Gain peace of mind knowing your Microsoft 365 deployment adheres to best practices. Without any interruption to your daily activities, we run diagnostics and custom scripts focusing on key areas of your cloud security. These include your identity, pps, devices, infrastructure, and data protection measures. We then report on areas of improvement with recommended steps to remediate.
Our first step is to complete a preliminary Cloud Security Audit. During the period we will report on:
The Cloud Security Audit is designed to help Canadian businesses comply with Canadian Data & Privacy Laws.
Effective 2018, fines of up to $100,000 per individual impacted, apply to businesses who suffer a data breach and do not comply with the new Data Breach law within the Canada’s Privacy Act.
The Shift.Support Data Breach Readiness Kit assists with compliance by leveraging key Microsoft security technologies to protect your business.
The new laws require that a business must now disclose a data breach if it’s likely that someone will come to serious harm. Fines of up to $100,000 for Directors and up to $100,000 per impacted individual for businesses are considered for serious instances where a business is aware of a data breach but fails to notify the relevant parties.
At the completion of the audit, you will receive a report on:
We provide both recommendations and remediation steps to secure and improve your Microsoft 365 deployment. Configuring Microsoft 365 security tools can be a time-demanding exercise. Shift.Support has leveraged our years of experience to automate the deployment of many security policies and monitors. The platform will enhance your Microsoft 365 security posture and is available to both new and existing Microsoft 365 deployments.
Our research and experience in remediating security breaches has been used to develop our own security tooling. We actively monitor your environment in real time for suspicious behaviours and take appropriate action.
We monitor the login locations for every sign in, and alert on activities outside of expected countries.
Get warnings when an external user attempts to impersonate an internal user.
We monitor automatic forwarding rules. A common tactic employed by hackers to exfiltrate data.
Monthly reports on security scores and important metrics.
Logging and auditing is enabled accross all Office 365 services and mailboxes.
Multi-factor authentication is enabled and implemented for all users.
Emails are securely backed up to a third party service.
Office 365 Admin Role changes are monitored and reported daily.
Departing users are offboarded in seconds, with emails backed up, company access disabled, and mail forwards in place.
We would love to take a look at your current IT infrastructure and provide a complimentary technology assessment.