[email protected]
  • Home
  • Team
  • Events
    • MC2MC Live: The Matrix of Innovation (22/05/2025)
    • MC2MC Live: Voyage to the Edge of the Cloud (26/06/2025)
    • Past events gallery
  • Speakers
    • Call for Speakers
    • Speaker information
  • Photos
  • Contact
  • Sponsors
  • About
    • Code of Conduct
    • Privacy Policy

Secure your corporate information, not your devices!

Posted on January 29, 2020

Introduction

I’ve seen multiple customers struggling with their corporate information. Most of the time this data is secured in a traditional way without flexibility to collaborate.

Result: People find other way to collaborate: Dropbox, OneDrive, Box, Mails, Private-mails, whatsapp,..

You don’t want your personal data published on the web. Why do we allow organizations to be less secure with OUR information?

Goal: If you are curious about your data at this moment, setup a fast pilot traject. In 24 hours you will have real insights in your organization.

Environment: Office 365, Fileservers :-), Box, Dropbox. Connect!

What’s your strategy for protecting and governing sensitive and business critical data?

  • Please comment if you managed to protect your data with a control mechanism. You have great insights and known your possible leakage.

Why should you work to protect information within corporate environments?

  • Users are accidentally sharing information
  • žUsers copying sensitive data for future use
  • Organizations not knowing what they have and what’s exposed at this moment
  • Users negligently sharing improperly with internal or external people
  • Sensitive data has being accessed or stolen by unauthorized persons
  • …

Use Microsoft native solution to discover your crucial data!

  • Start with labeling of your information cross-platform to get actual insights!
  • Labeling doesn’t mean it should be actionable – it’s just a state of reporting!
  • later: classify, protect and monitor your sensitive data everywhere – cross platform.

READ MORE HERE

Previous Post
Create security tasks in MEM Intune from MDATP to take action on exploits
Next Post
MC2MC Kick-Off Evening slide decks and Sway

Recent Posts

  • MC2MC Live: Jurassic Cloud Adventures (24/04/25) April 28, 2025
  • MC2MC Live: Cloudy with a Chance of Data (20/03/25) March 22, 2025
  • MC2MC Live: Forward to the Past (2024) December 23, 2024
  • MC2MC Live: The Cloud Strikes Back (2024) November 18, 2024
  • MC2MC Live: Safeguarding the Digital Frontier (2024) September 30, 2024

Categories

  • Autopilot (1)
  • Azure (29)
  • Azure AD (2)
  • Azure Virtual Desktop (2)
  • Big Data (1)
  • ConfigMgr (3)
  • Containers (2)
  • EMS (7)
  • GitHub (3)
  • Guides (6)
  • Hyper-V (1)
  • IaC (1)
  • Intune (20)
  • M365 (20)
  • MC2MC (39)
  • MC2MC Live (2)
  • MDATP (3)
  • PowerApps (3)
  • PowerAutomate (6)
  • PowerShell (4)
  • Security (10)
  • Veeam (1)
  • Visual Studio Code (1)
  • Viva (1)
  • Windows 10 (16)
  • Windows 11 (1)
  • Windows 365 (2)
  • Windows Autopilot (3)
  • Windows Server (1)
  • Windows Updates (1)
  • Windows365 (1)
  • Women In Tech (2)

RSS Jasper Bernaers

  • How a modern and secure workplace can help your organization become relevant
  • Actionable steps to decrease the risk of a Cyberattack
  • Cybersecurity in a remote connected world
  • Cybersecurity for local governments – in 10 steps

RSS Wim Matthyssen

  • Azure Arc: Keep your Azure Connected Machine agent up-to-date on a Windows Server
  • Azure Arc: Securely connect to an Azure Arc-enabled Windows Server with RDP over SSH
  • How to install OpenSSH on a Windows Server 2019/2022/2025 using a PowerShell script
  • PowerShell script: BgInfo deployment script for Windows Server 2025

RSS Tim De Keukelaere

  • How to configure RBAC permissions for available uninstall in Intune
  • WMUG NL Tuesdays – Latest and greatest in the world of Configuration Manager
  • Microsoft MVP 2020-2021 Award
  • A first look at the Configuration Manager Community Hub

RSS Micha Wets

  • AVD Client Cleanup script/tool
  • MSIX app attach Start Menu fixed in Windows Virtual Desktop
  • Windows Virtual Desktop Workshop December update
  • Windows Virtual Desktop Spring 2020 edition workshop

RSS Robbe Van den Daele

  • Detecting non-privileged Windows Hello abuse
  • MDE Device Discovery - Improving the monitored network page
  • Correlating Defender for Endpoint and Global Secure Access Logs
  • Parsing CEF messages without Azure Monitor Agent

© 2025 MC2MC vzw