Monitoring
Cloud Identity
Device Management
Application Selection
Visualization
Analysis
Data Support
Managed Services
VoIP Telephony
Cloud Infrastructure
Cloud Collaboration
Strategy Consulting
Machine Learning & AI
Virtual CIO
Community Design
DigitalTransformationforSocialChange
4
changing the
world through
community-
grounded
technology
• Just like you, we are a 501c3 Nonprofit
• 60 full time, dedicated nonprofit staff
• 4 main offices – Phila, DC, Wilmington, Las Vegas
• Providing IT Services to Nonprofits since 2003
• Serving 200+ NGO’s with Managed IT Services nationally
• Network engineering and implementation nationally
• 900+ Office365 Assessment & Implementations globally
• VoIP Phone Services nationally
• Data Analytics and Support Services
Solutions.Integration.Support.
Security Overview
Security Concerns
External Hackers
• Cash (ransom payments, payroll
redirection, account credentials)
• Marketable Data (sold per record for
medical fraud or tax scams)
• Embarrassing Information (activist hackers
looking to damage your organization)
Internal Staff
• Accidental distribution of sensitive information
(emailed PII, lost devices, etc)
• Intentional coverup of questionable or illegal
behavior (deleting or modifying records)
• Intentional removal of sensitive information
for profit, espionage, or extortion
Cyber Security Threat Vectors
8
Account
Security
Device
Security
Ensure our devices are safe and
that their loss will not endanger the
organization
Malware
Controls
Network
Controls
Minimize the exposure of our
devices to risky software and
websites, and ensure that active
protections are in place to defend
against new and unknown malware
Monitor our networks and protect
them from direct penetration
attempts
Ensure that people have only the
level of access they really need,
and that we know who is
accessing what
Data
Loss
Controls
Item-
level
Encrypt-
ion
Ensure that sensitive information
doesn’t intentionally or
accidentally get put somewhere
unsafe, or sent to someone who
shouldn’t have it
Provide extra protection to
specific highly sensitive
information to prevent sharing
What is Device Security
• Allows organizations to limit which devices are accessing data
• Allows organizations to enforce settings on devices that are exposed
to sensitive information
• Allows organizations to manage updates, anti-virus, and other key
features of mobile devices
• Allows organizations to wipe sensitive data from devices when
employees leave or devices are lost
Device
Security
What is Item-Level Encryption
• Allows organizations to protect sensitive data regardless of it’s
location. Protected files can be stored on thumb drives or emailed
outside of the organization without fear of data loss.
• Prevents users from sharing content unless permitted by the
organization. Protected files can’t be forwarded and some control is
provided over printing, copy/paste, etc.
Item-
level
Encrypt-
ion
What are Data Loss Controls
• Monitor for the accidental or intentional sharing of sensitive
information like Social Security Numbers and other PII
• Monitor the location of sensitive information
• Use heuristic analysis to identify suspicious patterns of behavior that
might indicate compromise or intentional removal of data
Data
Loss
Controls
What is Account Security
• Ensure that each account is used by one user
• Ensure that each account is used by the correct user
• Monitor for suspicious login activity
Account
Security
How can we protect ourselves?
13
Malware
Controls
Data
Loss
Controls
Account
Security
Device
Security
Network
Controls
Item-
level
Encrypt-
ion
Antivirus/Antimalware
Content Filtering Tools
Firewalls/VPNs
OS Version/updates
What can Office 365 do?
14
Data
Loss
Controls
Account
Security
Device
Security
Item-
level
Encrypt-
ion
• Ensure only secure devices can access our cloud-based data
• Configure devices for encryption, strong passwords, and other key
compliance settings
• Enforce Multi Factor authentication
• Monitor for unauthorized account access attempts
• Monitor for account or security configuration changes
• Detect and mitigate attempts to send sensitive information
externally or via insecure methods
• Ensure sensitive information isn’t stored in insecure locations
• Protect key records by ensuring they are encrypted no matter where
they live
• Prevent staff from sharing highly sensitive information
Levels of Concern Vary
15
Data
Loss
Controls
Account
Security
Device
Security
Item-
level
Encrypt-
ion
Any Nonprofit
Orgs with standard
regulatory requirements
(HIPPA, FIRMA, etc)
Orgs with stringent
regulatory requirements
(Banking, GDPR)
Orgs with resourced
political enemies
Low LowLow Med
Med
High
High HighHigh High
High
Med
High
Low
Med
Med
16
Licensing Overview
Enterprise Licensing in Microsoft Cloud
• Office 365 – E1, E3, E5
