IT Matters for Small Business Blog

Subscribe here! ⬇️

stars_milky_way_starry_sky_119836_3840x2160-1

Cybersecurity

Top 9 Cybersecurity Tips for Small to Medium Sized Businesses

"Rome wasn't built in a day, but it burned in one." - classic Italian saying

Read More

IT Security Policy: Why You Need One (+How to Create Yours)

What's your company's security policy? How do you classify your data? How do you manage your data? Most importantly: How do you protect your data?

Read More

1 min read

How to stop email spoofing

Have you ever received an email where...you just couldn't quite tell if it was real? Your heart began to beat just a little faster as you decided...

Read More

Security Attestation: What is it? Do I need it? + Free template

Do you know where you stand in terms of your security status?*Gulp*If you just cried a little wondering a.) what I'm talking about and b.) if...

Read More

Managed Service Provider vs. Cloud Solutions Provider: What's the Difference?

IT support services in recent times have been nothing but revolutionary. The technology landscape has continued to evolve as the sector gets...

Read More

The Top 5 Add-Ons Your Microsoft 365 Licensing Needs to Make Your Business Thrive

Imagine for a minute that you just purchased Microsoft 365 Business Premium for your company. You install the desktop apps, get loaded in, and...

Read More

How to Set Up Office Message Encryption (OME)

In this blog post, we'll be giving you the step-by-step instructions for configuring Office Message Encryption. I have to say they aren't for the...

Read More

Office 365 Advanced Threat Protection: Plan 1 vs Plan 2

Office 365 Advanced Threat Protection (ATP) protects you by preventing dangerous links and malicious attachments from entering your organization...

Read More

Microsoft Authenticator App (MFA the easy way)

I am busy. I have a sneaking suspicion that you are too. However, until recently, I donated precious time, multiple times a day, to getting out my...

Read More

How to Set Up Exchange Online Protection

In this blog post, we're going to walk you through the step-by-step process for setting up Exchange Online Protection (EOP). Although setting up...

Read More

How to Set Up Office 365 Advanced Threat Protection

In this blog post, we're going to walk you through the step-by-step process for setting up Office 365 Advanced Threat Protection (ATP). Although...

Read More

Spear Phishing vs. Phishing: The Difference And How To Prevent It

As many companies shift their operations online (and their employees shift into their “daytime jammies”) so too must their attention shift to...

Read More