• Facebook
  • LinkedIn

Tel: 020 7250 3840

4TC Services
  • Home
  • IT Support
    • About Managed IT
    • Fully Managed
    • Proactive IT Support
    • Ad-Hoc
    • Mac Remote Management
    • Installation and Relocation
  • Backup
    • SAAS Protection – G Suite and Office 365
    • Direct to Cloud Backup
    • Disaster Recovery
  • Security
    • Digital ID & the Dark Web
    • Anti-Virus
    • Mail Archiving
    • Managed Anti-Spam
  • FileMaker
  • Cloud
    • IT as a Service – IaaS
  • About Us
    • Contact
    • Cookie Policy
    • Privacy Policy
    • GDPR – Statement
  • Telecoms
    • Teams – Voice and Video calling
  • Products
  • Blog
  • Search
  • Menu Menu

Microsoft 365 top tips – Sensitivity Labels

The advancements in technology over recent years have revolutionised the way we work and go about our day-to-day lives. Our reliance on tech is apparent in everything we do – you will find it difficult to find a daily activity that isn’t somehow influenced by technology.

Unfortunately, for all of the positives that technology brings to our lives comes the inevitable negatives. The threat of data theft and hackers gaining access to your personal documents has become even more of an issue during recent months. Since the outbreak of Covid-19 – and the hasty transition within most companies to partial remote work settings (at least) – cyber criminality has rose exponentially. This is mainly due to many not being prepared to defend against possible cyber attacks, or simply not knowing the dangers that come with such an invasion of your systems.

Microsoft 365 has features designed with the sole intention of protecting your documents, and they come in the form of Sensitivity Labels.

What is a Sensitivity Label?

A Sensitivity Label applied to a 365 document is a tag that can then give you certain controls over the security of that document.

In layman’s terms, Sensitivity Labels allow you to classify and protect content that is sensitive to your business.

The benefits of Sensitivity Labels in 365

Sensitivity Labels allow you to employ multiple document-based security protocols to help protect data from any misuse. Sensitivity Labels can be used whilst a document is being created. It is likely that once you start using them you will make it a requirement that users apply a Sensitivity Label to all their emails and documents.

Let’s take a look at some of the reasons why this is a feature that offers a big security advantage to companies of all types.

  • Label your content automatically.

Enable ‘Auto Labelling’ – doing this allows you to never have to worry that a user isn’t labelling sensitive data properly. Auto Labelling will automatically detect sensitive content in documents and emails that match the pre-set parameters you’ve chosen and set up previously. The content is then automatically labelled with the correct sensitivity label.

Set conditions based on the content contained in the files (for example, a customer’s banking information or medical records should be labelled as highly sensitive and have restrictions on the ability to share that information). This saves you time and money by avoiding the need for expensive / extensive user training and also eliminates the possibility for user error.

  • Get more control over sensitive emails by encrypting them.

Typically, when sending emails, you lose control over how that content is used after you’ve pressed ‘Send’. The contents of that email could be used by anyone for anything. Sensitivity Labels help you restrict access to sensitive emails as they are sent out, giving you some control over the email once it leaves your remit.

You are able to set a policy that only lets users from a specific domain outside your business to review certain information. It is also possible to time-limit the content availability by making the content encrypted and therefore unreadable after the chosen timeframe.

These are just some of the ways that Sensitivity Labelling can assure you that your documents are safe and secure.

Now let’s take a look at how to use Microsoft 365 Sensitivity Labelling.

How to use the Sensitivity Labelling tool

  1. We begin in the Microsoft 365 admin centre; select the ‘Compliance Admin Centre’.
  2. Click ‘Classification’ followed by ‘Sensitivity Labels’.
  3. Select ‘Create a Label’ followed by ‘Yes’.
  4. Enter a label name, a Tooltip, a description, then ‘Next’.
  5. Enable encryption and assign permissions. You can then decide whether you would like user access to expire within a certain time limit and whether you want to allow offline access. Both are good freedoms to have over your access permissions.
  6. Select ‘Assign Permissions’ and then input the email addresses of those you wish to grant access, enter their information, and select ‘Add’. (Repeat until all desired permissions are added).
  7. Select ‘Save’, then ‘Save’ again followed by ‘Content Marking’. Choose the markings you wish to use from the range available; add text, change the font size and colour, add a header, etc.
  8. Then add rules; for example, when a passport number is added, or other sensitive information is detected.
  9. Select ‘Next’, ‘Review your Settings’ followed by ‘Create’.

After this is complete, your label has been created. You can repeat this procedure and add any additional labels that are required.

Sensitivity Labels – if used correctly – allow you the peace of mind that your sensitive and confidential data and documents are only being seen and shared by the team members that have your permission to do so.

The tech specialists! – 4TC

Sensitivity Labels give you control over the security of emails and documents even when they aren’t in your possession! Our team of specialists take time to understand the daily challenges that your business faces, and we then provide cost-effective tech solutions to these challenges that will help you save time, protect vital data and be more effective with your time management, whether that be through the use of Sensitivity Labels or other means. In the modern world, it is essential that you and your team use IT to its full potential, as doing so guarantees you the best chance of growth going forward and with immediate effective security. If you would like to find out more on how 4TC Services can provide affordable tech management to your business, drop us an email or call us now for a full demonstration.

We’re 4tc Managed IT Services

4TC can support you with all your IT needs! We are trained professionals with years of experience and can guarantee you a service like no other.

We will give you and your business consistent attention – assuring that we do not only provide you with the best now but also continue to provide you with the best going into the future. We can act as either your IT department or to supplement an existing IT arrangement.

Get in touch now!

Recent Posts

  • Taking the correct steps to secure your business with M365
  • Securing Your Workplace with Microsoft 365
  • Microsoft Teams may just help you get out of that dull work meeting
  • Achieving Value from your IT
  • Getting Value from Your IT

Recent Comments

    Archives

    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • May 2017
    • June 2015

    Categories

    • 4TC
    • Anti-Spam
    • Cyber Security
    • Disaster recovery
    • IT Services
    • News
    • Services

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    4TC Services

    Email: support@4tc.co.uk

    Tel: 020 7250 3840

    London Office

    124 City Road
    London
    E1V 2NX

    Essex Office

    Dew Gates The Street
    High Roding
    Essex
    CM6 1NT

    Signup for IT News!



      © Copyright - 4TC Services
      • Facebook
      • LinkedIn
      25% of UK Workers Let Their Children Use Their Work Deviceremote workremote workMicrosoft 365 top tips – Power Automate
      Scroll to top