• Enterprise Mobility + Security (EMS) – E3, E5
• Microsoft 365 – Bundle: Windows 10, Office 365, EMS
• Add-ons
• Office ProPlus
• Azure Rights Management
• Online Archiving
• Advanced Threat Protection
17
Office 365 Nonprofit Licenses
18
Calling plans are flat rate
$12 domestic / $24
international
per user per month or
consumption based per
minute.300 license limit 300 license limit 1000 license limit unlimited
Office 365 E3 Security Features
19
Office 365 E5 Advanced Security Features
20
O365 E3 + :
ž EMS E3 – up to 50 free, then
$2.50/user/month
ž Azure Active Directory P1
ž Azure Information Protection P1
ž Advanced Threat Analytics
ž Intune
•
21
https://docs.microsoft.com/en-us/azure/active-directory/active-directory-whatis
Levels of Microsoft Licensing Required
Data
Loss
Controls
Account
Security
Device
Security
Item-
level
Encrypt-
ion
Any Nonprofit
Orgs with standard
regulatory requirements
(HIPPA, FIRMA, etc)
Orgs with stringent
regulatory requirements
(Banking, GDPR)
Orgs with resourced
political enemies
Configuration & Support
How can we protect ourselves?
• Available through TechSoup or MSP
• Subscribe (DNS Umbrella, Barracuda, etc)
• Install/Configure a good firewall
• Windows 10 PRO – a must!
24
Malware
Controls
Device
Security
Network
Controls
Antivirus/Antimalware
Content Filtering Tools
Firewalls/VPNs
OS Version/updates
Do This First!
Levels of Professional Support Needed
Data
Loss
Controls
Account
Security
Device
Security
Item-
level
Encrypt-
ion
Any Nonprofit
Orgs with standard
regulatory requirements
(HIPPA, FIRMA, etc)
Orgs with stringent
regulatory requirements
(Banking, GDPR)
Orgs with resourced
political enemies
Recommended roadmap
Protect
User Impact
Detect
Respond
LASTNOW NEXT
Create data
inventory & sharing
policies
Low Moderate
Enable Data loss prevention
tools
High
Implementation Complexity
Implement SSO for all
applications
Enable MFA for
all users
Monitor admin accounts
Monitor for account and credential abuse
Enable MFA for admin
users Limit administrative
users
Implement comprehensive device
management tools
Implement social penetration testing and training tool
Develop capabilities to monitor alerts, investigate incidents, initiate remediation actions, and integrate lessons learned
Perform periodic external penetration testing
Develop a culture of security
Manage personal devices
Enable device based
encryption
Implement VPN or
network inspection tools
Professional Help is Available
27
. © TechSoup Global | All rights reserved28
TechSoup Courses on Office 365 and the Microsoft Cloud
https://techsoup.course.tc/catalog
. © TechSoup Global | All rights reserved29
TechSoup Services Offers that Support Office 365 Set-Up and Migration
• Basic Office 365 Set-Up
• This includes registration, O365 set up,
admin and end user training
• Office 365 Email Migration (<20 Users)
• Migrating organization’s emails to their O365
accounts and end cost is based on number
of mail boxes
• Office 365 DIY Migration Workshop for Small
Organizations
• Series of live instructional webinars
designed to guide organizations through
the process of migrating
YMCA East Bay
$400
$450 +
$310
Request a consult from our experts at:
https://page.techsoup.org/services
. © TechSoup Global | All rights reserved30
TechSoup Services Offers that Support Office 365 Set-Up and Migration
• Office 365 Email Migration (20+ users)
• SharePoint Set-Up
• SharePoint Data Migrations
• Power BI Set-Up & Configuration
YMCA East Bay
Request a consult from our experts at:
https://page.techsoup.org/services
Custom
Quote
. © TechSoup Global | All rights reserved31
TechSoup Services Offers that Support Office 365 Set-Up and Migration
Other Services to Support Nonprofits:
• IT Help Desk
• One-time fix - $55
• Ongoing support subscriptions - $35 per device per month
• Managed IT Services
• Ongoing support with custom quote
YMCA East Bay
Request a consult from our experts at:
https://page.techsoup.org/services
Q&A
This is your chance! Use the chat box to ask us
any questions you have about this
presentation.
Share and Learn
Chat in one thing that you learned in today’s
webinar.
Please complete our post-event survey. Your
feedback really helps.
Follow TechSoup on social media
(FB, Instagram, Twitter)
Visit the TechSoup Blog at blog.techsoup.org
Join us for our
upcoming webinars.
2/19
Cybersecurity in Low-Risk Organizations:
Understanding Your Risk and Making Practical
Improvements
2/21
Maximize Spring Fundraising and Maintain
Donors Through 2020
2/28
How to Drive Social Media Engagement with
Nonprofit Storytelling
3/11
How to Be a Data-Driven Organization with
Power BI
Archived Webinars:
www.techsoup.org/community-events
Thank you to our
webinar sponsor!
Please complete the post-event survey that will
pop up once you close this window.

