Blog · Articles & Guides · May 8, 2024
Plain-language cybersecurity for the people who run the shop.
Six guides from H2Cyber's founder, Paul Horn, covering Microsoft 365, email, devices, and the cyber risk assessment itself. Read one in five minutes.
Lead Story

Microsoft 365 · 5 min read
How to protect company data on personal phones and tablets with Microsoft 365
Control your business data on personal phones with ease.
Paul Horn
May 8, 2024
In this issue · 5 more articles
Microsoft 365 · 5 min read

Understanding Microsoft's complex license and version types
Making sense of Microsoft's licenses and versions.
Read →
Email Security · 5 min read

Why behavioral email security is so important
Leverage contextual notification banners on email only when needed.
Read →
Microsoft 365 · 5 min read

How to create Conditional Access Policies within Microsoft 365
The top 3 Conditional Access Policies you should have in place in M365.
Read →
Risk Assessment · 5 min read

Why do I need a Cyber Risk Assessment
Understand the risks your business faces.
Read →
Device Monitoring · 5 min read

What is Endpoint Detection and Response and why do I need it
The difference between antivirus and EDR.
Read →