Skip to content

Commit a252cfa

Browse files
authored
Merge pull request #50980 from riswinto/main
update module for better readability & engagement
2 parents da863a7 + 2195ea4 commit a252cfa

20 files changed

+197
-302
lines changed

learn-pr/wwl-sci/purview-protect-sensitive-data/data-protection-need.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: The growing need for data protection
44
metadata:
55
title: The growing need for data protection
66
description: "The growing need for data protection."
7-
ms.date: 03/10/2025
7+
ms.date: 06/16/2025
88
author: wwlpublish
99
ms.author: riswinto
1010
ms.topic: unit
Lines changed: 27 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,40 @@
1-
Data is one of an organization's most valuable assets, but it's constantly at risk. Organizations face a range of threats, including cyberattacks, insider risks, compliance challenges, and emerging risks from AI-driven services. Understanding these threats and their consequences is crucial for developing effective security strategies.
1+
Contoso Ltd., a global financial services company, sees an increasing volume of sensitive data spread across its cloud services, including employee files, financial records, and AI-generated content from tools like Microsoft 365 Copilot. While these technologies support faster decisions and flexible work environments, they also create security risks. Sensitive data moves across cloud platforms, remote endpoints, AI applications, and non-Microsoft services. As data volumes increase, so do the challenges of managing and protecting it.
22

3-
## The consequences of data breaches and insider threats
3+
Access controls help, but protecting sensitive data depends on knowing where it's stored, who can access it, and how it's used.
44

5-
Cyber threats targeting sensitive data are increasing in scale and sophistication. According to ENISA's 2024 _[Threat Landscape](https://www.enisa.europa.eu/sites/default/files/2024-11/ENISA%20Threat%20Landscape%202024_0.pdf?azure-portal=true)_ report, data-related threats have surged, affecting public administration (12%), digital infrastructure (10%), finance (9%), and business services (8%). The report also notes that data compromise incidents rose in 2023-2024, reinforcing the need for strong data protection measures. Organizations that fail to implement security measures risk financial losses, regulatory penalties, and reputational damage.
5+
## The consequences of data breaches and insider threats
66

7-
Cybersecurity and Infrastructure Security Agency's (CISA) _[Insider Threats 101](https://www.cisa.gov/sites/default/files/2024-07/insider-threat-101-fact-sheet_07-29-2024_508.pdf?azure-portal=true)_ fact sheet states that the total average cost of an insider risk increased in 2023 to $16.2 million per organization, with an average of 86 days required to identify and contain such threats. These insider incidents can stem from accidental exposure, compromised credentials, or malicious intent, all of which underscore the need for proactive data protection.
7+
When organizations fail to secure sensitive data, the consequences can be severe. Breaches can result from external attacks, insider threats, or accidental data leaks. No matter the cause, organizations face financial loss, regulatory penalties, reputational damage, and operational disruptions.
88

9-
Examples of data security risks include:
9+
Security agencies continue to report the growing scale of these threats. According to ENISA's 2024 [Threat Landscape](https://www.enisa.europa.eu/sites/default/files/2024-11/ENISA%20Threat%20Landscape%202024_0.pdf?azure-portal=true) report, data-related threats have surged, affecting public administration (12%), digital infrastructure (10%), finance (9%), and business services (8%). Data compromise incidents rose in 2023 and 2024, reinforcing the need for strong data protection measures.
1010