More Related Content

What's hot

3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesSecurity Innovation
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineeringPeter Wood
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Securitysandra sukarieh
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Aralanrehbock
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsImperva
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service providerVishvendra Saini
 

What's hot (19)

3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
Data Security
Data SecurityData Security
Data Security
 

Similar to Office 365 Security Features That Nonprofits Should Know and Use

Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessRobert Crane
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksIT Masterclasses
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPowerSaturdayParis
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your businessBizSmart Select
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022lior mazor
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 

Similar to Office 365 Security Features That Nonprofits Should Know and Use (20)

Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorksTackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
Tackling GDPR with Microsoft 365 and Office 365 - SpiceWorks
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your business
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022User management - the next-gen of authentication meetup 27012022
User management - the next-gen of authentication meetup 27012022
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 

More from TechSoup

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 

More from TechSoup (20)

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 

Recently uploaded

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Office 365 Security Features That Nonprofits Should Know and Use

  • 1. Office 365 Security Features that Nonprofits Should Know and Use February 11, 2019
  • 2. Using ReadyTalk Chat to ask questions All lines are muted If you lose your Internet connection, reconnect using the link emailed to you. You can find upcoming and past webinars on the TechSoup website: www.techsoup.org/community/events-webinars You will receive an email with this presentation, recording, and links Tweet us @TechSoup and use hashtag #tswebinars
  • 3. A Global Network Bridging Tech Solutions and Services for Good Where are you on the map?
  • 4. Acclivity Adobe Alpha Software Atlas Business Solutions Atomic Training Autodesk Azavea BetterWorld Bitdefender Blackbaud Bloomerang Box Brocade Bytes of Learning Caspio CauseVox CDI Computer Dealers Cisco Citrix CitySoft CleverReach ClickTime Closerware Comodo Connect2Give Dell Dharma Merchant Services Digital Wish Dolby DonorPerfect Efficient Elements FileMaker GoDaddy GrantStation Guide By Cell Headsets.com Horizon DataSys HR Solutions Partners Huddle Idealware InFocus Informz InterConnection Intuit JourneyEd Litmos Little Green Light Mailshell Microsoft Mobile Beacon NetSuite Nielsen NonProfitEasy O&O Software Quickbooks Made Easy Reading Eggs ReadyTalk Red Earth Software Sage Software Shopify Simple Charity Registration Skillsoft Smart Business Savings Society for Nonprofit Organizations Sparrow Mobile Symantec Tableau TechBridge Tech Impact Teespring Telosa Tint Ultralingua Western Digital Zoner
  • 5. Presenters Linda Widdop Director of Client Solutions and Education - IT Services TechImpact Cameron Jones, Vice President, Solutions and Services TechSoup Sima Thakkar Senior Manager, Content TechSoup Assisting with chat: Zerreen Kazi, TechSoup Sima Thakkar Senior Manager, Content TechSoup Cameron Jones Vice President, Solutions and Services, TechSoup Linda Widdop Director of Client Solutions and Education - IT Services, Tech Impact
  • 6. Office 365 Security Features that Nonprofits Should Know and Use February 11, 2019
  • 7. ABOUT US Providing high impact services to nonprofits since 2003 Tech Impact Philosophy & Team
  • 8. Our mission Empower communities and nonprofits to use technology to better serve our world.
  • 9. Cloud Redundancy Security Monitoring Cloud Identity Device Management Application Selection Visualization Analysis Data Support Managed Services VoIP Telephony Cloud Infrastructure Cloud Collaboration Strategy Consulting Machine Learning & AI Virtual CIO Community Design DigitalTransformationforSocialChange 4 changing the world through community- grounded technology
