IT Matters for Small Business Blog

Subscribe here! ⬇️

Untitled design
Subscribe here!

Cybersecurity

5 min read

IT For Small Business: Never Skimp On Cybersecurity!

 

60% Of Small Businesses Will Be Targeted By Cyber Attackers. Don’t Make It Easy For Them.

If you think that number seems overinflated or pessimistic, I hate to tell you, my friend, but you’d be dead wrong. In fact, a 2021 survey showed that 42% of...

Read More

2 min read

What is BEMO building?

 We recently announced that we raised $3M from investors in addition to a $500k, 0% interest loan from Microsoft. So... what are we building?  

Microsoft continues to pack more and more security tools in their Microsoft 365 for SMB licenses, with their...

Read More

1 min read

BEMO Raises $3M Seed Round to Build Security Solutions on Top of Microsoft Security Stack

Redmond, WA, May 16, 2022 — BEMO, a Managed Security Service Provider (MSSP), today announced the completion of a $3 million seed funding round to secure small and medium-sized companies (10 to 500 users) running on the Microsoft Cloud against...

Read More

1 min read

How to Keep Your Remote Workers Cybersecure

Cybersecurity has never been more important for your small to medium sized business.

A whopping 43% of cyberattacks target SMBs, and 60% of these businesses are forced to close after a cyberattack. And to top it all off, do you know what the average...

Read More

6 min read

Personal vs. Corporate Devices for Remote Work: Pros & Cons

Let's face it: Work-from-home (WFH) and hybrid work is here to stay, and with that, your company has a decision to make: Should you let your employees work using their own computers and phones, or issue company owned and managed devices for them to work...

Read More

8 min read

Top 9 Cybersecurity Tips for Small to Medium Sized Businesses

"Rome wasn't built in a day, but it burned in one." - classic Italian saying

Read More

5 min read

IT Security Policy: Why You Need One (+How to Create Yours)

What's your company's security policy? How do you classify your data? How do you manage your data? Most importantly: How do you protect your data? If these questions leave you wanting to pull an ostrich and bury your head in the ground, come on up for...

Read More

5 min read

How to stop email spoofing

Have you ever received an email where...you just couldn't quite tell if it was real? Your heart began to beat just a little faster as you decided if you should click on the link. I mean, on the one hand, it was from your boss. On the other, it was your...

Read More

3 min read

Security Attestation: What is it? Do I need it? + Free template

Do you know where you stand in terms of your security status?*Gulp*If you just cried a little wondering a.) what I'm talking about and b.) if you're in big-time trouble, dry your eyes. We've got you covered. This blog will explain all you need to know...

Read More

4 min read

Managed Service Provider vs. Cloud Solutions Provider: What's the Difference?

IT support services in recent times have been nothing but revolutionary. The technology landscape has continued to evolve as the sector gets dominated by record-breaking cloud-based applications, commonly referred to as SaaS, or software as a service,...

Read More

7 min read

The Top 5 Add-Ons Your Microsoft 365 Licensing Needs to Make Your Business Thrive

Imagine for a minute that you just purchased Microsoft 365 Business Premium for your company. You install the desktop apps, get loaded in, and start exploring. You open up Teams and see that you are able to chat with your co-workers. You can even call...

Read More

5 min read

How to Set Up Office Message Encryption (OME)

In this blog post, we'll be giving you the step-by-step instructions for configuring Office Message Encryption. I have to say they aren't for the faint at heart! Enabling OME is much more difficult than the other Microsoft email security products such as...

Read More

4 min read

Office 365 Advanced Threat Protection: Plan 1 vs Plan 2

Office 365 Advanced Threat Protection (ATP) protects you by preventing dangerous links and malicious attachments from entering your organization via email and other tools (like SharePoint, OneDrive, and Teams). On the rare occasion that Office 365 ATP...

Read More

3 min read

Microsoft Authenticator App (MFA the easy way)

I am busy. I have a sneaking suspicion that you are too. However, until recently, I donated precious time, multiple times a day, to getting out my phone and typing in a six-digit code to authenticate my accounts. I get that we need security, but does...

Read More

2 min read

How to Set Up Exchange Online Protection

In this blog post, we're going to walk you through the step-by-step process for setting up Exchange Online Protection (EOP). Although setting up Exchange Online Protection is important, it is only one portion of a comprehensive email security strategy....

Read More

2 min read

How to Set Up Office 365 Advanced Threat Protection

In this blog post, we're going to walk you through the step-by-step process for setting up Office 365 Advanced Threat Protection (ATP). Although setting up ATP is a great move, it is only one portion (though an important one) of a comprehensive email...

Read More

7 min read

Spear Phishing vs. Phishing: The Difference And How To Prevent It

As many companies shift their operations online (and their employees shift into their “daytime jammies”) so too must their attention shift to cybersecurity. In our current COVID-19 conundrum many companies are moving strictly online. With these moves,...

Read More

7 min read

Azure AD Identity Protection: 17 Best Practices

A successful Zero Trust strategy requires seamless and flexible access to applications, systems, and data while maintaining security for both users and the resources they need to do their jobs. It requires being cloud-ready, starting with identity, and...

Read More

Will Your Business Get Hacked? (Quiz)

The team at BEMO came up with the most important questions to ask any business owner or company executive when determining their risk of a data breach. These questions (which take 5 minutes or less to answer) illuminate whether a business has the...

Read More

2 min read

Office 365 MFA Setup: Step-by-Step Instructions

With 81 percent of data breaches being due to weak, reused, or stolen passwords, turning on Multi-Factor Authentication (MFA) for all of your apps is necessary. In this article, we'll show you how to set up MFA for your Office 365 account paired with the...

Read More

2 min read

Azure MFA Loophole: Why am I still under attack?

I was approached by the Head of IT for a 70-something person company via LinkedIn, wanting an independent review of their environment. I thought sure, let's schedule a call to go over the details. This guy's company had an IT infrastructure of the...

Read More

8 min read

MxToolbox: How to Enable SPF, DMARC, and DKIM

In this blog post, we're going to walk you through configuring SPF, DMARC, and DKIM. While this is an essential step, it is only one portion of a comprehensive email security strategy. This blog is the 1st post of a 5 post series titled Your Complete...

Read More