{"id":34250,"date":"2020-04-06T16:00:44","date_gmt":"2020-04-06T16:00:44","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90861"},"modified":"2020-04-06T16:00:44","modified_gmt":"2020-04-06T16:00:44","slug":"protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/","title":{"rendered":"Protecting your data and maintaining compliance in a remote work environment"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>In this difficult time, remote work is becoming the new normal for many companies around the world. Employees are using tools like <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/03\/05\/our-commitment-to-customers-during-covid-19\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Teams<\/a> to collaborate, chat, and connect in new ways to try to keep their businesses moving forward amidst the challenging global health crisis. I sincerely hope you and your families are staying safe and healthy.<\/p>\n<p>I have been talking with many of you about the impact today\u2019s environment is having on your organizations. Business continuity is an imperative, and you must rely on your employees to stay connected and productive outside of the traditional digital borders of business. In doing so, identifying and managing potential risks within the organization is critical to safeguarding your data and intellectual property (IP), while supporting a positive company culture.<\/p>\n<p>Because many of you have been asking, here is some guidance for things you can do to take advantage of these capabilities. I\u2019ll focus a lot of the examples on Teams, but many of these features are relevant across Microsoft 365.<\/p>\n<h3>Staying secure and compliant<\/h3>\n<p>First, knowing where your data resides while employees are working remotely is a vital question, especially for your risk management-focused departments. Data in Teams is encrypted at rest and in transport, and uses secure real-time protocol for video, audio, and desktop sharing.<\/p>\n<p>There are also several tools that help you remain in control and protect sensitive documents and data in Microsoft 365. For example, you can <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels-teams-groups-sites?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">restrict Teams experiences for guests and people outside of your organization<\/a>. You can also govern the apps to which each user has access.<\/p>\n<p>In addition, we\u2019ve made sure that the Teams service is compliant: to help you answer questions from your auditors, we publish auditor reports on the <a href=\"https:\/\/servicetrust.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Service Trust Portal<\/a>. And we help our customers keep up with evolving regulations and standards with a robust <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-home?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">compliance controls framework<\/a>, which meets some of the most rigorous industry and countries\u2019 regulations requirements.<\/p>\n<h3>Applying data loss prevention in Teams<\/h3>\n<p>Data loss prevention (DLP) addresses concerns around sensitive information in messages or documents. Setting up <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/dlp-microsoft-teams?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">DLP policies in Teams<\/a> can protect your data and take specific actions when sensitive information is shared. For example, suppose that someone attempts to share a document with guests in a Teams channel or chat, and the document contains sensitive information. If you have a DLP policy defined to prevent this, the document won\u2019t open for those users. Note that in this case, your DLP policy must include SharePoint and OneDrive for the protection to be in place.<\/p>\n<h3>Applying sensitivity labeling to protect sensitive data<\/h3>\n<p>You can also apply a sensitivity label to important documents and associate it with protection policies and actions like encryption, visual marking, and access controls and be assured that the protection will persist with the document throughout its lifecycle, as it is shared among users who are internal or external to your organization.<\/p>\n<p>You can start by allowing users to manually classify emails and documents by applying sensitivity labels based on their assessment of the content and their interpretation of the organizational guidelines. However, users also forget or inaccurately apply labels, especially in these stressful times, so you need a method that will scale to the vast amount of data you have.<\/p>\n<p>To help you to achieve that scale, <a href=\"http:\/\/aka.ms\/AutoClassificationPublicPreview\" target=\"_blank\" rel=\"noopener noreferrer\">we are announcing the public preview of automatic classification with sensitivity labels<\/a> for documents stored on SharePoint Online and OneDrive for Business, and for emails in transit in Exchange Online. The public preview will begin rolling out over the next week. Like with manual classification, you can now set up sensitivity labels to automatically apply to Office files (e.g., PowerPoint, Excel, Word, etc.) and emails based upon organizational policies. In addition to having users manually label files, you can configure auto classification policies in Microsoft 365 services like SharePoint Online, OneDrive, and Exchange Online. These policies can automatically label files at rest and in motion based on the rules you\u2019ve set. Those classifications also apply when those documents are shared via Teams.<\/p>\n<h3>Minimize insider risk<\/h3>\n<p>We also know that <a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2008_005_001_14981.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">stressful events contribute to the likelihood of insider risks<\/a>, such as leakages, IP theft, or data harassment. Insider Risk Management looks at activity from across Microsoft 365, including Teams, to identify potential suspicious activity early.