  • 10. • Just like you, we are a 501c3 Nonprofit • 60 full time, dedicated nonprofit staff • 4 main offices – Phila, DC, Wilmington, Las Vegas • Providing IT Services to Nonprofits since 2003 • Serving 200+ NGO’s with Managed IT Services nationally • Network engineering and implementation nationally • 900+ Office365 Assessment & Implementations globally • VoIP Phone Services nationally • Data Analytics and Support Services Solutions.Integration.Support.
  • 12. Security Concerns External Hackers • Cash (ransom payments, payroll redirection, account credentials) • Marketable Data (sold per record for medical fraud or tax scams) • Embarrassing Information (activist hackers looking to damage your organization) Internal Staff • Accidental distribution of sensitive information (emailed PII, lost devices, etc) • Intentional coverup of questionable or illegal behavior (deleting or modifying records) • Intentional removal of sensitive information for profit, espionage, or extortion
  • 13. Cyber Security Threat Vectors 8 Account Security Device Security Ensure our devices are safe and that their loss will not endanger the organization Malware Controls Network Controls Minimize the exposure of our devices to risky software and websites, and ensure that active protections are in place to defend against new and unknown malware Monitor our networks and protect them from direct penetration attempts Ensure that people have only the level of access they really need, and that we know who is accessing what Data Loss Controls Item- level Encrypt- ion Ensure that sensitive information doesn’t intentionally or accidentally get put somewhere unsafe, or sent to someone who shouldn’t have it Provide extra protection to specific highly sensitive information to prevent sharing
  • 14. What is Device Security • Allows organizations to limit which devices are accessing data • Allows organizations to enforce settings on devices that are exposed to sensitive information • Allows organizations to manage updates, anti-virus, and other key features of mobile devices • Allows organizations to wipe sensitive data from devices when employees leave or devices are lost Device Security
  • 15. What is Item-Level Encryption • Allows organizations to protect sensitive data regardless of it’s location. Protected files can be stored on thumb drives or emailed outside of the organization without fear of data loss. • Prevents users from sharing content unless permitted by the organization. Protected files can’t be forwarded and some control is provided over printing, copy/paste, etc. Item- level Encrypt- ion
  • 16. What are Data Loss Controls • Monitor for the accidental or intentional sharing of sensitive information like Social Security Numbers and other PII • Monitor the location of sensitive information • Use heuristic analysis to identify suspicious patterns of behavior that might indicate compromise or intentional removal of data Data Loss Controls
  • 17. What is Account Security • Ensure that each account is used by one user • Ensure that each account is used by the correct user • Monitor for suspicious login activity Account Security
  • 18. How can we protect ourselves? 13 Malware Controls Data Loss Controls Account Security Device Security Network Controls Item- level Encrypt- ion Antivirus/Antimalware Content Filtering Tools Firewalls/VPNs OS Version/updates
  • 19. What can Office 365 do? 14 Data Loss Controls Account Security Device Security Item- level Encrypt- ion • Ensure only secure devices can access our cloud-based data • Configure devices for encryption, strong passwords, and other key compliance settings • Enforce Multi Factor authentication • Monitor for unauthorized account access attempts • Monitor for account or security configuration changes • Detect and mitigate attempts to send sensitive information externally or via insecure methods • Ensure sensitive information isn’t stored in insecure locations • Protect key records by ensuring they are encrypted no matter where they live • Prevent staff from sharing highly sensitive information
  • 20. Levels of Concern Vary 15 Data Loss Controls Account Security Device Security Item- level Encrypt- ion Any Nonprofit Orgs with standard regulatory requirements (HIPPA, FIRMA, etc) Orgs with stringent regulatory requirements (Banking, GDPR) Orgs with resourced political enemies Low LowLow Med Med High High HighHigh High High Med High Low Med Med
  • 22. Enterprise Licensing in Microsoft Cloud • Office 365 – E1, E3, E5 • Enterprise Mobility + Security (EMS) – E3, E5 • Microsoft 365 – Bundle: Windows 10, Office 365, EMS • Add-ons • Office ProPlus • Azure Rights Management • Online Archiving • Advanced Threat Protection 17
