BEMO Blog

Your trusted resource on Cybersecurity, Microsoft, Migrations, and more.

Subscribe here! ⬇️

Subscribe here!

Cybersecurity

2 min read

Microsoft Announces Cybersecurity Threat Volt Typhoon

On May 24, Microsoft announced an alarming cybersecurity threat by the name of Volt Typhoon and provided important defense recommendations based on...

Read More
zero trust access for dummies

3 min read

What is Zero Trust and Why SMBs Need to Work Towards It

Zero Trust has become a buzzword in recent years, and no, not because dating in 2023 is next to impossible (or so I hear… I’m happily married). 

Read More
mfa and sso

5 min read

How to Maximize Security Without Sacrificing Productivity: Multi Factor Authentication (MFA) and Single Sign-On (SSO)

As an SMB owner, you may be concerned about the potential impact of Identity Protection on your employees' productivity. After all, implementing...

Read More

4 min read

Building a Winning Data Security Defense: What is Endpoint Security Management?

  As an IT Manager or CEO of a small business, you know the importance of protecting your company's data from potential threats. Managing machines...

Read More
How to prevent Cyber Attacks with Business Premium

5 min read

Advanced Threat Protection Against Phishing

We're diving deep into the choppy waters of cybersecurity, explicitly focusing on advanced protection against phishing and how to avoid cyber...

Read More

15 min read

Microsoft Sensitivity Labels

Sensitivity labels will be the first component of Microsoft Purview that we will talk in depth about following up our Microsoft Purview Information...

Read More

10 min read

What is Microsoft Purview ? Your A to Z Guide to Getting Secure Fast

You need to bring your business up to regulatory requirements and set up your security in a way that is both easily implemented and still keeps...

Read More

5 min read

Why You Need A Data Backup Disaster Recovery Plan Today

Let’s get something straight right off the bat: Your data is your data. It’s your property, your responsibility to maintain, and your butt on the...

Read More

5 min read

IT For Small Business: Never Skimp On Cybersecurity!

  60% Of Small Businesses Will Be Targeted By Cyber Attackers. Don’t Make It Easy For Them. If you think that number seems overinflated or...

Read More
BEMO raised $3M seed round to deploy Microsoft Security Stack easier

2 min read

What is BEMO building?

 We recently announced that we raised $3M from investors in addition to a $500k, 0% interest loan from Microsoft. So... what are we building?   ...

Read More
BEMO raised $3M Seed Round

1 min read

BEMO Raises $3M Seed Round to Build Security Solutions on Top of Microsoft Security Stack

Redmond, WA, May 16, 2022 — BEMO, a Managed Security Service Provider (MSSP), today announced the completion of a $3 million seed funding round to...

Read More

1 min read

How to Keep Your Remote Workers Cybersecure

Cybersecurity has never been more important for your small to medium sized business. A whopping 43% of cyberattacks target SMBs, and 60% of these...

Read More

6 min read

Personal vs. Corporate Devices for Remote Work: Pros & Cons

Let's face it: Work-from-home (WFH) and hybrid work is here to stay, and with that, your company has a decision to make: Should you let your...

Read More
cybersecurity tips for small to medium sized businesses

8 min read

Top 9 Cybersecurity Tips for Small to Medium Sized Businesses

"Rome wasn't built in a day, but it burned in one." - classic Italian saying

Read More
IT security policy handbook

5 min read

IT Security Policy: Why You Need One (+How to Create Yours)

What's your company's security policy? How do you classify your data? How do you manage your data? Most importantly: How do you protect your data? If...

Read More
how to find out where a spoofed email came from

5 min read

How to stop email spoofing

Have you ever received an email where...you just couldn't quite tell if it was real? Your heart began to beat just a little faster as you decided if...

Read More
Security attestation

3 min read

Security Attestation: What is it? Do I need it? + Free template

Do you know where you stand in terms of your security status?*Gulp*If you just cried a little wondering a.) what I'm talking about and b.) if you're...

Read More

4 min read

Managed Service Provider vs. Cloud Solutions Provider: What's the Difference?

IT support services in recent times have been nothing but revolutionary. The technology landscape has continued to evolve as the sector gets...

Read More

7 min read

The Top 5 Add-Ons Your Microsoft 365 Licensing Needs to Make Your Business Thrive

Imagine for a minute that you just purchased Microsoft 365 Business Premium for your company. You install the desktop apps, get loaded in, and start...

Read More

5 min read

How to Set Up Office Message Encryption (OME)

In this blog post, we'll be giving you the step-by-step instructions for configuring Office Message Encryption. I have to say they aren't for the...

Read More

4 min read

Office 365 Advanced Threat Protection: Plan 1 vs Plan 2

Office 365 Advanced Threat Protection (ATP) protects you by preventing dangerous links and malicious attachments from entering your organization via...

Read More

3 min read

Microsoft Authenticator App (MFA the easy way)

I am busy. I have a sneaking suspicion that you are too. However, until recently, I donated precious time, multiple times a day, to getting out my...

Read More
How to Set Up Exchange Online Protection

2 min read

How to Set Up Exchange Online Protection

In this blog post, we're going to walk you through the step-by-step process for setting up Exchange Online Protection (EOP). Although setting up...

Read More
How to Set Up Office 365 ATP

2 min read

How to Set Up Office 365 Advanced Threat Protection

In this blog post, we're going to walk you through the step-by-step process for setting up Office 365 Advanced Threat Protection (ATP). Although...

Read More

7 min read

Spear Phishing vs. Phishing: The Difference And How To Prevent It

As many companies shift their operations online (and their employees shift into their “daytime jammies”) so too must their attention shift to...

Read More
nediobruno2

7 min read

Azure AD Identity Protection: 17 Best Practices

A successful Zero Trust strategy requires seamless and flexible access to applications, systems, and data while maintaining security for both users...

Read More
willigethacked_2

Will Your Business Get Hacked? (Quiz)

The team at BEMO came up with the most important questions to ask any business owner or company executive when determining their risk of a data...

Read More
Office 365 Authenticator

2 min read

Office 365 MFA Setup: Step-by-Step Instructions

With 81 percent of data breaches being due to weak, reused, or stolen passwords, turning on Multi-Factor Authentication (MFA) for all of your apps is...

Read More
nerdioauthenticator

2 min read

Azure MFA Loophole: Why am I still under attack?

I was approached by the Head of IT for a 70-something person company via LinkedIn, wanting an independent review of their environment. I thought...

Read More
mxtoolbox blog

8 min read

MxToolbox: How to Enable SPF, DMARC, and DKIM

In this blog post, we're going to walk you through configuring SPF, DMARC, and DKIM. While this is an essential step, it is only one portion of a...

Read More