<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microsoft Industry Blogs &#8211; Canada</title>
	<atom:link href="https://cloudblogs.microsoft.com/industry-blog/en-ca/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudblogs.microsoft.com/industry-blog/en-ca</link>
	<description></description>
	<lastBuildDate>Mon, 10 May 2021 14:41:28 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Zero Trust for networking</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-networking/</link>
		
		<dc:creator><![CDATA[ModernBiz]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 22:39:50 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-networking/</guid>

					<description><![CDATA[<p>Over the last year, the demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels. We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn't necessarily a contained/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.</p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-networking/">Zero Trust for networking</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img loading="lazy" alt="Top-down view of a bearded man in a gray/blue shirt seated at a desk working on a Surface laptop connected to three large monitors." width="1050" height="718" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/04/SEC20_Security_029.jpg"><p>Over the last year, the demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels. We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn&rsquo;t necessarily a contained/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.</p><p>With the trend organizations are looking towards a Zero Trust model, where instead of believing everything behind the corporate firewall is safe, the Zero Trust strategy principals Verify explicitly, Use Least-privileged access and Assume Breach.</p><p>In the Zero Trust model for Networks, there are three key objectives:</p><ol><li>Be Ready to handle attacks before they happen</li><li>Minimize the extent of the damage and how fast it spreads</li><li>Increase the difficulties of compromising your cloud footprint</li></ol><p>As organizations look to deployment Zero Trust framework for securing networks:</p><ol><li><strong>Network Segmentation</strong>: This includes apps and virtual network segmentation which aims to reduce the attack surface and prevent attackers from moving laterally.</li><li><strong>Encryption:</strong> Enforcing encryption on the communication channel between user-to-app or app-to-app with industry standards like TLS/SSL.</li></ol><ol><li><strong>Threat protection</strong>: Employing threat intelligence to help minimize risk from the most sophisticated attacks like bots and malware.</li></ol><p>Get Started on your Zero Trust journey for Networks</p><ol><li>Watch our <a href="https://info.microsoft.com/ww-Network-Security-2021-On-Demand.html" target="_blank" rel="noopener">Zero Trust approach to secure your cloud and hybrid networks</a> webinar</li><li><a href="https://go.microsoft.com/fwlink/p/?LinkID=2120833&amp;clcid=0x409&amp;culture=en-us&amp;country=US" target="_blank" rel="noopener">Evaluate your current Zero Trust maturity stage</a> to determine where your organization is and how to move to the next stage</li></ol><p>Access the <a href="https://docs.microsoft.com/en-us/security/zero-trust/networks" target="_blank" rel="noopener">Zero Trust Deployment Guide for Networks</a> for detailed deployment guidance.</p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-networking/">Zero Trust for networking</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Trust for identity – the modern security model to stay productive and secure</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-identity-the-modern-security-model-to-stay-productive-and-secure/</link>
		
		<dc:creator><![CDATA[ModernBiz]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 22:34:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-identity-the-modern-security-model-to-stay-productive-and-secure/</guid>

					<description><![CDATA[<p>Cybersecurity used to be a lot easier. IT teams did their best to build a security perimetera walled gardenwhere they could treat anything or anyone in that network as secure. This classic approach of attempting to restrict everything to a "secure" network does not accommodate the modern world, where almost everyone works remotely from different types of devices, including personal phones and tablets.</p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-identity-the-modern-security-model-to-stay-productive-and-secure/">Zero Trust for identity – the modern security model to stay productive and secure</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img loading="lazy" alt="A woman getting started with her day in her kitchen and working on a Lenovo ThinkPad Yoga." width="916" height="686" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/04/WIN20_PRO_RemoteWorking_013.jpg"><p>Cybersecurity used to be a lot easier. IT teams did their best to build a security perimetera walled gardenwhere they could treat anything or anyone in that network as secure. This classic approach of attempting to restrict everything to a "secure" network does not accommodate the modern world, where almost everyone works remotely from different types of devices, including personal phones and tablets.</p><p>In a recent survey, 76% of IT leaders current say Zero Trust is the backbone of their access strategy, with the shift to remote work accelerating the adoption with 66% of these IT leaders investing in Zero Trust in the past 3 months. A zero trust approach helps strengthen user authentical, enabling secure access to apps and services and reducing stress on legacy remote work solutions.</p><p>Zero trust principals, Verify Explicitly, Use Least Privileged Access and Assume Breach.</p><p>Identities, representing people, services or IOT devices, are common dominator, and in a zero trust security model, function as a powerful, flexible and granular way to control access to data.</p><p>Five Steps to securing your Identity Infrastructure:</p><ol><li><strong>Strengthen your credentials</strong>: MFA reduces compromise by 99.9%. In the recent survey 63% of organizations have already implemented MFA to secure identities, as the first step in their Zero Trust journey</li><li><strong>Reduce your attack surface area</strong>: Blocking legacy authentication reduces compromise by 67%. Eliminating use of older, less secure protocols, limiting access entry points, and exercising more significant control of administrative access to resources can help reduce the attack surface area.</li><li><strong>Automate threat response:</strong> You can reduce the costs and risks, when you reduce the time criminals use to embed themselves into your environment.</li><li><strong>Utilize cloud intelligence</strong>: Auditing and logging of security-related events and related alerts are essential components of an efficient protection strategy. You can use auditing to monitor user activity, document regulatory compliance, do forensic analysis, and more</li><li><strong>Enable end-user self-service:</strong> As much as possible you want to balance security with productivity and you can remove friction from your organization by empowering your users while remaining vigilant</li></ol><p>Identity is central to a successful Zero Trust strategy. Get started with your Zero Trust Journey with Identity:</p><ol><li>Watch our <a href="https://aka.ms/MSx07.OCT222020_MP4" target="_blank" rel="noopener">Zero Trust Identity Webinar</a> for details on getting started</li><li><a href="https://go.microsoft.com/fwlink/p/?LinkID=2120833&amp;clcid=0x409&amp;culture=en-us&amp;country=US" target="_blank" rel="noopener">Evaluate your current Zero Trust maturity stage</a> to determine where your organization is and how to move to the next stage</li></ol><p>Access the <a href="https://docs.microsoft.com/en-us/security/zero-trust/identity" target="_blank" rel="noopener">Zero Trust Deployment Guide for Identities</a> for detailed deployment guidance.</p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-identity-the-modern-security-model-to-stay-productive-and-secure/">Zero Trust for identity &ndash; the modern security model to stay productive and secure</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Trust for data—classifying, protecting, and governing your data</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-data-classifying-protecting-and-governing-your-data/</link>
		
