<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/best-practices/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Best Practices</title><description>GTconsult - Blog #Best Practices</description><link>https://www.gtconsult.com/blogs/tag/best-practices</link><lastBuildDate>Wed, 01 Apr 2026 03:01:37 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[A Guide to SharePoint Security Best Practices]]></title><link>https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/SharePoint Security Best Practices Write up.jpg"/>A write up focusing on the best practices when it comes to SharePoint security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OszD7tJyRH-yZoYS8eG17g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_OszD7tJyRH-yZoYS8eG17g"].zprow{ background-image:linear-gradient(to bottom, rgba(30,34,45,0.74), rgba(30,34,45,0.74)), url(/Blog%20Site/Cyber%20Security.jpg); border-radius:1px; } </style><div data-element-id="elm_0PddenaYREeEbwlCxS5bdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_0PddenaYREeEbwlCxS5bdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ"].zpelem-heading { border-radius:1px; text-shadow:1px 1px 1px #000000; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(255, 255, 255);">Fortifying Your Intranet</span></h2></div>
<div data-element-id="elm_rdneNfkVT3uJBC9XlwVadA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rdneNfkVT3uJBC9XlwVadA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:rgb(255, 255, 255);">In the dynamic landscape of modern workplaces, the integrity and security of your organization's data are non-negotiable. Nowhere is this more critical than in the heart of your digital operations: the SharePoint Intranet.</span><br></p></div>
</div><div data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"] .zpbutton.zpbutton-type-primary:hover{ color: #FFFFFF !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">A Team Protection</span></a></div>
</div><div data-element-id="elm_vCztPkIkXBmqMLEBXo4osg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_62P3aRIJogHMKKLflue_gQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_62P3aRIJogHMKKLflue_gQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In the realm of modern workplaces, where digital collaboration and information sharing are paramount, ensuring the security of your organization's data is non-negotiable. SharePoint Intranets serve as central hubs for document management, collaboration, and communication, making them critical assets that require robust security measures. In this blog post, we'll explore essential security best practices to fortify your SharePoint Intranet.</p></div></div>
</div><div data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div></div></div></div></div><div data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YDECHm82v930eVcBykILmQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_YDECHm82v930eVcBykILmQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_xGdJYbHOt9jJE9_wrpSD6w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">1. User Authentication and Authorization Controls</span></p></div></h2></div>
<div data-element-id="elm_ssSXWMip39JE9q0MjGp6JQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Begin by implementing strong user authentication mechanisms. User authentication and authorization controls are critical for ensuring that only authorized users have access to SharePoint resources.&nbsp;</p></div>
</div></div><div data-element-id="elm_KLnGE88nmAKgYyy9J9lxbQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key considerations include:</span></p><ul><li>Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), to verify user identities and prevent unauthorized access.</li><li>Defining clear roles and permissions within SharePoint to restrict access to sensitive data and functionality based on user roles and responsibilities.</li><li>Regularly reviewing and updating user access privileges to ensure that access permissions align with users' current roles and requirements.</li></ul></div>
</div></div><div data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Multi-factor authentication enhances user identity verification.</li><li>Granular permissions reduce the risk of unauthorized access.</li></ul></div></div>
</div><div data-element-id="elm_ftSnufxY9yDmfMpfPjDeig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ftSnufxY9yDmfMpfPjDeig"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">2. SSL Encryption Data in Transit (only applies to On-Premises)</span></p></div></h2></div>
<div data-element-id="elm_QecZanllTI3uF9HZvhRCGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Secure data in transit by implementing SSL encryption. This ensures that data exchanged between users and the SharePoint Intranet is encrypted, minimizing the risk of interception and ensuring that your sensitive information remains confidential. Obtain and install a valid SSL certificate to authenticate the server and establish a secure connection.&nbsp;</p></div></div>
</div></div></div><div data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:2px; border-radius:1px; } </style><div data-element-id="elm_7HCTb-08jS1rR7BXJVCACg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_7HCTb-08jS1rR7BXJVCACg"].zpelem-box{ border-radius:1px; } </style><div data-element-id="elm_mPw86Oby4sRrw1caQaM1_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mPw86Oby4sRrw1caQaM1_g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-weight:700;color:rgb(166, 206, 57);">Also Read:</span></h3></div>
<div data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width: 193.7px !important ; height: 109px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } @media (max-width: 767px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"].zpelem-image { border-radius:1px; margin-block-start:6px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="193.7" height="109" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_b2atEyGw1cnV_BQbJusTEw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_b2atEyGw1cnV_BQbJusTEw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Let's talk SharePoint Permissions</span><br></p></div>