  • 23. Office 365 Nonprofit Licenses 18 Calling plans are flat rate $12 domestic / $24 international per user per month or consumption based per minute.300 license limit 300 license limit 1000 license limit unlimited
  • 24. Office 365 E3 Security Features 19
  • 25. Office 365 E5 Advanced Security Features 20 O365 E3 + :
  • 26. ž EMS E3 – up to 50 free, then $2.50/user/month ž Azure Active Directory P1 ž Azure Information Protection P1 ž Advanced Threat Analytics ž Intune • 21 https://docs.microsoft.com/en-us/azure/active-directory/active-directory-whatis
  • 27. Levels of Microsoft Licensing Required Data Loss Controls Account Security Device Security Item- level Encrypt- ion Any Nonprofit Orgs with standard regulatory requirements (HIPPA, FIRMA, etc) Orgs with stringent regulatory requirements (Banking, GDPR) Orgs with resourced political enemies
  • 29. How can we protect ourselves? • Available through TechSoup or MSP • Subscribe (DNS Umbrella, Barracuda, etc) • Install/Configure a good firewall • Windows 10 PRO – a must! 24 Malware Controls Device Security Network Controls Antivirus/Antimalware Content Filtering Tools Firewalls/VPNs OS Version/updates Do This First!
  • 30. Levels of Professional Support Needed Data Loss Controls Account Security Device Security Item- level Encrypt- ion Any Nonprofit Orgs with standard regulatory requirements (HIPPA, FIRMA, etc) Orgs with stringent regulatory requirements (Banking, GDPR) Orgs with resourced political enemies
  • 31. Recommended roadmap Protect User Impact Detect Respond LASTNOW NEXT Create data inventory & sharing policies Low Moderate Enable Data loss prevention tools High Implementation Complexity Implement SSO for all applications Enable MFA for all users Monitor admin accounts Monitor for account and credential abuse Enable MFA for admin users Limit administrative users Implement comprehensive device management tools Implement social penetration testing and training tool Develop capabilities to monitor alerts, investigate incidents, initiate remediation actions, and integrate lessons learned Perform periodic external penetration testing Develop a culture of security Manage personal devices Enable device based encryption Implement VPN or network inspection tools
  • 32. Professional Help is Available 27
  • 33. . © TechSoup Global | All rights reserved28 TechSoup Courses on Office 365 and the Microsoft Cloud https://techsoup.course.tc/catalog
  • 34. . © TechSoup Global | All rights reserved29 TechSoup Services Offers that Support Office 365 Set-Up and Migration • Basic Office 365 Set-Up • This includes registration, O365 set up, admin and end user training • Office 365 Email Migration (<20 Users) • Migrating organization’s emails to their O365 accounts and end cost is based on number of mail boxes • Office 365 DIY Migration Workshop for Small Organizations • Series of live instructional webinars designed to guide organizations through the process of migrating YMCA East Bay $400 $450 + $310 Request a consult from our experts at: https://page.techsoup.org/services
  • 35. . © TechSoup Global | All rights reserved30 TechSoup Services Offers that Support Office 365 Set-Up and Migration • Office 365 Email Migration (20+ users) • SharePoint Set-Up • SharePoint Data Migrations • Power BI Set-Up & Configuration YMCA East Bay Request a consult from our experts at: https://page.techsoup.org/services Custom Quote
  • 36. . © TechSoup Global | All rights reserved31 TechSoup Services Offers that Support Office 365 Set-Up and Migration Other Services to Support Nonprofits: • IT Help Desk • One-time fix - $55 • Ongoing support subscriptions - $35 per device per month • Managed IT Services • Ongoing support with custom quote YMCA East Bay Request a consult from our experts at: https://page.techsoup.org/services
  • 37. Q&A This is your chance! Use the chat box to ask us any questions you have about this presentation.
  • 38. Share and Learn Chat in one thing that you learned in today’s webinar. Please complete our post-event survey. Your feedback really helps. Follow TechSoup on social media (FB, Instagram, Twitter) Visit the TechSoup Blog at blog.techsoup.org
  • 39. Join us for our upcoming webinars. 2/19 Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making Practical Improvements 2/21 Maximize Spring Fundraising and Maintain Donors Through 2020 2/28 How to Drive Social Media Engagement with Nonprofit Storytelling 3/11 How to Be a Data-Driven Organization with Power BI Archived Webinars: www.techsoup.org/community-events
  • 40.
  • 41. Thank you to our webinar sponsor! Please complete the post-event survey that will pop up once you close this window.