		<dc:creator><![CDATA[ModernBiz]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 22:19:41 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-data-classifying-protecting-and-governing-your-data/</guid>

					<description><![CDATA[<p>Bad actors want your data. While a lot of things can happen before a user or system get to access an organization's data, data is still ultimately what criminals want; personal information, customer lists, credit card numbers, trade secrets - to name a few. </p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-data-classifying-protecting-and-governing-your-data/">Zero Trust for data—classifying, protecting, and governing your data</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img loading="lazy" alt="Man in a hooded sweater/sweatshirt inside a secure room, pointing at a geographic area displayed on a large monitor." width="1055" height="697" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/04/SEC20_Security_040.jpg"><p>Bad actors want your data. While a lot of things can happen before a user or system get to access an organization's data, data is still ultimately what criminals want; personal information, customer lists, credit card numbers, trade secrets &ndash; to name a few.</p><p>It is no wonder then, that protecting data is one of the primary responsibilities of organizations security and compliant teams. As organizations increase their digital transformation, there is an increasing adoption of Zero Trust principals for data. Zero Trust principals; Verify Explicitly, Use Least Privileged Access and Assume Breach.</p><p>The core elements for a data protection strategy;</p><p><strong>Know your data:</strong> Understand your data landscape and identify important information across your cloud and on-premises environment including, how your data gets used, what is critical, and what is sensitive.</p><p><strong>Protect your data</strong>: Protect your sensitive data throughout its lifecycle by applying sensitivity labels linked to protection actions like encryption, access restrictions, visual markings, and more.</p><p><strong>Prevent data loss</strong>: Apply a consistent set of data loss prevention policies across the cloud, on-premises environments, and endpoints to monitor, prevent, and remediate risky activities with sensitive data.</p><p><strong>Monitor and remediate</strong>: Continuously monitor sensitive data to detect policy violations and risky user behavior. This allows you to take appropriate action, such as revoking access, blocking users, and refining your protection policies.</p><p><strong></strong>As organizations begin their Zero Trust journey for Data the strategy needs to encompass your organizations entire digital state.<strong></strong></p><ol><li>Access decisions are governed by encryption protect your most sensitive data with encryption to restrict access to content that sensitivity labels are applied</li><li>Data is automatically classified and labeled to avoid issues with data not being labeled manually</li><li>Classification is augmented by smart machine learning models with a vast amount of data reduce challenges to adequately label and classify</li><li>Access decisions are governed by a cloud security policy engine</li><li>Prevent data leakage through DLP policies based on sensitivity label and content inspection such as sensitive information such as financial data, and credit card numbers</li></ol><p>Get started with your Zero Trust Journey for Data</p><ol><li>Watch our <a href="https://aka.ms/MSx05.OCT222020_MP4" target="_blank" rel="noopener">Zero Trust Data webinar</a> to explore data-centric security technologies like classification, labelling, encryption, and data loss prevention</li><li><a href="https://go.microsoft.com/fwlink/p/?LinkID=2120833&amp;clcid=0x409&amp;culture=en-us&amp;country=US" target="_blank" rel="noopener">Evaluate your current Zero Trust maturity stage</a> to determine where your organization is and how to move to the next stage</li></ol><p>Access the <a href="https://docs.microsoft.com/en-us/security/zero-trust/data" target="_blank" rel="noopener">Zero Trust Deployment Guide for Data </a>for detailed deployment guidance.</p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-data-classifying-protecting-and-governing-your-data/">Zero Trust for data&mdash;classifying, protecting, and governing your data</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Trust for devices—new approaches for today’s new reality</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-devices-new-approaches-for-todays-new-reality/</link>
		
		<dc:creator><![CDATA[ModernBiz]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 22:15:29 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-devices-new-approaches-for-todays-new-reality/</guid>

					<description><![CDATA[<p>Through the new realities of working from home, organizations are seeing a substantial increase in the diversity of devices accessing their networks. In a receive survey, due to the pandemic, 86% of IT leaders say at least  of their staff are connecting to the corporate networks through personal and shared devices right now. With not all endpoints being managed, or even owned by the organization, this can lead to different device configurations and software patch levels, increasing the potential attack surface.</p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-devices-new-approaches-for-todays-new-reality/">Zero Trust for devices—new approaches for today’s new reality</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img loading="lazy" alt="Teams call with headphones at a home desk on a Lenovo ThinkPad X1 Carbon." width="1052" height="744" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/04/WIN20_PRO_RemoteWorking_033.jpg"><p>Through the new realities of working from home, organizations are seeing a substantial increase in the diversity of devices accessing their networks. In a receive survey, due to the pandemic, 86% of IT leaders say at least of their staff are connecting to the corporate networks through personal and shared devices right now. With not all endpoints being managed, or even owned by the organization, this can lead to different device configurations and software patch levels, increasing the potential attack surface.</p><p>Many organizations are implementing a zero trust security model where devices are monitored for health and compliance before granting access to corporate resources. Gaining visibility into the threat landscape is a vital step on this journey.</p><p>Zero trust principals; Verify Explicitly, Use Least Privileged Access and Assume Breach. In terms of endpoints, this means always verify all endpoints, inclusive of contractor, partner, guest devices and devices used by employees to access work data, regardless of device ownership. Gain visibility into devices accessing the network and ensure compliance and health status before granting access.</p><p><strong>There are a few key rules for securing devices and endpoints in a Zero Trust model:</strong></p><ol><li>Zero Trust security policies are centrally enforced through the cloud and cover endpoint security, device configuration, app protection, device compliance, and risk posture.</li><li>The platform as well as the apps that run on the devices are securely provisioned, properly configured, and kept up to date.</li><li>There is automated and prompt response to contain access to corporate data within the apps in case of a security compromise.</li><li>The access control system ensures that all policy controls are in effect before the data is accessed</li></ol><p>As organizations began their Zero Trust journey for devices, <a href="https://techcommunity.microsoft.com/t5/video-hub/configuring-zero-trust-with-microsoft-endpoint-manager/m-p/1688876" target="_blank" rel="noopener">access our webinar</a> where we walk through the several considerations for Zero Trust for device management and the steps you can take to implement based on where you on the journey.</p><ol><li>Modern management devices are registered and managed from the cloud.</li><li>Security configurations On-prem GPOs analyzed and converted to modern configurations.</li><li>Conditional Access Access is only granted to cloud-managed and compliant devices and apps</li><li>Device Risk Endpoint threat detection is used to monitor device risk</li><li>Endpoint DLP Data loss prevention policies are enforced for BYO and corporate devices.</li></ol><p>A Zero Trust approach can significantly strengthen the security posture of your devices and endpoints.</p><p>Get started with your Zero Trust Journey for Devices</p><ul><li><a href="https://go.microsoft.com/fwlink/p/?LinkID=2120833&amp;clcid=0x409&amp;culture=en-us&amp;country=US" target="_blank" rel="noopener">Evaluate your current Zero Trust maturity stage</a> to determine where your organization is and how to move to the next stage</li><li>Access the <a href="https://docs.microsoft.com/en-us/security/zero-trust/endpoints" target="_blank" rel="noopener">deployment guide for Zero Trust for Endpoints</a></li></ul><p>Leverage the <a href="https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-endpoint-manager-evaluation-lab-kit-now-available-as/ba-p/1676367" target="_blank" rel="noopener">Endpoint manager evaluation Lab Kit</a></p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-devices-new-approaches-for-todays-new-reality/">Zero Trust for devices&mdash;new approaches for today&rsquo;s new reality</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero Trust for apps – discovering, securing, and monitoring every app you use</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-apps-discovering-securing-and-monitoring-every-app-you-use/</link>
		
