SharePoint admins need to understand that the same risks for data loss due to accidental or malicious deletions apply to SharePoint Online content associated in Sites, OneDrive, Groups, and Teams. The native protections Microsoft offers don’t meet the need for fast, accurate recovery in those scenarios, as you’ll learn in this blog post by Matthew McDermott, Microsoft MVP.
Improving IT security, reducing IT costs and delivering higher service levels are among the top IT priorities for the healthcare industry, according to the Kaseya 2018 State of IT Operations survey report. Are the right measures, however, being taken by the industry to secure this data?
Every year, the Spanning team reviews which blog posts have been most well-read, so we can provide more of what you’ve found useful in the coming year. 2018 is no different — and this year, our most popular blogs have been those focused on trending security topics like GDPR and new Spanning Backup feature enhancements.
In Part 1 of this two-part series, we discussed how you need to rely on more than the default retention times for Office 365 to fully protect your data from accidental deletion. In Part 2, we’ll discuss if Exchange Online Litigation Hold and In-Place Hold are good-enough data protection solutions for Office 365, or if your organization may need something purpose-built for Office 365 backup and restore.
After exhibiting at this year’s Microsoft Ignite, we’re even more energized by the growth of the Microsoft community. For us, one of the best parts of the show was meeting our amazing customers. From the bustling, vibrant show floor to our more personal customer happy hour, we love seeing the Spanning family grow each year. As we mentioned in our pre-event blog post, there were many things we were looking forward to attending. How did it actually turn out? Catch up on the rest of our Ignite adventures in this blog post.
Data protection in Office 365 is a shared responsibility, with Microsoft taking on the tasks that would have typically been done on-premises for disaster recovery. But your IT team is still ultimately responsible for data protection, and it’s up to the IT team to decide how to protect and recover any data that is lost by human error or even malicious attacks. In Part 1, we look at Microsoft’s disaster recovery and retention times.
Now in its 24th year, Microsoft Ignite is moving beyond its format of feature deep-dives and MVP meet-ups to introducing cutting-edge, emerging technologies. With more than 700 deep-dive sessions and 100 expert-led and self-paced workshops, it will keep you on your toes. What are our picks of the sessions we will be attending? It’s a tough call, but here’s a countdown of our Top 4 #MSIgnite sessions for 2018.
Peace of mind is a recurring theme among many Spanning customers and Millar is no different. Learn how Spanning provides the Millar team with peace of mind as they protect their data while developing life-saving medical devices, and see how protecting your Office 365 data can protect your organization from unnecessary SaaS application data loss.
On June 22, 2018, Microsoft announced a public preview of a new security policy which will enable multi-factor authentication (or MFA) for Azure Active Directory “privileged accounts” (or administrator accounts), including most Office 365 admin accounts. After the preview, they will automatically opt these accounts into the policy by default, adding a much needed layer of security to these accounts. Spanning Backup for Office 365’s Sr. Product Manager Andy Rouse explains why this is a good thing in his newest blog post.