Cegeka Careers Language Why Cegeka Back
Trinity of Innovation

5G, Artificial Intelligence and hybrid cloud: all breakthrough technologies in and by themselves. But their real potential?

Discover the future with us
Icons_Navigation_Cegeka&Society

Cegeka & Society

We develop innovative solutions with a positive impact on the environment, people, and society.

Icons_Navigation_Why Cegeka

Why Cegeka

As a family-owned IT solutions provider, we work In close cooperation with our customers.

Icons_Navigation_Our Story

About Us

Our strong values form the cornerstone of our identity and are at the baseline of our success.

Icons_Navigation_Annual Report

Annual Report

Dive into the details of our growth. Read the full report and learn more about our continued success.

More Cegeka

Our Management

Corporate News

Contact & Locations

Solutions Back
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs

Testing_Visuals_IconNavigation (1)

Testing Solutions

Experts in testing, program development, automation, training, and certification.

Applications Solution

Applications

Building the applications to embed growth, innovation and agility

Business Solutions

Business Solutions

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

website_navigation_dms_cegeka_uk

Disclosure Management System

Transformation and implementation of our information disclosure product

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services Back
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects

AgileCoaching_Blog_The applicability of Agile and Scrum

Agile and DevOps Services

Your guide on your journey towards sustainable value delivery

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries Back
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries

Website_Navigation_Finance_and_Insurance-1

Finance & Insurance

Take a major step towards cloud computing to increase effectiveness through the use of AI and big data.

Industries_Federal_Social_Government_Headervisual_General_1000x800px

Federal & Social Government

Embrace digitalization and harness the power of data to make citizens' lives easier, work smarter and boost efficiency.

Website_Navigation_Telecom_UK

Telecom

Unlock the potential of 5G and IoT to deliver faster, smarter, and more reliable services.

Insights Back
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
Back
Select language

English - United Kingdom

Corporate (English)

Austria (German)

Belgium (Dutch)

Belgium (French)

Denmark (English)

Germany (German)

Greece (Greek)

Italy (Italian)

Romania (English)

Sweden (English)

The Netherlands (Dutch)

United Kingdom (English)

Let’s get in touch
Cegeka Why Cegeka
Trinity of Innovation

5G, Artificial Intelligence and hybrid cloud: all breakthrough technologies in and by themselves. But their real potential?

Discover the future with us
Icons_Navigation_Cegeka&Society

Cegeka & Society

We develop innovative solutions with a positive impact on the environment, people, and society.

Icons_Navigation_Why Cegeka

Why Cegeka

As a family-owned IT solutions provider, we work In close cooperation with our customers.

Icons_Navigation_Our Story

About Us

Our strong values form the cornerstone of our identity and are at the baseline of our success.

Icons_Navigation_Annual Report

Annual Report

Dive into the details of our growth. Read the full report and learn more about our continued success.

More Cegeka

Our Management

Corporate News

Contact & Locations

Solutions
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs

Testing_Visuals_IconNavigation (1)

Testing Solutions

Experts in testing, program development, automation, training, and certification.

Applications Solution

Applications

Building the applications to embed growth, innovation and agility

Business Solutions

Business Solutions

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

website_navigation_dms_cegeka_uk

Disclosure Management System

Transformation and implementation of our information disclosure product

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects

AgileCoaching_Blog_The applicability of Agile and Scrum

Agile and DevOps Services

Your guide on your journey towards sustainable value delivery

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries

Website_Navigation_Finance_and_Insurance-1

Finance & Insurance

Take a major step towards cloud computing to increase effectiveness through the use of AI and big data.

Industries_Federal_Social_Government_Headervisual_General_1000x800px

Federal & Social Government

Embrace digitalization and harness the power of data to make citizens' lives easier, work smarter and boost efficiency.

Website_Navigation_Telecom_UK

Telecom

Unlock the potential of 5G and IoT to deliver faster, smarter, and more reliable services.