		<dc:creator><![CDATA[ModernBiz]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 22:07:45 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-apps-discovering-securing-and-monitoring-every-app-you-use/</guid>

					<description><![CDATA[<p>The way we worked evolved rapidly in 2020. Organizations around the world have adapted and embraced remote work.  With employees working from home, being able to connect to any resource, on any device, inclusive of using personal devices, has become a productivity requirement to be able complete their work. In turn, IT still has the responsibility to find the right balance between enabling productivity, while maintaining control to protect critical data. </p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-apps-discovering-securing-and-monitoring-every-app-you-use/">Zero Trust for apps – discovering, securing, and monitoring every app you use</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img loading="lazy" alt="Female small business executive using HP Elite device running Microsoft Teams conference call." width="1058" height="705" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/04/M365CO19_SMB_HPElite_008_TeamsUI_1perso-6078ac72e8b96.jpg"><p>&nbsp;</p><p>The way we worked evolved rapidly in 2020. Organizations around the world have adapted and embraced remote work. With employees working from home, being able to connect to any resource, on any device, inclusive of using personal devices, has become a productivity requirement to be able complete their work. In turn, IT still has the responsibility to find the right balance between enabling productivity, while maintaining control to protect critical data.</p><p>The average organizations has +1500 apps accessed by employees, which equates to over 80GB of data uploaded monthly to various apps. With research showing that less than 15% of these apps are managed by IT, it is no wonder why organizations are looking to a Zero Trust model for applications.</p><p>Zero Trust provides a modern alternative to the traditional way of thinking about cybersecurity that includes applications. Zero Trust principals; Verify Explicitly, Use Least Privileged Access and Assume Breach.</p><p>Zero Trust is a journey, and for Apps;</p><ol><li>It starts with understanding your app ecosystem, apps your employees are using and discovering Shadow IT</li><li>Monitoring user activities and data</li><li>Automating data protection and governance</li><li>Protecting against cyber threats and rogue apps</li><li>Deploying adaptive access and session controls for all apps</li><li>Assessing the security posture of your cloud environment</li></ol><p>Microsoft Cloud App Security provides you the ability to apply these Zero Trust principals across your app ecosystem.</p><p><strong>Discover and control the use of Shadow IT</strong>; When it comes to apps, employees have easy access to both the consumer and business-to-business marketplace of software-as-a-service apps. With employees being able to access your resources and apps outside of your corporate network, it is no longer enough to just have firewall policies.</p><p>Discover and assess cloud apps in your organization by leveraging <a href="https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security" target="_blank" rel="noopener">Cloud Discovery in Microsoft Cloud App Security</a>. With Cloud Discovery set up, you will be able to analyze your traffic logs against the +1600 cloud apps in the catalog, which provides app raking against +90 risk factors to help assess the risk of Shadow IT within your organization.</p><p>You can follow this <a href="https://docs.microsoft.com/en-us/cloud-app-security/tutorial-shadow-it" target="_blank" rel="noopener">step by step Tutorial</a> to discover which apps are being used, explore the risks of these apps, and configure policies to identify new risky apps &amp; unsanctioned apps.</p><p><strong>Monitor user activities and data</strong>; once sanctioned apps are determined, gaining a deeper visibility into these applications becomes important as this is where the most sensitive data resides. By <a href="https://docs.microsoft.com/en-us/cloud-app-security/enable-instant-visibility-protection-and-governance-actions-for-your-apps" target="_blank" rel="noopener">connecting your business critical cloud applications</a>, you can gain visibility into actions, files and accounts that users touch each day, and enable the admin to perform governance actions.</p><p><strong>Automate data protection and governance;</strong> the power of automation cannot be underestimated especially as organizations expand and grow. By leveraging versatile policies within <a href="https://docs.microsoft.com/en-us/cloud-app-security/control-cloud-apps-with-policies" target="_blank" rel="noopener">Microsoft Cloud App Security</a>, you can detect risky behavior, violations, or suspicious data points and activities in your cloud environment. Additionally, they will help you monitor trends, see security threats, and generate customized reports and alerts.</p><p><strong>Protect against cyber threats and rogue apps</strong>; by connecting your applications it enables you to detect and remediate against cyberthreats and rouge applications. Attackers closely monitor where sensitive information is most likely to end up and develop dedicated and unique attack tools, technical and procedures, such as illicit OAuth consent grants and cloud ransomware. Organizations can respond to such threats with tools available in Cloud App Security, such as user and entity <a href="https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy" target="_blank" rel="noopener">behavioral analytics (UEBA) and machine learning</a> capabilities that are enabled out-of-the-box so that you can immediately detect threats, and run advanced threat detection across your cloud environment.</p><p><strong>Deploy adaptive access and session controls for all apps</strong>; will enable you to stop breaches and leaks in real time, before employees intentionally put data at risk. <a href="https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad" target="_blank" rel="noopener">Enable real-time monitoring and control over access to any web app</a>, based on user, location, device, and app.</p><p><strong>Assess the security posture of your cloud environment; </strong>organizations are not limited to SaaS applications, but increasing in IaaS and PaaS services. Assess your security configuration and compliance status across each cloud platform, and in turn limiting the risk by keeping the cloud platforms compliant with your organizations configuration policy and regulatory compliance. View the <a href="https://docs.microsoft.com/en-us/cloud-app-security/security-config" target="_blank" rel="noopener">security configuration assessments</a> and recommendations in Cloud App Security to investigate and remediate against any gaps.</p><p>Get started with your Zero Trust Journey for Apps:</p><ol><li>Watch our <a href="https://aka.ms/MSx06.OCT222020_MP4" target="_blank" rel="noopener">Zero Trust Apps webinar</a> for details on getting started</li><li><a href="https://go.microsoft.com/fwlink/p/?LinkID=2120833&amp;clcid=0x409&amp;culture=en-us&amp;country=US" target="_blank" rel="noopener">Evaluate your current Zero Trust maturity stage</a> to determine where your organization is and how to move to the next stage</li><li>Access the <a href="https://docs.microsoft.com/en-us/security/zero-trust/applications#iii-protect-sensitive-information-and-activities-automatically-by-implementing-policies" target="_blank" rel="noopener">Zero Trust Deployment Guide for Applications</a> for detailed deployment guidance.</li></ol><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/04/28/zero-trust-for-apps-discovering-securing-and-monitoring-every-app-you-use/">Zero Trust for apps &ndash; discovering, securing, and monitoring every app you use</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Calgary Counselling Centre’s rapid Microsoft Teams deployment delivers highly effective mental health care</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/26/calgary-counselling-centres-rapid-microsoft-teams-deployment-delivers-highly-effective-mental-health-care/</link>
		