</div><div data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div><div data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width: 184.28px !important ; height: 104px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } @media (max-width: 767px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="184.28" height="104" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Kyle's Take: The recent surge in SharePoint Malware downloads</span><br></p></div>
</div><div data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div></div><div data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BgrztguO06nuTlQclHkgGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BgrztguO06nuTlQclHkgGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Obtaining and installing a valid SSL certificate from a trusted certificate authority to authenticate the server's identity and establish a secure connection.</li><li>Enabling SSL encryption for all communications between users and the SharePoint environment, including web traffic, file transfers, and data synchronization.</li><li>Periodically renewing SSL certificates and configuring SSL/TLS settings to comply with industry standards and best practices.</li></ul></div></div>
</div><div data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>SSL encryption safeguards data during transmission.</li><li>Valid SSL certificates verify the authenticity of the server.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xgOLxeMkKGz95VrO3smdhg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xgOLxeMkKGz95VrO3smdhg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_0omc7CpCALrpfa9WK8HjEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0omc7CpCALrpfa9WK8HjEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">3. Regular security audits and monitoring</span><br></h2></div>
<div data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Regular security audits and monitoring are essential for detecting and mitigating security risks within the SharePoint environment.</p></div></div>
</div><div data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Conducting periodic security audits to assess the effectiveness of security controls, identify vulnerabilities, and ensure compliance with security policies and standards.</li><li>Implementing robust monitoring tools and solutions to track user activities, detect suspicious behavior, and alert administrators to potential security incidents.</li><li>Establishing incident response procedures to investigate and respond to security events identified through security audits and monitoring activities.</li></ul></div></div>
</div><div data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Security audits identify and address vulnerabilities.</li><li>Monitoring tools enable real-time threat detection.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ejiGdg4supFFfWbZScnadA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ejiGdg4supFFfWbZScnadA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div><div data-element-id="elm_pLuW-JNcToHVsqRPfBsJag" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pLuW-JNcToHVsqRPfBsJag"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div><div data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:10px; } @media (max-width: 768px) { div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:calc(10px / 3); } } </style><div class="zpspacer " data-height="10"></div>
</div></div></div></div></div><div data-element-id="elm_x9Ux0a111RejHOAhph8xMQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:2px; border-block-end-width:0px; border-inline-start-width:0px; border-radius:1px; } </style><div data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-size:18px;font-weight:900;color:rgb(0, 27, 76);">Have you read our <a href="https://www.gtconsult.com/history-of-cyber-security-ebook" title="eBook" target="_blank" rel="">eBook</a>?</span><br></h2></div>
<div data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width: 200px ; height: 200.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } @media (max-width: 767px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/history-of-cyber-security-ebook" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Cover%20Square.jpg" width="200" height="200.00" loading="lazy" size="small"/></picture></a></figure></div>
</div></div><div data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w" data-element-type="heading" class="zpelement zpelem-heading sub-heading "><style> [data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h2><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">4. Back up and recovery procedures</span></h2></div></h5></div>
<div data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_sHVT9lNqLe2qLC821rFQiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sHVT9lNqLe2qLC821rFQiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div></div></div><div data-element-id="elm_vKzDl-TR0ZNikSTOGuyLTw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_TihoWtynmRWXHpVZ3olVyw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_kJ2AWKQ_pu1314NI41arog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kJ2AWKQ_pu1314NI41arog"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">5. Security awareness training for users</span><br></h2></div>
<div data-element-id="elm_5GA36hiL2MuZcsbjMylEqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5GA36hiL2MuZcsbjMylEqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>User awareness is an important piece of the puzzle. Educate users on security best practices through comprehensive awareness training programs. Foster a culture of security consciousness by informing users about potential threats, phishing attacks, and the importance of safeguarding sensitive information.</p></div></div></div>