11-
- **Data breaches from unauthorized access**: Weak access controls, compromised credentials, and unprotected data storage can result in data breaches. Attackers exploit vulnerabilities to steal sensitive information, leading to financial and reputational damage. Organizations must enforce strong authentication, least privilege access, and data encryption to reduce exposure.
12-
- **Social engineering attacks**: Cybercriminals use deceptive tactics, such as phishing and Business Email Compromise (BEC), to manipulate employees into revealing sensitive data. These attacks can result in fraud, identity theft, and corporate espionage. Organizations can reduce risk by training employees, using email security controls, and implementing verification processes for sensitive transactions.
13-
- **Data leaks and misconfigurations**: Unsecured cloud storage, misconfigured access settings, and accidental data sharing can expose sensitive information. Organizations that lack clear data governance, visibility, and access restrictions are at higher risk of unintentional data exposure. Regular security audits and automated access controls help mitigate these risks.
11+
The Cybersecurity and Infrastructure Security Agency (CISA) reports in its [Insider Threats 101](https://www.cisa.gov/sites/default/files/2024-07/insider-threat-101-fact-sheet_07-29-2024_508.pdf?azure-portal=true) fact sheet that the average cost of an insider risk incident reached \$16.2 million per organization in 2023, with an average of 86 days to identify and contain these incidents. Insider threats can result from accidental exposure, compromised credentials, or malicious intent, making proactive data protection essential.
12+
13+
Organizations must account for risks like:
14+
15+
- **Data breaches from unauthorized access**: Attackers exploit weak access controls, compromised credentials, or unsecured data storage to steal sensitive information. Enforcing strong authentication, least privilege access, and encryption helps reduce exposure.
16+
- **Social engineering attacks**: Threat actors use phishing, business email compromise, or other manipulation techniques to trick employees into exposing sensitive data. Employee training, email security controls, and verification processes help prevent these attacks.
17+
- **Data leaks and misconfigurations**: Improperly secured cloud storage, accidental sharing, and access misconfigurations expose data unintentionally. Security audits, automated access controls, and clear data governance policies reduce the likelihood of exposure.
18+
19+
Without a structured security approach, these risks lead to widespread data exposure and long-term business challenges.
1420

1521
## Risks organizations face
1622

17-
- **External threats**: Cyberattacks, phishing, and data breaches expose sensitive information and can cause financial and reputational damage.
18-
- **Insider risks**: Employees and contractors might unintentionally or maliciously leak data, making access controls and monitoring essential.
19-
- **Compliance challenges**: Organizations must meet strict data security and privacy requirements set by industry standards, government policies, and regulatory frameworks, with significant consequences for noncompliance.
20-
- **AI security risks**: As organizations adopt AI-driven tools, they must ensure that sensitive data isn't used or exposed in ways that could violate security policies. AI-generated content can introduce security gaps if not properly managed.
23+
Organizations need to protect sensitive data from both external and internal threats while staying compliant with regulatory requirements. Key risks include:
24+
25+
- **External threats**: Cyberattacks, phishing, and malicious activities that target sensitive data for financial gain or espionage.
26+
- **Insider risks**: Employees or contractors who accidentally or intentionally expose data.
27+
- **Compliance challenges**: Complex and evolving regulatory requirements that demand consistent data governance and reporting.
28+
- **AI security risks**: AI tools that access or process sensitive data can introduce risks if not properly controlled.
2129

2230
## The need for a proactive approach
2331

24-
To effectively address these threats, organizations must implement a proactive data protection strategy that includes:
32+
Reactive security measures are often too late to prevent damage. Organizations need a proactive data protection strategy that includes:
2533

26-
- **Data classification and labeling** to identify and secure sensitive information, reducing the risk of exposure.
27-
- **Data loss prevention and retention policies** to control sharing, prevent leaks, and ensure compliance with regulatory requirements.
28-
- **Insider risk management tools** to detect and respond to security incidents before they escalate.
29-
- **Dynamic security controls** to apply protections based on risk levels, reducing exposure from compromised accounts.
30-
- **AI security measures** to protect sensitive data used in AI-driven environments, preventing unauthorized access or misuse.
34+
- **Data classification and labeling**: Identify and mark sensitive data to apply consistent security policies.
35+
- **Data loss prevention (DLP) and retention policies**: Control data sharing, prevent leaks, and meet compliance requirements.
36+
- **Insider risk management tools**: Detect risky behavior and investigate security incidents before data is compromised.
37+
- **Dynamic security controls**: Apply protections based on real-time risk signals to adjust security enforcement as user risk changes.
38+
- **AI security measures**: Control how sensitive data is used or processed in AI models to prevent exposure.
3139