Insights
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
Corporate (English) Austria (German) Belgium (Dutch) Belgium (French) Denmark (English) Germany (German) Greece (Greek) Italy (Italian) Romania (English) Sweden (English) The Netherlands (Dutch) United Kingdom (English) Careers Let’s get in touch
Home Discover our latest blogs Discover our latest blogs Secure digital workplace & Data | Step 3
Digital Workplace
3 minutes reading

Secure digital workplace & Data | Step 3

Most cybercriminals have one major objective in mind: to get hold of your valuable data! Data security should therefore take center stage in your cybersecurity strategy. How can you keep your sensitive data safe and prevent data breaches? Start by categorizing your data. Rely on the advanced features in the Microsoft 365 E5 Plan to help you.

Tom Speijer

Tom Speijer

December 18, 2020

An effective cybercrime strategy takes a holistic approach, preventing intrusion in devices and applications and minimizing the harm done. In this blog series on digital workplace security, we mainly focus on the ‘prevention’ step. Using the cyber kill chain as our guideline, we described how to prevent hackers from intruding your system and gaining access in two earlier blog posts. Let’s now see how to prevent cybercrime in that next stage of the chain, when a cyberattacker gets close to your most valuable asset – your data.

Importance of data classification

The first step in preventing data breaches is data classification: understanding what types of data you have and how ‘valuable’ it is and then assigning levels of sensitivity to each data type. The level of protection and, consequently, the controls needed will depend on that classification. For example, while general information will get the label ‘public’ and be available to everyone, financial data or HR-related and customer PII (personally identifiable information) will be labeled ‘confidential’ or even ‘strictly confidential’ and require strong access control measures, like multi-factor authentication, encryption or conditional access.

"3,86 million USD is the average cost of a data breach – the average cost per lost or stolen record amounts to 146 USD."

 

IBM’s 2023 Cost of a Data Breach Report.

Labeling your documents with Microsoft Purview Information Protection (MPIP)

While data classification is crucial for security, it is not easy to properly categorize all your data. Moreover, your decisions greatly impact the cost of security and the user-friendliness of your applications and devices and, consequently, the productivity of your users: the more protection and control, the higher the cost and the more steps the users have to take to get access to the data.

Here too, Microsoft comes to the rescue: the Microsoft Purview Information Protection (aka AIP) suite helps to properly – and cost-effectively – label documents and emails. When the software detects sensitive data like credit card numbers within a document, for example, it will automatically give it the label 'secret' or 'sensitive' – which triggers protection policies, such as not allowing an employee to copy and paste from that document or to share it.

More than relying on automatic labelling, AIP also allows you to tag your documents manually as you create them or even classify and protect existing documents. Reports and a dashboard provide information on the volume of labeled and protected documents and label distribution and helps detect risky behaviors to prevent misuse.

Data loss prevention

To add an additional layer of protection to your corporate data, it’s a good idea to combine AIP with MS Data Loss Protection (DLP). While AIP links labels to documents, DLP identifies sensitive information across your Microsoft locations – from SharePoint, OneDrive and Teams to Office tools like Excel, PowerPoint and Word. Based on the rules that your compliance or security team has defined, DLP will take certain actions, like blocking sensitive data from being forwarded in or outside of your organization. Here too, the software continually monitors all the information being shared and provides an overview of compliance with your DLP rules in reports and dashboards.

Preventing data breaches on mobile devices

Your employees use their mobile devices for both personal and work tasks. So don’t forget to protect company data that is accessed from these devices. Here too, Microsoft helps.

By implementing app protection policies, you can restrict access to company resources and keep data within the purview of your IT department. IT administrators can, for example, deploy Conditional Access policies or deploy an app protection policy that requires app data to be encrypted.

Teaching users how to stay compliant

The Microsoft DLP suite even helps you educate your staff on the importance of data protection, by sending email notifications and showing tips in a pop-up. For example, if an employee tries to ‘send’ a document that contains a bank account number, the DLP rule will not only block the document from being forwarded but also create a pop up that warns the user. In this way, user awareness will improve gradually – to help you combat cybercrime throughout your organization.

Tom Speijer

Tom Speijer

More of Tom Speijer articles

Get in touch