</div><div data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Developing comprehensive security awareness training programs that cover topics such as phishing attacks, password security, and data handling practices.</li><li>Providing regular training sessions, workshops, and resources to reinforce security awareness and promote a culture of security within the organization.</li><li>Encouraging user participation and engagement in security awareness initiatives through interactive training modules, quizzes, and real-world examples of security incidents and their impact.</li></ul></div></div></div>
</div><div data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>User awareness is a critical component of overall security.</li><li>Training programs empower users to recognize and mitigate risks.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5ymGxewDYiSBiXV131pNQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_e5ymGxewDYiSBiXV131pNQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_SyKew3QsXA6eSffjUreURw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SyKew3QsXA6eSffjUreURw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">6. Patch Management</span><br></h2></div>
<div data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Patch management is the process of planning, testing, deploying, and monitoring software updates, also known as patches, to address vulnerabilities, bugs, or security flaws in software applications and operating systems. It is an essential aspect of cybersecurity and IT infrastructure management aimed at keeping systems secure and up-to-date.</p><p><span style="color:inherit;"><span style="font-size:11pt;">Effective patch management is crucial for maintaining the security of your SharePoint environment.&nbsp;</span></span><br></p></div></div></div>
</div><div data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following steps:</span></p><ul><li>Regularly monitor for security patches and updates released by Microsoft for SharePoint and associated software components.</li><li>Establish a patch testing process to evaluate patches in a non-production environment before deployment to the production environment.</li><li>Implement a schedule for deploying patches during maintenance windows to minimize disruptions to users and business operations.</li><li>Maintain detailed documentation of patching activities, including patch versions, deployment dates, and any issues encountered during the patching process.</li></ul></div></div></div>
</div><div data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Regular patching helps address known vulnerabilities and reduce the risk of security breaches.</li><li><span style="font-size:11pt;">Testing patches in a controlled environment before deployment helps mitigate the risk of unintended consequences in the production environment.</span></li></ul></div></div></div>
</div><div data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_IuhSeHvfCo31_NApM2PRDw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IuhSeHvfCo31_NApM2PRDw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw"].zpelem-col{ background-color:rgba(52,73,94,0.2); background-image:unset; border-radius:1px; margin-block-start:5px; } </style><div data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw"].zpelem-heading { border-radius:1px; margin-block-start:4px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:20px;color:rgb(255, 255, 255);font-weight:700;">Learn more on our podcast: Ten Ton Potato</span><br></h2></div>
<div data-element-id="elm_bTCe07v8E53FvMmh7owPnA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_bTCe07v8E53FvMmh7owPnA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="250" src="//www.youtube.com/embed/WRVatfwLeCM?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-1 data-api=youtube></iframe></div>
</div><div data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width: 32px !important ; height: 32px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } @media (max-width: 767px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text, [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://podcasts.apple.com/za/podcast/ten-ton-potato-by-gtconsult/id1719258790?i=1000644363073" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/standard.png" width="32" height="32" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Apple Podcasts</span></p></div>
</div></div><div data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width: 33px !important ; height: 33px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } @media (max-width: 767px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text, [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://open.spotify.com/episode/6XbO2MiJtcx3KW3hKOOvYA?si=_-qsW_-6ROSPSNlSDrqimw&amp;nd=1&amp;dlsi=04bd234f250c4329" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Spotify_logo_without_text.svg.png" width="33" height="33" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Spotify</span></p></div>
</div></div><div data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:0px; } @media (max-width: 768px) { div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:calc(0px / 3); } } </style><div class="zpspacer " data-height="0"></div>
</div></div><div data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_03sTYsfavYljJCyVSQCn7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_03sTYsfavYljJCyVSQCn7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">7. Intrusion Detection and Prevention Systems (IDPS)</span><br></h2></div>
<div data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Deploying intrusion detection and prevention systems (IDPS) can help monitor network traffic and detect potential security threats in real-time.</span></span><br></p></div>
</div><div data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following strategies:</span></p><ul><li>Place IDPS sensors strategically throughout the network to monitor traffic entering and exiting SharePoint servers.</li><li>Configure IDPS rules and signatures to detect known attack patterns, anomalous behavior, and suspicious network activities.</li><li>Integrate IDPS with security information and event management (SIEM) systems for centralized logging, correlation, and analysis of security events.</li></ul></div></div>