		<dc:creator><![CDATA[Peter Jones]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 19:15:01 +0000</pubDate>
				<category><![CDATA[Health]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/26/calgary-counselling-centres-rapid-microsoft-teams-deployment-delivers-highly-effective-mental-health-care/</guid>

					<description><![CDATA[<p>Calgary Counselling Centre (CCC) serves some 12,000 clients per year, averaging 35,600 hours of counselling sessions as it helps individuals, families, and groups develop the skills they need to thrive. In business for about 60 years, CCC also provides 80 students each year with the leading-edge research, education, and training opportunities they need to become the next generation of counsellors. </p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/26/calgary-counselling-centres-rapid-microsoft-teams-deployment-delivers-highly-effective-mental-health-care/">Calgary Counselling Centre’s rapid Microsoft Teams deployment delivers highly effective mental health care</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Calgary Counselling Centre (CCC) serves some 12,000 clients per year, averaging 35,600 hours of counselling sessions as it helps individuals, families, and groups develop the skills they need to thrive. In business for about 60 years, CCC also provides 80 students each year with the leading-edge research, education, and training opportunities they need to become the next generation of counsellors.</p><p>CCC delivers unparalleled results, but is always looking for the most effective and efficient way to help clients. It uses outcome measurement and tracks client progress at every session, and its pre-pandemic client outcomes outperformed the published benchmark by 37 per cent. But in light of changed work practices forced by the pandemic, CCC had been experimenting with technologies for remote audio and video communications to broaden its counselling options. When in-office consultations were ruled out, staff already had ideas for best practices that could help keep services available, especially in light of heightened demand during these difficult times. The organization needed a secure solution that was easy for clients and counsellors from all cultural and economic backgrounds to use.</p><p>CCC decided to standardize on Microsoft Teams, making the solution available to administrative staff and all 65 in-house and student counsellors. "We migrated everybody into Teams and rolled it out within 36 hours," says Chief Information Officer Neil Wagner. The rollout went very smoothly; counsellors booked appointments online, clients clicked provided links, and sessions took place in the browser without the need for additional software installation. Those who needed technical help received it very quickly, and counsellors themselves soon gained the confidence to help fix any issues: "I would say probably three quarters of the sessions were no problem. We just had to teach our counsellors enough so that they could be the tech support people for their clients," adds Wagner. More recently, CCC added voice features (PSTN), rounding out the solution with Calling for Microsoft Teams to provide a seamless, unified communications experience for everyone at the Centre.</p><p>To date, more than 45,000 virtual counselling sessions have been successfully completed using Teams. For clients, the online meeting experience is not the same as its conventional in-office counterpart, but CCC data has shown it to be equally if not more effective. CCC has always conducted rigorous results and performance analysis, and CEO Dr. Robbie Babins-Wagner discovered that online consultations have actually provided a boost to counsellors' effectiveness, creating better outcomes for clients. "Clients last year shared more mental health distress than people in the pre-pandemic time. With online counselling using Teams, their outcomes were equal, if not better than during pre-pandemic times or in-person care. So, we're now doing online care by choice," she says.</p><p>It was critical that CCC maintained its clients' privacy on the new platform. Wagner insisted that security was paramount, and one of the main reasons Teams stood out from the other available technologies. In fact, he says emphatically, it may have been three of the reasons: "We could only select one solution for virtual communications, Teams was by far the best fit. And security, security, security!" Dr. Babins-Wagner added that security and privacy are fundamental principles in counselling, particularly so at CCC. "I think the counsellors needed to have full confidence in the security of Teamsjoining, during, and leaving a call. That's what they're grilled in. 'How are we going to do this securely?'"</p><p>CCC now considers Teams a key tool in its counselling and education practice for collaboration among staff and students. After an easy deployment, the organization saw quick benefits in simplified management and swift adoption. Beyond face-to-face client sessions, Dr. Babins-Wagner notes she uses Teams Planner and sharing features to work with external partners and internal colleagues alike. And students get more secure, straightforward meetings and document sharing with their supervisors. Dr. Babins-Wagner thinks the CCC experience with Teams has made it a permanent part of future operationsit's an effective, efficient way to reach more clients and achieve even better results in pursuit of the Centre's mission. "We're going to give clients a choice about whether they want to receive their services virtually or in person. And I expect that the majority of clients are going to want to do it virtually."</p><p>Visit <a href="https://calgarycounselling.com/" target="_blank" rel="noopener">Calgary Counselling Centre</a>, and learn more about <a href="https://docs.microsoft.com/en-us/microsoftteams/expand-teams-across-your-org/healthcare/teams-in-hc" target="_blank" rel="noopener">Microsoft Teams for healthcare organizations</a>.</p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/26/calgary-counselling-centres-rapid-microsoft-teams-deployment-delivers-highly-effective-mental-health-care/">Calgary Counselling Centre&rsquo;s rapid Microsoft Teams deployment delivers highly effective mental health care</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>COVID-19 may have accelerated virtual health’s adoption, but it’s now here to stay</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/21/covid-19-may-have-accelerated-virtual-healths-adoption-but-its-now-here-to-stay/</link>
		
