Growing cyber threats and rapidly multiplying endpoints is a combination that keeps IT up at night. From stolen phones to phishing attempts, employees can be vulnerable to a number of threats when they use their own private devices. Organizations need comprehensive BYOD policies to protect themselves against potentially being compromised by employee devices.
Employees use their personal devices for nearly everything -- including their work. Whether it's reviewing documents or checking their email, it's likely that an employee will be connecting to the corporate servers from personal smartphones and tablets. Unfortunately, while this improves productivity, it can hurt security. This is what makes a Bring-Your-Own-Device policy important -- but sometimes it isn't enough. That’s where the Microsoft EM+S suite comes into the picture.
Mobile devices are currently one of the major attack vectors for any organization, giving rise to the need for comprehensive cybersecurity and MDM solutions. Mobile Device Management Solutions like Microsoft’s Office 365 EM+S can secure user endpoints like smartphones and tablets, protecting an organization from compromise. Though there are many solutions available, Microsoft Office 365 EM+S goes beyond a traditional MDM, taking a much more granular approach to managing company data on mobile devices.
A recent report from Lookout shows that mobile ransomware is on the rise. Mobile devices are frequently the most effective attack vector for cyber criminals looking to infect a business network. Ransomware can be devastating to an organization, grinding business processes to a halt and costing a company in time, money, and reputation. Endpoint security solutions are the answer.
Azure Active Directory is Microsoft’s answer to managing the identities that access your network. It’s a single solution that provides a directory service, management of applications, and identity and role protection. Developers have used this tool for years to enforce user policies and rules, as well as to control access to applications. The latest change to Azure Active Directory is that it now can be run in the cloud.
Today, having a username and password to access an account isn’t enough. Hackers are working hard to steal any credentials they can get; Fortune says they’re selling them for around $15 on the dark web. NBC News says you can pick up an entire identity with everything from social security numbers to bank logins for around $1,200.
Our lives are complicated, in part, because we have multiple digital tools on multiple devices, each typically with its own password requirements. The solution for most of us is to use the same password across multiple devices. This poses a problem particularly for IT administrators that are tasked with improving cybersecurity. On the flip side, having multiple passwords is not only hard to keep track of, it also results in a lot of password resets and frustration for the end-user.
Small Business Trends lays out the stats for us: around 3.9 million employees spend at least half the week working remotely. While this has been a terrific benefit for employees, there are drawbacks for IT managers. Instead of managing LANs and WANs, we’ve expanded our networks to include multi-device, multi-location, dispersed teams.
There has been an evolution in mobile device management from the big stick approach that tries to manage employee personal devices to the more granular mobile application management. Wired had an article on MDM vs. MAM and said, “taking a command-and-control approach to managing mobile devices that are typically owned by employees has turned out to be a misguided strategy.”
Microsoft Intune is part of the Enterprise Mobility and Security Suite, which provides mobile device management (MDM) and mobile application management (MAM) in the cloud. Microsoft Intune helps businesses manage all of the devices accessing their network while controlling access to corporate data and improving IT security.
This article will look at Microsoft Intune features to provide you with an understanding of how to best use this tool.