</div><div data-element-id="elm_oBlD21lOvoL7wERZsofhyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oBlD21lOvoL7wERZsofhyQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>IDPS solutions provide proactive threat detection and help organizations respond to security incidents in a timely manner.</li><li>Integration with SIEM systems enhances visibility and enables comprehensive analysis of security events across the SharePoint environment.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm__WJH6AFz45DLlAMd5JBGDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__WJH6AFz45DLlAMd5JBGDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aNGx42C8U8F35zp-BHkCKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aNGx42C8U8F35zp-BHkCKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">8. Secure external Sharing</span><br></h2></div>
<div data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Implementing secure external sharing practices helps prevent unauthorized access to sensitive information shared with external users.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_gXx8DericCxhcrZQYtw5KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gXx8DericCxhcrZQYtw5KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following recommendations:</span></p><ul><li>Configure external sharing settings to restrict access to specific domains, email addresses, or groups.</li><li>Implement expiration dates and access controls for shared links to limit the lifespan and scope of external sharing.</li><li>Enforce authentication requirements, such as requiring external users to sign in with a Microsoft or third-party identity provider, to verify their identities and control access to shared content.</li></ul></div></div></div></div>
</div><div data-element-id="elm_pWqjDkw1r38IYtD6R44S2A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pWqjDkw1r38IYtD6R44S2A"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><p><span style="font-weight:700;color:rgba(52, 73, 94, 0.7);">Key Takeaways:</span></p><ul><li><span style="color:rgba(52, 73, 94, 0.7);">Secure external sharing practices help organizations maintain control over shared content and protect sensitive information from unauthorized disclosure.</span></li><li><span style="color:rgba(52, 73, 94, 0.7);">Enforcing authentication requirements enhances security and ensures that only authorized external users can access shared resources.</span></li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2XtFlVZpFvhDypojczGS9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_2XtFlVZpFvhDypojczGS9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">9. Network Segmentation</span><br></h2></div>
<div data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p>Network segmentation is the practice of dividing a computer network into smaller, isolated segments or subnetworks to improve security, performance, and manageability. By segmenting a network, organizations can control the flow of traffic, limit access to sensitive resources, and contain the impact of security breaches or unauthorized access attempts.</p></div></div></div></div>
</div><div data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">In the context of SharePoint security, consider:</span></p><ul><li>Segregating SharePoint servers into dedicated network segments or VLANs to isolate them from other parts of the network.</li><li>Implementing firewalls and access control lists (ACLs) to restrict traffic between network segments and enforce security policies.</li><li>Applying network segmentation principles to SharePoint farms, service applications, and databases to minimize the impact of security breaches or unauthorized access.</li></ul></div></div></div></div>
</div><div data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Network segmentation helps contain potential security breaches and reduce the impact of unauthorized access or malicious activities.</li><li>Segregation of SharePoint resources can help limit lateral movement and prevent the spread of security threats within the environment.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_iGRJpWbOKWMizltHB_n7dg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iGRJpWbOKWMizltHB_n7dg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BdKyFDSOAePHxDAEupwe_g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_BdKyFDSOAePHxDAEupwe_g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DmHmmRt5aGL73siYLOmu_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DmHmmRt5aGL73siYLOmu_A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">10. Incident Response Plan</span><br></h2></div>
<div data-element-id="elm_3oBFtK4i842jRfpPRYNTUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3oBFtK4i842jRfpPRYNTUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Developing and maintaining an incident response plan helps organizations effectively detect, respond to, and recover from security incidents affecting SharePoint.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_605rfgOcSOJu68ILGuVVhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_605rfgOcSOJu68ILGuVVhA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following elements:</span></p><ul><li>Establish an incident response team with defined roles, responsibilities, and communication channels.</li><li>Document incident response procedures, including escalation paths, notification requirements, and evidence preservation protocols.</li><li>Conduct regular tabletop exercises and simulations to test the effectiveness of the incident response plan and identify areas for improvement.</li><li>Continuously review and update the incident response plan based on lessons learned from past incidents, changes in the threat landscape, and regulatory requirements.</li></ul></div></div></div></div>
