Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

archTIS NC Encrypt Integrates with Thales CipherTrust Manager to Secure Business Critical Content in Microsoft Applications

Recently, archTIS worked with fellow Microsoft Intelligent Security Association (MISA) member, Thales to integrate NC Encrypt with CipherTrust Manager. MISA members are top experts from across the cybersecurity industry with the shared goal of improving customer security. Both companies offer advanced data security for the Microsoft Purview Information Protection suite and worked together on a joint solution for customers aiming to achieve digital sovereignty.

archTIS is a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist

archTIS is proud to announce we have been recognized as a Microsoft Security Excellence Awards Privacy and Compliance Trailblazer Finalist for our unique solution for solving Defense requirements for the safe handling of and application of visual markings for sensitive, Controlled Unclassified Information (CUI) and classified data.

6 Steps to Prepare Data Before SharePoint Migration to Microsoft 365

A Cloud data migration project can be a complicated procedure that requires much planning, coordination, and management to ensure successful outcomes. There are many risks to consider including data quality control, over-exposure, data loss and the costs involved, particularly when it comes to large volumes of specialized data. When an organization is considering a SharePoint migration to Microsoft 365 (M365), they must prepare their data to mitigate these risks to ensure a successful outcome.

5 Top Microsoft Teams Security Concerns

Are you worried about rolling out Microsoft Teams? Are you concerned that users may accidentally share the wrong information with Team members? Your concern is justified with 56% of insider incidents caused by employee or contractor negligence at a cost of $484,931 per incident (2022 Ponemon Cost of Insider Threats Global Report).

Managing Administrator Privileges for Australia's Essential Eight Cybersecurity Compliance

The concept of least privileged access has been around for a while and is widely understood. However, overprivileged users with more rights than necessary, such as administrators, continue to be a common source of breaches. It’s such a concern that the restriction of administrative privileges is included as one of the Australian Government’s Essential Eight Maturity Model to mitigate cybersecurity incidents.

BYOD Security: Using ABAC to Manage Access to Sensitive Data

The concept of Bring Your Own Device, or BYOD, has been adopted by organizations wanting to take advantage of the benefits. BYOD allows employees to use their personal devices to connect to their business networks and access work-related resources using smartphones, personal laptops, tablets and USB keys. But is a BYOD strategy good for security? Along with the benefits come increased BYOD security risks that require mitigation.

Understanding Australia's SLACIP and SoNS Requirements for Critical Infrastructure

The Australian Security Legislation Amendment (Critical Infrastructure Protection) Act 2022 (SLACIP Act) and Systems of National Significance (SoNS) regulations are aimed at improving the resilience and risk management practices of Australia’s Critical Infrastructure sector and making it easier for organisations and governments to securely share information.

Preventing the Theft of IP and Military Secrets

A common topic in our blog is the threat that insiders pose to an organization’s sensitive data. Why? ‘Insider threats’ continue to pose the biggest threats to intellectual property (IP) and military secrets. Insiders, including contractors, need access to sensitive information to do their job, but to what extent? How can we prevent sensitive information from being exfiltrated by malicious insiders?

Make Zero Trust Data Access Your New Year's Resolution

As you look back on the state of cybersecurity in 2022 and set your security priorities for 2023, Zero Trust Data Access should top your New Year’s Resolutions list. Zero trust was probably the most talked about security trend last year and for good reason – it is clear no matter how much we layer our defenses hackers, malicious insiders and simple negligence are impossible to eradicate.

10 Data Protection Tips for 2023

2022 has been a busy year in cybersecurity with some high-profile breaches taking over the headlines late in the year. From simple negligence to unpatched systems, phishing emails, hackers, and malicious insiders our systems and data remain vulnerable. It’s clear that despite our best investments in security training and technology there is still room for improvement in 2023.