32-
A reactive approach to security often leads to increased financial losses and operational disruptions. By taking a **comprehensive and preventive** approach to data protection, organizations can safeguard their most valuable assets, maintain regulatory compliance, and reduce the likelihood of costly security incidents.
40+
By taking a preventive approach, organizations protect sensitive information, maintain compliance, and reduce the financial and operational consequences of security incidents.
Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,13 @@
1-
AI, cloud services, and collaboration platforms have transformed how organizations generate, share, and analyze data. While these technologies drive efficiency and innovation, they also introduce new security challenges. Sensitive information can be exposed through unauthorized access, accidental sharing, or AI-driven tools processing data in unintended ways.
1+
Modern organizations handle enormous volumes of sensitive data across cloud platforms, collaboration tools, and AI-driven applications. While these technologies enable faster decisions and greater productivity, they also create new security risks. Sensitive data can be accidentally exposed, improperly accessed, or used in ways that violate compliance requirements.
22

3-
As organizations increase their use of AI-driven tools and cloud-based collaboration, security teams must address new risks, such as unintentional data exposure and policy violations. Without a proactive data security strategy, organizations risk financial losses, compliance violations, and operational disruptions.
3+
To address these challenges, security teams need to go beyond traditional perimeter defenses. They must understand where sensitive data resides, how it's classified, and how to apply consistent protection across every environment where that data is used.
44

5-
Microsoft Purview provides a comprehensive approach to safeguarding data across cloud, endpoint, and AI environments. It enables organizations to classify, label, and protect sensitive information, enforce data loss prevention policies, and detect potential risks before they lead to security incidents.
5+
In this module, you'll learn how Microsoft Purview helps organizations:
66

7-
## Learning objectives
7+
- Discover and classify sensitive data across multiple platforms.
8+
- Apply sensitivity labels and encryption to control access.
9+
- Enforce data loss prevention policies to prevent leaks.
10+
- Detect insider risks and emerging threats proactively.
11+
- Secure data processed and generated by AI tools.
812

9-
By the end of this module, you'll be able to:
10-
11-
- Describe the challenges of protecting sensitive data in cloud and AI environments.
12-
- Explain how Microsoft Purview helps classify, label, and secure data.
13-
- Identify the role of data loss prevention (DLP) in reducing security risks.
14-
- Understand how Insider Risk Management supports proactive threat detection.
15-
- Describe security monitoring capabilities that help organizations manage data risks.
16-
17-
This module provides you with the knowledge and tools needed to strengthen data security while enabling safe and efficient collaboration.
13+
This module provides the foundation for applying data security protections that support compliance while enabling users to collaborate securely across cloud, endpoint, and AI environments.
Lines changed: 14 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -1,59 +1,22 @@
1-
Security teams need visibility and control to respond to threats effectively. Without proper monitoring and investigative tools, organizations risk missing critical security incidents that could lead to data breaches, compliance violations, or operational disruptions. A proactive security approach ensures that risks are addressed before they become serious threats.
1+
Security teams need tools to detect suspicious activity and respond before small issues become major incidents. Contoso uses security alerts and investigation tools across Microsoft Purview and Microsoft Defender to monitor policy violations, investigate potential data leaks, and take corrective actions.
22

3-
## Security monitoring and response tools
3+
## Security alerts in Microsoft Purview
44

5-
Organizations can strengthen their security posture by using **Microsoft Purview** and **Microsoft Defender** tools to detect, investigate, and respond to security risks.
5+
Microsoft Purview generates alerts when policies detect activity that might put sensitive data at risk. These alerts help identify issues like:
66