</div><div data-element-id="elm_ouI5539HZzOl67FtY5A3TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ouI5539HZzOl67FtY5A3TA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>An incident response plan helps organizations minimize the impact of security incidents and restore normal operations in a timely manner.</li><li>Regular testing and refinement of the incident response plan ensure preparedness and readiness to respond effectively to security threats and incidents.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_wiD-zFybyQxO-PuYVsso6g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_wiD-zFybyQxO-PuYVsso6g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xLasTE9Jqi53teBr4CoEig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xLasTE9Jqi53teBr4CoEig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width: 137px !important ; height: 150.2px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } @media (max-width: 767px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" data-src="/Blog%20Site/GT_icon_gr-1.png" width="137" height="150.2" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Conclusion</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">In conclusion, safeguarding your SharePoint Intranet requires a holistic approach that encompasses user authentication, encryption, data loss prevention, auditing, backup procedures, and user education. By incorporating these security best practices into your Intranet management strategy, you can create a resilient and secure digital environment that protects your organization's valuable assets. Remember, proactive measures are key to staying ahead of potential threats in the ever-evolving landscape of cybersecurity.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Looking to fortify your SharePoint Intranet and bolster your organization's security defenses? Partner with GTconsult, a Microsoft Solutions Partner for Modern Work, and leverage A Team Protection for expert guidance and tailored solutions. Safeguard your valuable assets with our comprehensive security services. Let GTconsult be your trusted ally in navigating the complex landscape of SharePoint security. Contact us today to discuss your security needs and take proactive steps towards a resilient and secure digital environment.</span><span style="color:inherit;"><br></span></p></div></div>
</div></div></div><div data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://www.gtconsult.com/contact" target="_blank"><span class="zpbutton-content">I need GTconsult!</span></a></div>
</div><div data-element-id="elm_ma9DncK53uSGwm8XnXo6cA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other blogs below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_o6ZNTEATP6vjerleehZQdg" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_hOTLftfs755aUD5Bn9cFOA" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_bip4VbkFNza41hqIpGkTnA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_bip4VbkFNza41hqIpGkTnA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" title="Kyle's take" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Kyle's Take: The recent surge in SharePoint Malware downloads</span></p></div>
</div></div></div><div data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uW9SbxNRw8x4_UIVloRscA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" target="_blank" title="Creating a knowledge base in SharePoint" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Knowledge%20base.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Creating a knowledge base in SharePoint</span></p></div>
</div></div></div><div data-element-id="elm_Q-hf1DaElEMqubDgDmPlow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Q-hf1DaElEMqubDgDmPlow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lUj5flEzQQRL3KStx4isqg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" title="SharePoint Permissions" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Let's talk SharePoint permissions</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_9aM0Zrf0c1ROVCNi0bB2xg" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Chair%20Write%20Up.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel="" style="color:rgb(255, 255, 255);">Micro-moments, Macro-impact</a><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel=""><span style="color:rgb(255, 255, 255);">&nbsp;</span><span style="color:inherit;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></a><span style="color:inherit;">&nbsp; &nbsp; &nbsp; &nbsp;</span></span><br></p></div>
</div></div></div><div data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zYL8S3e6lQXhE8105axshw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_zYL8S3e6lQXhE8105axshw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/Expert-Insights-Why-and-How-to-Migrate-to-SharePoint-SE" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Migration%20Write%20Up%20Thumbnail%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Expert insights: Why and how to migrate to SharePoint SE</span></p></div>
</div></div></div><div data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" title="PowerApps" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">PowerApps in SharePoint</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_azJ7G-NY3n-mwrXtH5f4nQ" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DwficQ1ays7UkzX60PLQdA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank" title="Microsoft Partner" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">GTconsult: Your trusted Microsoft<a href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" title="Microsoft partner" target="_blank" rel=""></a> Solutions Partner for Modern Work&nbsp;</span><br></p></div>
</div></div></div><div data-element-id="elm_21bjcSkuTocbCs1l7gplMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_21bjcSkuTocbCs1l7gplMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oWiro0EGkoR95bkfXIPkpg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank" title="Migration Check list" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist<a href="https://www.gtconsult.com/sharepoint-migration-checklist" title="Migration Check list" target="_blank" rel=""></a></span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div></div><div data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 13 Feb 2024 13:25:29 +0000</pubDate></item></channel></rss>