Security
Microsoft
Housing

Staying secure with Microsoft 365 - TSG

David Filmer, Head of Microsoft Training
David Filmer, Head of Microsoft Training

We all know and love the classic Office Suite applications like Word, Excel, PowerPoint, and Outlook, which have been a staple in our daily work routines for years. However, with the introduction of Office 365 and more recently, Microsoft 365, the suite has expanded to include a plethora of new tools and features that can revolutionise the way we work.

These game-changing technologies can help us save time and energy, but only if we know how to use them effectively – and more importantly – securely.

You don’t know what you don’t know – so let’s go through how you can make sure you’re keeping your organisation safe and preventing as many cyber threats as possible on Microsoft 365.

Ways you can stay secure on Microsoft 365

Microsoft 365 is a powerful tool for productivity and collaboration, but it is important to take steps to protect yourself and your data while using it. There are a number of ways to stay secure on Microsoft 365, with a few of them mentioned below:

  • Use strong passwords and two-factor authentication (MFA): Passwords are the first line of defence against hackers, and it is crucial to use strong, unique passwords for each account. Microsoft 365 offers two-factor authentication, which requires a second form of identification, such as a code sent to your phone, to access your account.
  • Protect your administrator accounts: Administrator accounts are more vulnerable to cyber-attacks due to their elevated privileges. It’s crucial to establish and manage the appropriate number of admin and user accounts for your organisation to prevent unauthorised access to sensitive data.
  • Train your employees on best practices for email security: Given that emails are handled by every member of an organisation, email systems are particularly susceptible to such threats, and the security of these systems relies heavily on human decision-making. To mitigate these risks, it’s crucial to train employees to recognise spam or junk mail, phishing attempts, spoofing, and malware, so they can make informed decisions when handling their emails.
  • Use Microsoft Teams for collaborating securely and effectively: With Microsoft Teams your files and communications are stored in a protected environment.
  • Set sharing settings for SharePoint and OneDrive files: Review these settings and make sure you’re only granting access to people who need it to complete their jobs.

How can housing associations stay compliant on M365?

In addition, M365 has built-in compliance features that can help housing associations meet regulatory requirements but it’s important for housing associations to configure M365 to comply with data protection laws.

However, in order to identify what your organisation needs specifically, you’ll need to undertake a training needs analysis with a trusted IT provider.

What is a training needs analysis?

A training needs analysis (for Microsoft in particular) identifies gaps in your team’s current Microsoft 365 knowledge. This can be things like not knowing about the full breadth of applications available for use or not understanding how to get the most out of specific applications.

The process usually involves these steps:

  1. Assessing your current level of performance
  2. Identifying your desired level of performance
  3. Identifying your training and development needs
  4. Developing a training plan

At TSG we offer this for free – so we’re more than prepared to help you identify what you need to get started.

Related Articles

Blogs
From Hack to Cash. How Quick Will You Recover?  
Security | ERP
From Hack to Cash. How Quick Will You Recover?  
Blogs
Microsoft Customer Voice: A Futureproofed Solution for Housing Associations
Microsoft | Housing
Microsoft Customer Voice: A Futureproofed Solution for Housing Associations
Blogs
Streamline Finance Processes with Microsoft Dynamics 365 BC
Microsoft
Streamline Finance Processes with Microsoft Dynamics 365 BC
Blogs
Identify Cyber Security Gaps with Penetration Testing
Security
Identify Cyber Security Gaps with Penetration Testing
Blogs
Optimising Business Processes: A Guide to Microsoft Dynamics 365 Business Central Features
Microsoft
Optimising Business Processes: A Guide to Microsoft Dynamics 365 Business Central Features
Blogs
Structured vs. Unstructured Data: Keys to Success
Microsoft
Structured vs. Unstructured Data: Keys to Success