		<dc:creator><![CDATA[Peter Jones]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 19:34:52 +0000</pubDate>
				<category><![CDATA[Health]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/21/covid-19-may-have-accelerated-virtual-healths-adoption-but-its-now-here-to-stay/</guid>

					<description><![CDATA[<p>Prior to spring 2020, just 20% of all medical visits in Canada were conducted virtually. By the end of April 2020, that number had risen to 60%, fueled by the COVID-19 pandemic.</p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/21/covid-19-may-have-accelerated-virtual-healths-adoption-but-its-now-here-to-stay/">COVID-19 may have accelerated virtual health’s adoption, but it’s now here to stay</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Prior to spring 2020, just 20% of all medical visits in Canada were conducted virtually. By the end of April 2020, that number had risen to 60%, fueled by the COVID-19 pandemic.</p><p>While the pandemic may have encouraged faster adoption of virtual healthcare from consumers and providers alike, as the world attempts to move past the pandemic and return to more normalcy, virtual healthcare will remain an attractive option for easily accessible care. However, virtual health's benefits extend beyond accessibility alone.</p><h2>Improving the patient experience</h2><p>A virtual health visit can seem intimidating to a patient their first time around, but Teams makes it an easy and seamless experience for anyone with an internet-connected device.</p><p>Whether located five minutes or five hours from their doctor, patients can join their appointment in seconds through a unique, secure link. Teams also sends appointment reminders and can even securely manage digital intake forms, minimizing confusion for patients.</p><p>Similar to an in-person visit, the patient waits for their appointment in a virtual waiting room. Once they're admitted, they'll be "face-to-face" with a provider. Following their appointment, Teams offers integrated post-care follow-up tools to keep documents in one convenient, secure place.</p><p>The entire experience, from booking the appointment and receiving appointment reminders, to forms leading up to and following the actual visit, happens within the Teams platform. This ensures all communications and documents come from one single source, alleviating patient confusion. When it's time for the appointment, it takes just one click to joinno downloads, no installs, and no software licensing from the patient's perspective, making it easy to use. And when you aren't feeling well, that ease of access and simplicity to join your appointment and get the support and information you need is invaluable.</p><h2>Enhancing collaboration and security for healthcare providers</h2><p>From a provider standpoint, Teams' benefits are multifaceted.<br>During appointments, clinicians can chat "face-to-face," screen share as needed, send patient education videos, and even easily loop in remote specialists through three-way call functionality. This enhances the patient experience while saving time for everyone and enhancing real-time collaboration.</p><p>Multidisciplinary teams can collaborate and synchronize activities, ideas, and documents in a single place. Teams' document management and versioning tools streamline processes and minimize time otherwise spent synchronizing various providers' patient record updates and notes. It also enhances medical team collaboration and communication, while making patient follow-up activities and documents a breeze.</p><p>Importantly, this is all done with the utmost in security protocols. In addition to Microsoft's state-of-the art general security measures, Teams includes precautions to protect patient health data and other regulated and ethics-sensitive data. For example, background blur helps safeguard protected health information that may display behind physicians during virtual visits. All messages are encrypted to protect patient data. Azure Active Directory manages identities and various user-level permissions, and multi-factor authentication and self-service password resets boost security while also minimizing demands on IT staff.</p><p>Virtual health grew 240% throughout the pandemic, and it continues to provide providers and patients lasting opportunities for collaboration, convenience, and enhanced accessibility. Read more about how Teams can help healthcare organizations in the full whitepaper at <a href="https://aka.ms/TeamsinHC" target="_blank" rel="noopener">https://aka.ms/TeamsinHC</a></p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/health/2021/04/21/covid-19-may-have-accelerated-virtual-healths-adoption-but-its-now-here-to-stay/">COVID-19 may have accelerated virtual health&rsquo;s adoption, but it&rsquo;s now here to stay</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Streamlining Communication and Collaboration for Law Enforcement</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/21/streamlining-communication-and-collaboration-for-law-enforcement/</link>
		
		<dc:creator><![CDATA[John Manning]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 19:32:05 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/21/streamlining-communication-and-collaboration-for-law-enforcement/</guid>

