If you’re getting ready to roll out Microsoft 365 Copilot in your organisation, be sure to take a security-first approach.
Start by recognising that Copilot uses the existing security settings you have for Microsoft 365. So it’s a good idea to review those security policies, permissions and data settings to verify that they’re up to date and meet your organisation’s requirements.
Microsoft supports a zero trust approach that “treats each connection and resource request as though it originated from an uncontrolled network and a threat actor”. It provides a comprehensive set of tools to enable you to take this approach when you deploy Copilot, including Microsoft Defender, Microsoft Entra, Microsoft Intune and Microsoft Purview Information Protection.
Your organisation should use these tools to identify and defend against potential Copilot-related risks, protect all of the applications and data involved in your use of Copilot and to ensure that you use Copilot in a responsible and compliant way.