<\/p>\n<p><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/announcing-the-general-availability-of-communication-compliance\/ba-p\/1167989\" target=\"_blank\" rel=\"noopener noreferrer\">Communication Compliance<\/a>, part of the new Insider Risk Management solution set in Microsoft 365, leverages machine learning to quickly identify and take action on code of conduct policy violations in company communications channels, including Teams. Communication Compliance reasons over language used in Teams which may indicate issues related to threats (harm to oneself or others). Detecting this type of language in a timely manner not only minimizes the impact of internal risk, but also can go a long way in supporting employee mental health in uncertain times like this.<\/p>\n<h3>Enabling simple retention policies<\/h3>\n<p>To comply with your organization\u2019s internal policies, industry regulations, or legal needs, all your company information should be properly governed. That means ensuring that all required information is kept, while the data that\u2019s considered a liability and that you\u2019re no longer required to keep is deleted.<\/p>\n<p>You can set up <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/retention-policies\" target=\"_blank\" rel=\"noopener noreferrer\">Teams retention policies<\/a> for chat and channel messages, and you can apply a Teams retention policy to your entire organization or to specific users and teams. When data is subject to a retention policy, users can continue to work with it because the data is retained in place, in its original location. If a user edits or deletes data that\u2019s subject to the retention policy, a copy is saved to a secure location where it\u2019s retained while the policy is in effect.<\/p>\n<p>All data is retained for compliance reasons and is available for eDiscovery until the retention period expires, after which your policy indicates whether to do nothing or delete the data. With a Teams retention policy, when you delete data, it\u2019s permanently deleted from all storage locations on the Teams service.<\/p>\n<h3>Staying productive while minimizing risk<\/h3>\n<p>Working remotely helps your employees stay healthy, productive, and connected, and you can keep them productive without increasing risk or compromising compliance. For more guidance around supporting a remote work environment in today\u2019s challenging climate, check out our <a href=\"https:\/\/news.microsoft.com\/covid-19-response\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Work<\/a> or <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/enabling-remote-work\/ct-p\/RemoteWork\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Work Tech Community<\/a> sites.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/06\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business continuity is an imperative, and you must rely on your employees to stay connected and productive outside of the traditional digital borders of business. In doing so, identifying and managing potential risks within the organization is critical to safeguarding your data and intellectual property (IP), while supporting a positive company culture.<br \/>\nThe post Protecting your data and maintaining compliance in a remote work environment appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34251,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6445,6420],"class_list":["post-34250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-information-data-protection","tag-microsoft-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting your data and maintaining compliance in a remote work environment 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting your data and maintaining compliance in a remote work environment 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-06T16:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Protecting your data and maintaining compliance in a remote work environment\",\"datePublished\":\"2020-04-06T16:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/\"},\"wordCount\":1057,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png\",\"keywords\":[\"Information\\\/data protection\",\"Microsoft 365\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/\",\"name\":\"Protecting your data and maintaining compliance in a remote work environment 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png\",\"datePublished\":\"2020-04-06T16:00:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information\\\/data protection\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/information-data-protection\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting your data and maintaining compliance in a remote work environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting your data and maintaining compliance in a remote work environment 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/","og_locale":"en_US","og_type":"article","og_title":"Protecting your data and maintaining compliance in a remote work environment 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-06T16:00:44+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Protecting your data and maintaining compliance in a remote work environment","datePublished":"2020-04-06T16:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/"},"wordCount":1057,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png","keywords":["Information\/data protection","Microsoft 365"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/","url":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/","name":"Protecting your data and maintaining compliance in a remote work environment 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png","datePublished":"2020-04-06T16:00:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-data-and-maintaining-compliance-in-a-remote-work-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Information\/data protection","item":"https:\/\/www.threatshub.org\/blog\/tag\/information-data-protection\/"},{"@type":"ListItem","position":3,"name":"Protecting your data and maintaining compliance in a remote work environment"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34250"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34250\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34251"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}