					<description><![CDATA[<p>Law enforcement has always needed to be resilient, in order to maintain justice and protect communities. Historically, first responders developed agile and mobile ways to work when faced with natural disasters like floods, earthquakes, and forest fires. The pandemic raised a whole new challenge. First responders were on the front lines of contagion. Public safety was threatened while the virus had the potential to make large numbers of first responders unavailable for active duty. </p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/21/streamlining-communication-and-collaboration-for-law-enforcement/">Streamlining Communication and Collaboration for Law Enforcement</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Law enforcement has always needed to be resilient, in order to maintain justice and protect communities. Historically, first responders developed agile and mobile ways to work when faced with natural disasters like floods, earthquakes, and forest fires. The pandemic raised a whole new challenge. First responders were on the front lines of contagion. Public safety was threatened while the virus had the potential to make large numbers of first responders unavailable for active duty.</p><p>Around the world, many agencies moved to remote work, even for first responders. Agencies put phased squads into the field, while making secondary line officer and support personnel remote. Patrol officers, detectives, and administrators were isolated so they could be utilized if the frontline responders were exposed to the virus. This model led to quick adoption of Microsoft Office 365, and specifically Microsoft Teams.</p><p>Rapidly evolving digital tools are changing the ways law enforcement agencies work. When used properly, the tools can help agencies to streamline internal communications and workflows, and to collaborate internally and externally using the highest security and compliance standards. <a href="https://info.microsoft.com/CA-TeamPlat-CNTNT-FY21-01Jan-19-FuellingdigitaltransformationinlawenforcementwithMicrosoftTeams-SRGCM4210_01Registration-ForminBody.html" target="_blank" rel="noopener">Microsoft Teams has helped law enforcement agencies around the globe achieve this goal.</a></p><h2>Streamlining internal communications and workflows</h2><p>By nature, much of law enforcement is mobile. Microsoft Teams can help departments communicate more quickly and effectively, and to collaborate in a secure digital workspace.</p><p>Agencies can gain interdepartmental efficiency as well as cross jurisdictional efficiency and insights. Teams can become the single source for file management, scheduling, conferencing, and even instant messaging for internal and external resources.</p><p>For example, patrol supervisors can schedule shifts and communicate changes securely and seamlessly, streamlining processes like scheduling. They can stay better connected with their officers, communicating securely and even "face-to-face" with video on the fly.<br>An officer in a complex situation could use Teams to discuss the issue via conference call with their supervisor, a detective, and even other agencies that share a Teams account. The ability to use any device in any location provides instant access to information for making decisions in the field. This can limit costly mistakes and ensure positive outcomes.</p><p>Law enforcement also has a valuable role in the judicial process; however, scheduling an officer for a court appearance is often done blindly. Teams can link the courts and police agencies, using a shared calendar to reduce the back-and-forth friction of trying to align cases and work shifts. Microsoft Teams can even unite mobile officers with courtrooms. This can increase the speed of justice, as well as reduce court dismissals and overtime costs.</p><p>While working their shifts remotely, officers could collaborate real-time with an attorney in court: to give testimony, provide requested documentation, or answer in-session questions without delay. Microsoft Teams also provides transcription and language services to meet all needs for accessibility and understanding.</p><p>Finally, the meetings can be recorded and saved for evidentiary and disclosure purposes. Teams makes the entire communications process seamless and secure.</p><h2>Enhancing external collaboration for better outcomes</h2><p>Jurisdictions have boundaries, but criminals do not recognize those boundaries. In fact, they actively exploit boundaries to evade detection and capture. To solve crimes quickly, protect constituents, and deliver better outcomes, law enforcement agencies need to collaborate effectively with external agencies and partners.</p><p>Microsoft Teams is uniquely positioned to address the complex cross-agency landscape in a very simple way, all while maintaining agency data integrity and privacy.</p><p><strong>Microsoft Teams has built-in security protocols:</strong></p><ul><li>Data is labeled and classified so it can be appropriately assigned according to standard protection policies.</li><li>Teams automatically blocks or limits access if a user doesn't have the right permissions or has not verified identity.</li><li>Agencies can further encrypt, limit, or block access to specific pieces of information.</li></ul><p>Consider working a cross-jurisdictional case. You have a victim statement and need to check another jurisdiction's surveillance video. By giving the external partner guest access, you can chat and collaborate through built-in apps, while sharing only permissioned data and maintaining complete control over your files. You can even store those shared documents and chat messageswith version controlin case you need them for future information requests.</p><p>From helping U.K. police forces collaboratively combat crime, to enhancing Belgium's national police force's communications, Microsoft Teams has proven its ability to enhance global law enforcement. <a href="https://info.microsoft.com/CA-TeamPlat-CNTNT-FY21-01Jan-19-FuellingdigitaltransformationinlawenforcementwithMicrosoftTeams-SRGCM4210_01Registration-ForminBody.html" target="_blank" rel="noopener">Read more about how Teams can help law enforcement agencies and departments, including real-world examples, in the full whitepaper</a>.</p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/21/streamlining-communication-and-collaboration-for-law-enforcement/">Streamlining Communication and Collaboration for Law Enforcement</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fueling Innovation in Canada’s Frontline Law Enforcement</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/09/fueling-innovation-in-canadas-frontline-law-enforcement/</link>
		
		<dc:creator><![CDATA[Kevin Byrnes]]></dc:creator>
		<pubDate>Fri, 09 Apr 2021 21:28:39 +0000</pubDate>
				<category><![CDATA[Government]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/09/fueling-innovation-in-canadas-frontline-law-enforcement/</guid>