7-
### Microsoft Purview Audit
7+
- Policy violations from data loss prevention (DLP) policies.
8+
- Insider risk management policy triggers based on user activities.
89

9-
Organizations must be able to track and investigate user activities across their environment to identify security incidents. **Microsoft Purview Audit** provides detailed visibility into user actions, helping security teams detect unusual behavior, unauthorized access, and policy violations.
10+
Security teams can review alert details, examine user activity, and take follow-up actions as needed.
1011

11-
With Microsoft Purview Audit, security teams can:
12+
## Investigations and response actions
1213

13-
- Review user activity logs to investigate security incidents.
14-
- Identify unauthorized access attempts and detect unusual behavior.
15-
- Use Audit (Premium) capabilities to retain logs for long-term forensic analysis.
14+
After reviewing an alert, security teams can:
1615

17-
### Alerts in Microsoft Purview
16+
- Review user activity timelines and access details.
17+
- Determine whether the activity was authorized, accidental, or intentional.
18+
- Use **Microsoft Purview Audit** to review detailed user activity logs that support incident analysis.
19+
- Use **Activity explorer** to review data access, movement, and sharing activities.
20+
- Use **Content explorer** and **Data explorer** to validate how sensitive data is classified and labeled across Microsoft 365 services.
1821

19-
Microsoft Purview provides alerting capabilities across multiple security and compliance solutions, helping organizations detect and respond to data loss, insider threats, and policy violations. Alerts are managed within specific Purview solutions, such as Insider Risk Management and Data Loss Prevention (DLP), allowing security teams to address risks in their relevant contexts.
20-
21-
With Alerts in Microsoft Purview, security teams can:
22-
23-
- Monitor security and compliance alerts directly within Insider Risk Management, DLP, and other Microsoft Purview solutions.
24-
- Take immediate action on alerts within Microsoft Purview tools to prevent security incidents.
25-
- Prioritize alerts based on severity and risk to focus on the most critical incidents.
26-
27-
By integrating alerting capabilities within specific security and compliance tools, Microsoft Purview ensures that security teams can effectively track and mitigate risks where they occur.
28-
29-
### Activity and content explorer
30-
31-
Security teams need to understand how data is accessed, shared, and classified within an organization. **activity explorer** and **content explorer** provides real-time insights into user activities and content classification, helping security teams monitor security events.
32-
33-
With **activity explorer** and **content explorer**, organizations can gain insights into data access and classification:
34-
35-
- **Activity explorer**: Provides insights into user activity, tracking data access, movement, and security events.
36-
- **Content explorer**: Helps security teams view and classify sensitive data across Microsoft 365 applications, identifying potential risks.
37-
- Identify anomalies in file sharing, downloads, and access attempts to detect potential security risks.
38-
39-
### Microsoft Defender XDR
40-
41-
**Microsoft Defender XDR (Extended Detection and Response)** provides a unified threat detection and response capability by correlating security signals from multiple sources.
42-
43-
With Microsoft Defender XDR, security teams can:
44-
45-
- Correlate security signals across Microsoft Purview tools, endpoints, and cloud services to provide a comprehensive view of threats.
46-
- Identify suspicious activity by analyzing security events across multiple sources.
47-
- Automate responses to detected threats and reduce investigation time.
48-
49-
## A proactive approach to security
50-
51-
By integrating security monitoring, alerting, and response tools, organizations can proactively detect and mitigate threats before they escalate.
52-
53-
This approach ensures that security teams can:
54-
55-
- Analyze data access and usage patterns to identify potential security risks.
56-
- Investigate security incidents before they lead to breaches.
57-
- Respond to alerts in real-time to mitigate threats.
58-
59-
A well-defined security monitoring strategy ensures that organizations stay ahead of potential risks while protecting sensitive data and maintaining compliance.
22+
These investigation tools help security teams analyze incidents, verify policy effectiveness, and support ongoing risk management.

0 commit comments

Comments
 (0)