					<description><![CDATA[<p>While the core principles governing the practice of policing have remained relatively unchanged throughout the years, many traditional ways of delivering services have become outdated.</p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/09/fueling-innovation-in-canadas-frontline-law-enforcement/">Fueling Innovation in Canada’s Frontline Law Enforcement</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While the core principles governing the practice of policing have remained relatively unchanged throughout the years, many traditional ways of delivering services have become outdated. <a href="https://www.microsoft.com/en-ca/industry/government/public-safety-and-justice" target="_blank" rel="noopener">Law enforcement agencies</a> around the world are turning to new, more digital ways of operating that are optimized to serve communities in the 21<sup>st</sup> century. This especially holds true for the past year, which has seen COVID-19 present unprecedented levels of disruption and ultimately act as a catalyst for digital transformation across virtually every sector and industry. Whether it's capturing and analyzing data to identify trends, securely exchanging information or enabling cross-agency collaboration technology is playing a transformative role in almost every facet of frontline policing.</p><p><strong>Driving collaboration on the frontline</strong></p><p>In today's climate, it has become critical for law enforcement agencies to be equipped with robust solutions that enhance internal communication and support collaboration with external partners ones able to accommodate tasks such as shift scheduling and data exchange, both internally and with other police forces. Given the highly sensitive nature of data being shared, tools must also adhere to the strictest security and compliance standards. To keep pace with these rapidly evolving requirements, agencies across Canada are relying on Microsoft Teams for an all-in-one platform that delivers on the diverse needs of law enforcement agencies. Through Teams, agencies are realizing a number of benefits including:</p><ul><li><strong>Enhanced connections and centralized communications. </strong>Teams offers a single hub to streamline workflows, manage daily meetings and tasks, and swap shifts. Officers in the field can also access, share, organize and update documents remotely as well as join meetings or send real-time updates in chat.</li><li><strong>Cross-agency collaboration. </strong>Teams allows officers across different regions to easily share information in real time with the ability to cooperate and track criminals as they move across jurisdictions. By bringing together disparate data into one common hub, Teams turns data into actionable information.</li><li><strong>The ability to securely share and protect sensitive data. </strong>Only the right users have the right level of access to information, by automatically blocking or limiting access if a user does not have the right permissions or their identity is not verified.</li></ul><p>In addition to Teams, Microsoft is also empowering law enforcement through cloud, data, AI and productivity solutions allowing them to uncover new capabilities, efficiencies and cost savings. For example, digital case and record management tools have replaced or improved labour-intensive, paper-based processes built on old workflows. Digital transcription and audio/video recording services have also become a standard for many agencies, in turn reducing time spent on manual tasks and enabling officers and their support teams to focus on higher value functions. As you can see, digital transformation is no longer a future objective, but a requirement to enable remote work and improve operations for the evolution of law enforcement.</p><img loading="lazy" alt="Police Officer in Car" width="800" height="450" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/04/women_in_car.jpg"><p>&nbsp;</p><p><strong>A global ecosystem of partners and thought leaders</strong></p><p>When leveraging Microsoft solutions, law enforcement agencies benefit from more than just technology; they gain access to a vast partner ecosystem providing exclusive resources, programs, tools and connections to foster growth and fuel digital transformation. We currently have over 13,000 partners in Canada and many more around the world equipping organizations in all industries, including those in public safety, with the expertise and technology to thrive.</p><p>One of our cutting-edge partners is <a href="https://www.nice.com" target="_blank" rel="noopener">NICE</a>, a worldwide provider of software solutions using Microsoft Azure to help more than 25,000 organizations globally make smarter, insight-driven decisions, deliver better customer service, combat fraud and safeguard citizens. We also have <a href="https://caselines.com/" target="_blank" rel="noopener">Caselines</a>, a Thomson Reuters evidence management solution, that provides a secure and integrated platform to help police, prosecutors, lawyers and judges work across their respective judicial functions with confidence and trust. Another leading partner is <a href="https://verisaas.com/" target="_blank" rel="noopener">VeriSaaS</a>, who brings cognitive-enabled and mobile-ready solutions to improve field intelligence and evidence collection to support mission critical information in the field and for court.</p><p>In a time when the public sector is being asked to do more with less, Microsoft remains dedicated to equipping frontline agencies with strong, consistent and secure solutions to help them innovate and better serve their community.</p><p><strong>We're more than just a software company<br></strong>For more information on how Microsoft Teams is fuelling digital transformation in law enforcement, you can download the following <a href="https://info.microsoft.com/CA-TeamPlat-CNTNT-FY21-01Jan-19-FuellingdigitaltransformationinlawenforcementwithMicrosoftTeams-SRGCM4210_01Registration-ForminBody.html" target="_blank" rel="noopener"><strong>e-book</strong></a>.</p><p>I also encourage you to register for an on-demand <a href="https://mktoevents.com/Microsoft+Event/233341/157-GQE-382" target="_blank" rel="noopener"><strong>webinar</strong></a> in which Microsoft's <a href="https://www.linkedin.com/in/kirk-arthur-16869612/" target="_blank" rel="noopener">Kirk Arthur</a>, Director, Worldwide Public Safety &amp; Justice and <a href="https://www.linkedin.com/in/johnmanning1/" target="_blank" rel="noopener">John Manning</a>, Associate Architect, Public Safety &amp; National Security Solutions, will discuss the latest policing industry trends and how agencies can embrace technology to drive their digital transformation.</p><p><span lang="EN-CA" xml:lang="EN-CA"><span>On April 29, join us for a live webinar as John Manning, Microsoft's Associate Architect, Public Safety &amp; National Security Solutions, explores how technology is helping enhance public safety, broker community partnerships, and save lives. </span></span><a href="https://mktoevents.com/Microsoft+Event/264667/157-GQE-382" target="_blank" rel="noreferrer noopener"><span lang="EN-CA" xml:lang="EN-CA"><span>Register today to reserve your spot for this live, interactive conversation.</span></span></a><span></span></p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/government/2021/04/09/fueling-innovation-in-canadas-frontline-law-enforcement/">Fueling Innovation in Canada&rsquo;s Frontline Law Enforcement</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Six ways to speed up your recovery in 2021</title>
		<link>https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/03/17/six-ways-to-speed-up-your-recovery-in-2021/</link>
		
		<dc:creator><![CDATA[ModernBiz]]></dc:creator>
		<pubDate>Wed, 17 Mar 2021 18:32:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[SMB]]></category>
		<guid isPermaLink="false">https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/03/17/six-ways-to-speed-up-your-recovery-in-2021/</guid>

					<description><![CDATA[<p>2021 promises to be a year of economic recovery across Canada. This Microsoft post offers six ways that small and medium-sized businesses can speed up their recovery.</p>
<p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/03/17/six-ways-to-speed-up-your-recovery-in-2021/">Six ways to speed up your recovery in 2021</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>
]]></description>
										<content:encoded><![CDATA[<img loading="lazy" alt="Photograph of a chef standing in a kitchen working on a Surface device" width="800" height="533" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/03/BlogPicture.png"><p>&nbsp;</p><p>2021 promises to be a year of economic recovery across Canada. This Microsoft post offers six ways that small and medium-sized businesses can speed up their recovery.</p><blockquote><p>"Intelligence is the ability to adapt to change." Stephen Hawking</p></blockquote><p>2020 provided Canadian businesses unwilling or unable to digital transform all the evidence they needed of the risk of lagging. In a year when lock-down orders forced all employers to embrace remote working, organizations who lacked modern workplace cloud-based tools and enterprise security faced disruption and closure.</p><blockquote><p>If you view technology as an operational weakness, not a strength, you can rewrite that story this year with these six recovery tips.</p></blockquote><h3>1. Don't block your own recovery</h3><p>Some decision-makers resist remote working and demand to manage people in person, believing that their oversight keeps employees productive. Analysis such as <a href="https://www.microsoft.com/en-us/microsoft-365/blog/wp-content/uploads/sites/2/2019/04/Total-Economic-Impact-Microsoft-Teams.pdf?rtc=1" target="_blank" rel="noopener">Forrester's Total Economic Impact<img src="https://s.w.org/images/core/emoji/13.0.1/72x72/2122.png" alt=""> of Microsoft Teams</a> may help them feel better. If employees can produce comparable results, where they work simply does not matter. In fact, collaboration hubs like Microsoft Teams can work like a charm and unlock big benefits, including the costs savings and time recovered from needless commuting.</p><img loading="lazy" alt="Screen grab of Hilary Zaborski and Sharon Shoenborn from their " helping smbs build business resilience session from microsoft canada future now width="802" height="451" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/03/Picture1.jpg"><p>&nbsp;</p><h3>2. Get expert guidance</h3><p>Small and medium-sized business decision-makers defining their digital transformation strategy may want to tune into some recent presentations from recovery experts. Microsoft's Future Now 2020 featured a bunch of inspiring sessions now available on demand. <a href="https://www.microsoft.com/en-ca/sites/future-now" target="_blank" rel="noopener">Browse all Future Now 2020 videos on demand here.</a></p><p><strong>Future Now 2020 small and medium-sized business sessions</strong></p><p>"Helping SMBs build business resilience" with Sharon Shoenborn and Hilary Zaborski discussing why digital transformation is more urgent than ever.</p><p>"Managing change through uncertain times" with Avery Swartz and Hilary Zaborski discussing the change in work dynamics and how we support communities.</p><p>"Living your culture in crisis" with Carolyn Byer shares Microsoft's five-year cultural journey to create a purpose-driven mission.</p><p>"Lessons from the frontlines &ndash; In conversation with Shared Services Canada" with Lisa Carroll and Sarah Paquet chronicles how governments managed this year.</p><img loading="lazy" alt="Illustration of three people, stylized." width="802" height="388" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/03/Picture2.png"><p>&nbsp;</p><h3>3. Improve your business resilience</h3><p>Organizations that succeed in times of change have one thing in common: they are resilient. Discover how Microsoft solutions can help you strengthen resilience in people, teams, and your broader organization. <a href="https://clouddamcdnprodep.azureedge.net/gdc/gdczEUYnj/original" target="_blank" rel="noopener">Download<em> The Future of Business Resilience ebook</em></a></p><img loading="lazy" alt="Photograph of a person seated at a desk at home" width="801" height="451" src="https://cloudblogs.microsoft.com/industry-blog/uploads/industry/sites/23/2021/03/Picture3.jpg"><p>&nbsp;</p><h3>4. Take advantage of free workshops</h3><p>Microsoft Store offers free digital versions of its popular workshops for professionals. Every small and medium-sized business can take advantage of these workshops to build their technical skills and knowledge. Learn how to get the most out of Microsoft Teams, the secure collaboration hub, and other solutions like Microsoft 365, LinkedIn, Power BI, and more. <a href="https://www.microsoft.com/en-ca/store/workshops-training-and-events/professionals#page=1&amp;pageSize=24" target="_blank" rel="noopener">Browse Microsoft Store free digital workshops for professionals</a></p><h3>5. Embrace digital skilling and certification</h3><p><a href="https://www.microsoft.com/en-ca/sites/microsoft-training-days/" target="_blank" rel="noopener">Microsoft Virtual Training Days</a> offers free <strong>Fundamentals</strong> classes and exams for non-technical professionals and <strong>Specialty</strong> classes for IT pros, in English and French.</p><p>Encourage every employee, not just your IT team, to take a free digital skilling class and to get Microsoft-certified. Employees who get technical training benefit from improved confidence and capabilities, which benefits the entire organization.</p><p>Microsoft subscribers, get the most value out of your solutions today!</p><ul><li>All Dynamics 365 users can access <strong>Dynamics 365 Fundamentals</strong></li><li>All Power BI users can access <strong>Power Platform Fundamentals</strong></li><li>All Azure users can access <strong>Azure Fundamentals</strong></li></ul><p><strong>Azure Fundamentals </strong>Master the most important cloud concepts and strategies. Enable digital transformation, collaboration, innovation, and better security. Unlock the world's most transformative technologies with Azure.</p><p><strong>Dynamics 365 Fundamentals </strong>Become a digital transformation expert. Discover how to design intelligent systems using advanced analytics, the Internet of Things, artificial intelligence, and mixed reality.</p><p><strong>Power Platform Fundamentals </strong>Discover how to drive digital innovation and automation. Connect all your data to analyze business performance. Build custom apps and automate workflows. Learn what Power Platform can do for you.</p><h3>6. Step up your cybersecurity</h3><p>Last, but certainly not least, make sure you keep cybersecurity top of mind. Cybercrime represents a clear and present danger to all Canadian organizations, big or small.</p><p>Start by upgrading the PCs you use to Windows 10 to help protect your organization from phishing and viruses. <a href="https://www.microsoft.com/en-ca/windows/comprehensive-security" target="_blank" rel="noopener">Learn more about Windows 10 security features</a></p><p>Then learn and teach your employees how to better detect and protect your business from attacks. Microsoft published the <em>Keep your business moving securely</em> series to help small and medium-sized businesses learn how they can practice business self-defense.</p><p><strong>Keep your business moving securely series</strong></p><ol><li><a href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2020/06/17/how-to-work-remotely-for-everyone-who-needs-to-stay-productive-from-home/">How to work remotely, for everyone who needs to stay productive from home</a></li><li><a href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2020/06/30/eight-remote-working-essentials-to-stay-productive/">Eight remote working essentials to stay productive</a></li><li><a href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2020/06/30/your-security-checklist-to-help-protect-your-employees-working-from-home/">Your security checklist to help protect your employees working from home</a></li><li><a href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2020/06/30/empowering-canadian-healthcare-teams-with-new-remote-working-tools/">Empowering Canadian healthcare teams with new remote working tools</a></li><li><a href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2020/06/30/secure-remote-working-solutions-for-government-agencies/">Secure remote working solutions for government agencies</a></li><li><a href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2020/06/30/secure-remote-working-for-human-resources-teams/">Secure remote working for human resources teams</a></li></ol><h3>If you need support</h3><p>As always, Microsoft Canada is here to help. <a href="https://support.microsoft.com/en-us/contactus/" target="_blank" rel="noopener">Microsoft Canada offers customers diverse options</a> to get support. If you don't have an IT company already, you can also get expert assistance from Microsoft's vast network of certified solution-providers. Over 12,000 companies in Canada participate in the Microsoft Partner Network. Find one that suits your needs and wants at Microsoft Canada's <a href="https://www.microsoft.com/en-ca/solution-providers/home" target="_blank" rel="noopener">solution provider search tool.</a></p><p>The post <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca/uncategorized/2021/03/17/six-ways-to-speed-up-your-recovery-in-2021/">Six ways to speed up your recovery in 2021</a> appeared first on <a rel="nofollow" href="https://cloudblogs.microsoft.com/industry-blog/en-ca">Microsoft Industry Blogs - Canada</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
